You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Gabia is one of the biggest Cloud, groupware, server, security control, domain, hosting IT infrastructure company from South Korea.
Below .yaml files detects Gabia server from the host.
You can test this .yaml file through https://www.gabia.com
Nuclei Template:
id: gabia-detectinfo:
name: Gabia Detectionauthor: jadu101severity: infodescription: This template identifies Gabia web servers by detecting the unique "gabia" keyword in the Server header of HTTP responses. metadata:
max-request: 1tags: tech,gabiahttp:
- method: GETpath:
- "{{BaseURL}}"matchers-condition: andmatchers:
- type: regexpart: headerregex:
- "gabia+"
- type: statusstatus:
- 200extractors:
- type: kvalpart: headerkval:
- Server
Hello, will this be added to Nuclei Template?
If not, I am wondering what kind of detection vulnerabilities are accepted to be added to templates.
I am looking for general tip on succeeding on adding a crafted template to the database : )
Template for?
Gabia is one of the biggest Cloud, groupware, server, security control, domain, hosting IT infrastructure company from South Korea.
Below .yaml files detects Gabia server from the host.
You can test this .yaml file through https://www.gabia.com
Nuclei Template:
Details:
The text was updated successfully, but these errors were encountered: