Skip to content

Default Web Application Detection

ID: default-detect-generic

Severity: info

Author: andydoering

Tags: tech

Catch-all for detecting default installations of web applications using common phrases found in default install pages

id: default-detect-generic
info:
name: Default Web Application Detection
author: andydoering
severity: info
description: Catch-all for detecting default installations of web applications using common phrases found in default install pages
metadata:
max-request: 1
tags: tech
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
part: body
condition: or
words:
- "<title>Default</title>"
- "<title>Welcome to</title>"
# digest: 490a00463044022004024d23b90494fba6690b29415f07c74db1f6981d9480dd133ebd8c765988f802206b7fad0fd1b82bd70716cc38a1c896201bc8d4e27ce9a1d5818802774436896b:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/technologies/default-detect-generic.yaml"

View on Github