From 1d37e0e3a269c56cb945c1c7a801f697c30134ab Mon Sep 17 00:00:00 2001 From: Achintya Jai <153343775+pUrGe12@users.noreply.github.com> Date: Fri, 5 Sep 2025 00:09:00 +0530 Subject: [PATCH] Removing redundancy and cleaning profiles (#1041) * removed the vulnerability profile as it a subset of vuln * removed brute_force profile as it is exactly same as brute * removed cve_2021_38702 as a profile, its already there in cve, cve2021 and more relevant ones * removed the puneethreddyrc profile * removed information_gathering profile, added graphql.yaml to info * removed the wp profile, it was a subset of wordpress * removed the infortmation profile * made relevant changes to the doc * coderabbit suggestions --- docs/Usage.md | 72 +++++++++---------- nettacker/modules/brute/ftp.yaml | 1 - nettacker/modules/brute/ftps.yaml | 1 - nettacker/modules/brute/pop3.yaml | 1 - nettacker/modules/brute/pop3s.yaml | 1 - nettacker/modules/brute/smtp.yaml | 1 - nettacker/modules/brute/smtps.yaml | 1 - nettacker/modules/brute/ssh.yaml | 1 - nettacker/modules/brute/telnet.yaml | 1 - nettacker/modules/scan/icmp.yaml | 2 - nettacker/modules/scan/port.yaml | 2 - nettacker/modules/scan/subdomain.yaml | 2 - nettacker/modules/scan/wordpress_version.yaml | 1 - nettacker/modules/scan/wp_plugin.yaml | 1 - nettacker/modules/scan/wp_theme.yaml | 1 - nettacker/modules/scan/wp_timethumbs.yaml | 1 - .../modules/vuln/accela_cve_2021_34370.yaml | 1 - .../vuln/adobe_coldfusion_cve_2023_26360.yaml | 1 - .../modules/vuln/apache_cve_2021_41773.yaml | 1 - .../modules/vuln/apache_cve_2021_42013.yaml | 1 - .../vuln/apache_ofbiz_cve_2024_38856.yaml | 1 - nettacker/modules/vuln/apache_struts.yaml | 1 - .../modules/vuln/aviatrix_cve_2021_40870.yaml | 1 - .../vuln/cisco_hyperflex_cve_2021_1497.yaml | 1 - .../modules/vuln/citrix_cve_2019_19781.yaml | 1 - .../modules/vuln/citrix_cve_2023_24488.yaml | 1 - .../modules/vuln/citrix_cve_2023_4966.yaml | 1 - nettacker/modules/vuln/clickjacking.yaml | 1 - .../modules/vuln/cloudron_cve_2021_40868.yaml | 1 - .../vuln/confluence_cve_2023_22515.yaml | 1 - .../vuln/confluence_cve_2023_22527.yaml | 1 - .../modules/vuln/content_security_policy.yaml | 1 - .../modules/vuln/content_type_options.yaml | 1 - .../cyberoam_netgenie_cve_2021_38702.yaml | 2 - .../vuln/exponent_cms_cve_2021_38751.yaml | 1 - nettacker/modules/vuln/f5_cve_2020_5902.yaml | 1 - .../vuln/forgerock_am_cve_2021_35464.yaml | 1 - .../vuln/galera_webtemp_cve_2021_40960.yaml | 1 - .../modules/vuln/grafana_cve_2021_43798.yaml | 1 - nettacker/modules/vuln/graphql.yaml | 1 - .../vuln/gurock_testrail_cve_2021_40875.yaml | 1 - .../vuln/hoteldruid_cve_2021-37833.yaml | 1 - nettacker/modules/vuln/http_cookie.yaml | 1 - nettacker/modules/vuln/http_cors.yaml | 1 - .../modules/vuln/http_options_enabled.yaml | 1 - .../vuln/ivanti_epmm_cve_2023_35082.yaml | 1 - .../vuln/ivanti_ics_cve_2023_46805.yaml | 1 - .../vuln/justwirting_cve_2021_41878.yaml | 1 - .../modules/vuln/log4j_cve_2021_44228.yaml | 1 - .../vuln/maxsite_cms_cve_2021_35265.yaml | 1 - .../vuln/msexchange_cve_2021_26855.yaml | 1 - .../vuln/msexchange_cve_2021_34473.yaml | 1 - .../modules/vuln/novnc_cve_2021_3654.yaml | 1 - .../modules/vuln/omigod_cve_2021_38647.yaml | 1 - .../vuln/paloalto_panos_cve_2025_0108.yaml | 1 - .../modules/vuln/payara_cve_2021_41381.yaml | 1 - .../modules/vuln/phpinfo_cve_2021_37704.yaml | 1 - .../modules/vuln/placeos_cve_2021_41826.yaml | 1 - .../vuln/prestashop_cve_2021_37538.yaml | 1 - .../puneethreddyhc_sqli_cve_2021_41648.yaml | 2 - .../puneethreddyhc_sqli_cve_2021_41649.yaml | 2 - .../vuln/qsan_storage_xss_cve_2021_37216.yaml | 1 - nettacker/modules/vuln/server_version.yaml | 1 - .../vuln/sonicwall_sslvpn_cve_2024_53704.yaml | 1 - .../vuln/strict_transport_security.yaml | 1 - .../modules/vuln/subdomain_takeover.yaml | 1 - .../modules/vuln/teamcity_cve_2024_27198.yaml | 1 - .../modules/vuln/tieline_cve_2021_35336.yaml | 1 - .../modules/vuln/tjws_cve_2021_37573.yaml | 1 - .../vuln/vbulletin_cve_2019_16759.yaml | 1 - .../vuln/wp_plugin_cve_2021_38314.yaml | 1 - .../vuln/wp_plugin_cve_2021_39316.yaml | 1 - .../vuln/wp_plugin_cve_2021_39320.yaml | 1 - .../vuln/wp_plugin_cve_2023_47668.yaml | 2 - .../modules/vuln/wp_plugin_cve_2023_6875.yaml | 1 - .../modules/vuln/wp_xmlrpc_bruteforce.yaml | 2 - nettacker/modules/vuln/wp_xmlrpc_dos.yaml | 2 - .../modules/vuln/wp_xmlrpc_pingback.yaml | 2 - nettacker/modules/vuln/x_powered_by.yaml | 1 - nettacker/modules/vuln/x_xss_protection.yaml | 1 - nettacker/modules/vuln/xdebug_rce.yaml | 1 - .../modules/vuln/zoho_cve_2021_40539.yaml | 1 - 82 files changed, 35 insertions(+), 128 deletions(-) diff --git a/docs/Usage.md b/docs/Usage.md index 6040e677..931b8c66 100644 --- a/docs/Usage.md +++ b/docs/Usage.md @@ -81,7 +81,7 @@ Method: add extra args to pass to modules (e.g. --modules-extra-args "x_api_key=123&xyz_passwd=abc" --show-all-modules show all modules and their information --profile PROFILES select profile ['accela', 'adobe', 'apache', 'apache_ofbiz', 'apache_struts', 'atlassian', - 'aviatrix', 'backup', 'brute', 'brute_force'] + 'aviatrix', 'backup', 'brute'] --show-all-profiles show all profiles and their information -x EXCLUDED_MODULES, --exclude-modules EXCLUDED_MODULES choose scan method to exclude ['accela_cve_2021_34370_vuln', 'admin_scan', @@ -229,7 +229,7 @@ usage: Nettacker [-L LANGUAGE] [-v] [--verbose-event] [-V] [-o REPORT_PATH_FILEN add extra args to pass to modules (e.g. --modules-extra-args "x_api_key=123&xyz_passwd=abc" --show-all-modules show all modules and their information --profile PROFILES انتخاب پروفایل ['accela', 'adobe', 'apache', 'apache_ofbiz', 'apache_struts', 'atlassian', - 'aviatrix', 'backup', 'brute', 'brute_force'] + 'aviatrix', 'backup', 'brute'] --show-all-profiles show all profiles and their information -x EXCLUDED_MODULES, --exclude-modules EXCLUDED_MODULES انتخاب متود اسکن استثنا ['accela_cve_2021_34370_vuln', 'admin_scan', @@ -374,8 +374,8 @@ python nettacker.py -i 192.168.1.1/24 -m *_scan,*_vuln * Use profiles for using all modules inside a given profile ``` -python nettacker.py -i 192.168.1.1/24 --profile information_gathering -python nettacker.py -i 192.168.1.1/24 --profile information_gathering,vulnerabilities +python nettacker.py -i 192.168.1.1/24 --profile info +python nettacker.py -i 192.168.1.1/24 --profile info,vuln python nettacker.py -i 192.168.1.1/24 --profile all ``` @@ -411,43 +411,43 @@ python nettacker.py --show-all-modules -[2021-08-31 17:42:06][+] http_options_enabled_vuln: name: http_options_enabled_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'low_severity'] -[2021-08-31 17:42:06][+] clickjacking_vuln: name: clickjacking_vuln, author: OWASP Nettacker Team, severity: 5, description: Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button, reference: https://cheatsheetseries.owasp.org/cheatsheets/Clickjacking_Defense_Cheat_Sheet.html, profiles: ['vuln', 'vulnerability', 'http', 'medium_severity'] -[2021-08-31 17:42:06][+] wp_xmlrpc_bruteforce_vuln: name: wp_xmlrpc_bruteforce_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'low_severity', 'wordpress', 'wp'] -[2021-08-31 17:42:06][+] graphql_vuln: name: graphql_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'information_gathering', 'http', 'low_severity', 'graphql'] -[2021-08-31 17:42:06][+] content_security_policy_vuln: name: content_security_policy_vuln, author: OWASP Nettacker Team, severity: 3, description: Content-Security-Policy is the name of a HTTP response header that modern browsers use to enhance the security of the document (or web page). The Content-Security-Policy header allows you to restrict how resources such as JavaScript, CSS, or pretty much anything that the browser loads., reference: https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html, profiles: ['vuln', 'vulnerability', 'http', 'low_severity', 'csp'] -[2021-08-31 17:42:06][+] xdebug_rce_vuln: name: xdebug_rce_vuln, author: OWASP Nettacker Team, severity: 10, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'critical_severity'] -[2021-08-31 17:42:06][+] x_powered_by_vuln: name: x_powered_by_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'low_severity'] -[2021-08-31 17:42:06][+] wp_xmlrpc_pingback_vuln: name: wp_xmlrpc_pingback_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'wordpress', 'wp'] -[2021-08-31 17:42:06][+] http_cors_vuln: name: http_cors_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'low_severity'] -[2021-08-31 17:42:06][+] f5_cve_2020_5902_vuln: name: f5_cve_2020_5902_vuln, author: OWASP Nettacker Team, severity: 9, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'critical_severity', 'cve', 'f5'] -[2021-08-31 17:42:06][+] subdomain_takeover_vuln: name: subdomain_takeover_vuln, author: OWASP Nettacker Team, severity: 5, description: let us assume that example.com is the target and that the team running example.com have a bug bounty programme. While enumerating all of the subdomains belonging to example.com — a process that we will explore later — a hacker stumbles across subdomain.example.com, a subdomain pointing to GitHub pages. We can determine this by reviewing the subdomain's DNS records; in this example, subdomain.example.com has multiple A records pointing to GitHub's dedicated IP addresses for custom pages., reference: https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/02-Configuration_and_Deployment_Management_Testing/10-Test_for_Subdomain_Takeover, profiles: ['vuln', 'vulnerability', 'http', 'medium_severity', 'takeover'] -[2021-08-31 17:42:06][+] http_trace_enabled_vuln: name: http_trace_enabled_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'low_severity'] -[2021-08-31 17:42:06][+] http_cookie_vuln: name: http_cookie_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'low_severity'] -[2021-08-31 17:42:06][+] wp_xmlrpc_dos_vuln: name: wp_xmlrpc_dos_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'wordpress', 'wp'] -[2021-08-31 17:42:06][+] server_version_vuln: name: server_version_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'low_severity'] -[2021-08-31 17:42:06][+] x_xss_protection_vuln: name: x_xss_protection_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'low_severity'] -[2021-08-31 17:42:06][+] citrix_cve_2019_19781_vuln: name: citrix_cve_2019_19781_vuln, author: OWASP Nettacker Team, severity: 8, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'high_severity', 'cve', 'citrix'] -[2021-08-31 17:42:06][+] content_type_options_vuln: name: content_type_options_vuln, author: OWASP Nettacker Team, severity: 2, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'low_severity'] -[2021-08-31 17:42:06][+] apache_struts_vuln: name: apache_struts_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'low_severity', 'apache_struts'] -[2021-08-31 17:42:06][+] vbulletin_cve_2019_16759_vuln: name: vbulletin_cve_2019_16759_vuln, author: OWASP Nettacker Team, severity: 9, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'critical_severity', 'vbulletin', 'cve'] -[2021-08-31 17:42:06][+] msexchange_cve_2021_26855_vuln: name: msexchange_cve_2021_26855_vuln, author: OWASP Nettacker Team, severity: 9, description: None, reference: None, profiles: ['vuln', 'vulnerability', 'http', 'critical_severity', 'msexchange', 'cve'] -[2021-08-31 17:42:06][+] telnet_brute: name: telnet_brute, author: OWASP Nettacker Team, severity: 3, description: Telnet Bruteforcer, reference: None, profiles: ['brute', 'brute_force', 'telnet'] -[2021-08-31 17:42:06][+] ssh_brute: name: ssh_brute, author: OWASP Nettacker Team, severity: 3, description: SSH Bruteforcer, reference: None, profiles: ['brute', 'brute_force', 'ssh'] -[2021-08-31 17:42:06][+] smtp_brute: name: smtp_brute, author: OWASP Nettacker Team, severity: 3, description: SMTP Bruteforcer, reference: None, profiles: ['brute', 'brute_force', 'smtp'] -[2021-08-31 17:42:06][+] ftps_brute: name: ftps_brute, author: OWASP Nettacker Team, severity: 3, description: FTPS Bruteforcer, reference: None, profiles: ['brute', 'brute_force', 'ftp'] -[2021-08-31 17:42:06][+] smtps_brute: name: smtps_brute, author: OWASP Nettacker Team, severity: 3, description: SMTPS Bruteforcer, reference: None, profiles: ['brute', 'brute_force', 'smtp'] -[2021-08-31 17:42:06][+] ftp_brute: name: ftp_brute, author: OWASP Nettacker Team, severity: 3, description: FTP Bruteforcer, reference: None, profiles: ['brute', 'brute_force', 'ftp'] +[2021-08-31 17:42:06][+] http_options_enabled_vuln: name: http_options_enabled_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'http', 'low_severity'] +[2021-08-31 17:42:06][+] clickjacking_vuln: name: clickjacking_vuln, author: OWASP Nettacker Team, severity: 5, description: Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button, reference: https://cheatsheetseries.owasp.org/cheatsheets/Clickjacking_Defense_Cheat_Sheet.html, profiles: ['vuln', 'http', 'medium_severity'] +[2021-08-31 17:42:06][+] wp_xmlrpc_bruteforce_vuln: name: wp_xmlrpc_bruteforce_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'http', 'low_severity', 'wordpress'] +[2021-08-31 17:42:06][+] graphql_vuln: name: graphql_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'http', 'low_severity', 'graphql'] +[2021-08-31 17:42:06][+] content_security_policy_vuln: name: content_security_policy_vuln, author: OWASP Nettacker Team, severity: 3, description: Content-Security-Policy is the name of a HTTP response header that modern browsers use to enhance the security of the document (or web page). The Content-Security-Policy header allows you to restrict how resources such as JavaScript, CSS, or pretty much anything that the browser loads., reference: https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html, profiles: ['vuln', 'http', 'low_severity', 'csp'] +[2021-08-31 17:42:06][+] xdebug_rce_vuln: name: xdebug_rce_vuln, author: OWASP Nettacker Team, severity: 10, description: None, reference: None, profiles: ['vuln', 'http', 'critical_severity'] +[2021-08-31 17:42:06][+] x_powered_by_vuln: name: x_powered_by_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'http', 'low_severity'] +[2021-08-31 17:42:06][+] wp_xmlrpc_pingback_vuln: name: wp_xmlrpc_pingback_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'http', 'wordpress'] +[2021-08-31 17:42:06][+] http_cors_vuln: name: http_cors_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'http', 'low_severity'] +[2021-08-31 17:42:06][+] f5_cve_2020_5902_vuln: name: f5_cve_2020_5902_vuln, author: OWASP Nettacker Team, severity: 9, description: None, reference: None, profiles: ['vuln', 'http', 'critical_severity', 'cve', 'f5'] +[2021-08-31 17:42:06][+] subdomain_takeover_vuln: name: subdomain_takeover_vuln, author: OWASP Nettacker Team, severity: 5, description: let us assume that example.com is the target and that the team running example.com have a bug bounty programme. While enumerating all of the subdomains belonging to example.com — a process that we will explore later — a hacker stumbles across subdomain.example.com, a subdomain pointing to GitHub pages. We can determine this by reviewing the subdomain's DNS records; in this example, subdomain.example.com has multiple A records pointing to GitHub's dedicated IP addresses for custom pages., reference: https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/02-Configuration_and_Deployment_Management_Testing/10-Test_for_Subdomain_Takeover, profiles: ['vuln', 'http', 'medium_severity', 'takeover'] +[2021-08-31 17:42:06][+] http_trace_enabled_vuln: name: http_trace_enabled_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'http', 'low_severity'] +[2021-08-31 17:42:06][+] http_cookie_vuln: name: http_cookie_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'http', 'low_severity'] +[2021-08-31 17:42:06][+] wp_xmlrpc_dos_vuln: name: wp_xmlrpc_dos_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'http', 'wordpress'] +[2021-08-31 17:42:06][+] server_version_vuln: name: server_version_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'http', 'low_severity'] +[2021-08-31 17:42:06][+] x_xss_protection_vuln: name: x_xss_protection_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'http', 'low_severity'] +[2021-08-31 17:42:06][+] citrix_cve_2019_19781_vuln: name: citrix_cve_2019_19781_vuln, author: OWASP Nettacker Team, severity: 8, description: None, reference: None, profiles: ['vuln', 'http', 'high_severity', 'cve', 'citrix'] +[2021-08-31 17:42:06][+] content_type_options_vuln: name: content_type_options_vuln, author: OWASP Nettacker Team, severity: 2, description: None, reference: None, profiles: ['vuln', 'http', 'low_severity'] +[2021-08-31 17:42:06][+] apache_struts_vuln: name: apache_struts_vuln, author: OWASP Nettacker Team, severity: 3, description: None, reference: None, profiles: ['vuln', 'http', 'low_severity', 'apache_struts'] +[2021-08-31 17:42:06][+] vbulletin_cve_2019_16759_vuln: name: vbulletin_cve_2019_16759_vuln, author: OWASP Nettacker Team, severity: 9, description: None, reference: None, profiles: ['vuln', 'http', 'critical_severity', 'vbulletin', 'cve'] +[2021-08-31 17:42:06][+] msexchange_cve_2021_26855_vuln: name: msexchange_cve_2021_26855_vuln, author: OWASP Nettacker Team, severity: 9, description: None, reference: None, profiles: ['vuln', 'http', 'critical_severity', 'msexchange', 'cve'] +[2021-08-31 17:42:06][+] telnet_brute: name: telnet_brute, author: OWASP Nettacker Team, severity: 3, description: Telnet Bruteforcer, reference: None, profiles: ['brute', 'telnet'] +[2021-08-31 17:42:06][+] ssh_brute: name: ssh_brute, author: OWASP Nettacker Team, severity: 3, description: SSH Bruteforcer, reference: None, profiles: ['brute', 'ssh'] +[2021-08-31 17:42:06][+] smtp_brute: name: smtp_brute, author: OWASP Nettacker Team, severity: 3, description: SMTP Bruteforcer, reference: None, profiles: ['brute', 'smtp'] +[2021-08-31 17:42:06][+] ftps_brute: name: ftps_brute, author: OWASP Nettacker Team, severity: 3, description: FTPS Bruteforcer, reference: None, profiles: ['brute', 'ftp'] +[2021-08-31 17:42:06][+] smtps_brute: name: smtps_brute, author: OWASP Nettacker Team, severity: 3, description: SMTPS Bruteforcer, reference: None, profiles: ['brute', 'smtp'] +[2021-08-31 17:42:06][+] ftp_brute: name: ftp_brute, author: OWASP Nettacker Team, severity: 3, description: FTP Bruteforcer, reference: None, profiles: ['brute', 'ftp'] [2021-08-31 17:42:06][+] whatcms_scan: name: dir_scan, author: OWASP Nettacker Team, severity: 3, description: Directory, Backup finder, reference: https://www.zaproxy.org/docs/alerts/10095/, profiles: ['scan', 'http', 'backup', 'low_severity'] -[2021-08-31 17:42:06][+] icmp_scan: name: icmp_scan, author: OWASP Nettacker Team, severity: 0, description: check if host is alive through ICMP, reference: None, profiles: ['scan', 'information_gathering', 'infortmation', 'info', 'low_severity'] -[2021-08-31 17:42:06][+] subdomain_scan: name: subdomain_scan, author: OWASP Nettacker Team, severity: 0, description: Find subdomains using different sources on internet, reference: None, profiles: ['scan', 'information_gathering', 'infortmation', 'info', 'low_severity'] -[2021-08-31 17:42:06][+] port_scan: id: port_scan, author: OWASP Nettacker Team, severity: 0, description: Find open ports and services, reference: None, profiles: ['scan', 'http', 'information_gathering', 'infortmation', 'info', 'low_severity'] +[2021-08-31 17:42:06][+] icmp_scan: name: icmp_scan, author: OWASP Nettacker Team, severity: 0, description: check if host is alive through ICMP, reference: None, profiles: ['scan', 'info', 'low_severity'] +[2021-08-31 17:42:06][+] subdomain_scan: name: subdomain_scan, author: OWASP Nettacker Team, severity: 0, description: Find subdomains using different sources on internet, reference: None, profiles: ['scan', 'info', 'low_severity'] +[2021-08-31 17:42:06][+] port_scan: id: port_scan, author: OWASP Nettacker Team, severity: 0, description: Find open ports and services, reference: None, profiles: ['scan', 'http', 'info', 'low_severity'] [2021-08-31 17:42:06][+] admin_scan: name: admin_scan, author: OWASP Nettacker Team, severity: 3, description: Admin Directory Finder, reference: None, profiles: ['scan', 'http', 'backup', 'low_severity'] [2021-08-31 17:42:06][+] dir_scan: name: dir_scan, author: OWASP Nettacker Team, severity: 3, description: Directory, Backup finder, reference: https://www.zaproxy.org/docs/alerts/10095/, profiles: ['scan', 'http', 'backup', 'low_severity'] [2021-08-31 17:42:06][+] viewdns_reverse_iplookup_scan: name: viewdns_reverse_iplookup_scan, author: OWASP Nettacker Team, severity: 3, description: reverse lookup for target ip, reference: None, profiles: ['scan', 'http', 'backup', 'low_severity', 'reverse_lookup'] [2021-08-31 17:42:06][+] drupal_version_scan: name: drupal_version_scan, author: OWASP Nettacker Team, severity: 3, description: fetch drupal version from target, reference: None, profiles: ['scan', 'http', 'backup', 'low_severity', 'drupal'] [2021-08-31 17:42:06][+] joomla_version_scan: name: drupal_version_scan, author: OWASP Nettacker Team, severity: 3, description: fetch drupal version from target, reference: None, profiles: ['scan', 'http', 'backup', 'low_severity', 'drupal'] -[2021-08-31 17:42:06][+] wordpress_version_scan: name: wordpress_version_scan, author: OWASP Nettacker Team, severity: 3, description: Directory, Backup finder, reference: None, profiles: ['scan', 'http', 'backup', 'low_severity', 'wp', 'wordpress'] +[2021-08-31 17:42:06][+] wordpress_version_scan: name: wordpress_version_scan, author: OWASP Nettacker Team, severity: 3, description: Directory, Backup finder, reference: None, profiles: ['scan', 'http', 'backup', 'low_severity', 'wordpress'] [2021-08-31 17:42:06][+] pma_scan: name: pma_scan, author: OWASP Nettacker Team, severity: 3, description: php my admin finder, reference: None, profiles: ['scan', 'http', 'backup', 'low_severity'] [2021-08-31 17:42:06][+] all: ``` @@ -470,8 +470,6 @@ info: reference: profiles: - scan - - information_gathering - - infortmation - info - low_severity - asset_discovery(new added profile) diff --git a/nettacker/modules/brute/ftp.yaml b/nettacker/modules/brute/ftp.yaml index 3f62c4c7..0a431f68 100644 --- a/nettacker/modules/brute/ftp.yaml +++ b/nettacker/modules/brute/ftp.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - brute - - brute_force - ftp payloads: diff --git a/nettacker/modules/brute/ftps.yaml b/nettacker/modules/brute/ftps.yaml index 509905f5..8c92f685 100644 --- a/nettacker/modules/brute/ftps.yaml +++ b/nettacker/modules/brute/ftps.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - brute - - brute_force - ftp payloads: diff --git a/nettacker/modules/brute/pop3.yaml b/nettacker/modules/brute/pop3.yaml index 5af1860a..97dbde55 100644 --- a/nettacker/modules/brute/pop3.yaml +++ b/nettacker/modules/brute/pop3.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - brute - - brute_force - pop3 payloads: diff --git a/nettacker/modules/brute/pop3s.yaml b/nettacker/modules/brute/pop3s.yaml index f47d3ca7..fee4ae7b 100644 --- a/nettacker/modules/brute/pop3s.yaml +++ b/nettacker/modules/brute/pop3s.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - brute - - brute_force - pop3 payloads: diff --git a/nettacker/modules/brute/smtp.yaml b/nettacker/modules/brute/smtp.yaml index e0c338d0..80d39d1f 100644 --- a/nettacker/modules/brute/smtp.yaml +++ b/nettacker/modules/brute/smtp.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - brute - - brute_force - smtp payloads: diff --git a/nettacker/modules/brute/smtps.yaml b/nettacker/modules/brute/smtps.yaml index c57004b5..02173a9d 100644 --- a/nettacker/modules/brute/smtps.yaml +++ b/nettacker/modules/brute/smtps.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - brute - - brute_force - smtp payloads: diff --git a/nettacker/modules/brute/ssh.yaml b/nettacker/modules/brute/ssh.yaml index 3d5e3eb6..14694f3d 100644 --- a/nettacker/modules/brute/ssh.yaml +++ b/nettacker/modules/brute/ssh.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - brute - - brute_force - ssh payloads: diff --git a/nettacker/modules/brute/telnet.yaml b/nettacker/modules/brute/telnet.yaml index 6b1aa432..fc919fc0 100644 --- a/nettacker/modules/brute/telnet.yaml +++ b/nettacker/modules/brute/telnet.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - brute - - brute_force - telnet payloads: diff --git a/nettacker/modules/scan/icmp.yaml b/nettacker/modules/scan/icmp.yaml index 3f861b75..c898cecc 100644 --- a/nettacker/modules/scan/icmp.yaml +++ b/nettacker/modules/scan/icmp.yaml @@ -6,8 +6,6 @@ info: reference: profiles: - scan - - information_gathering - - infortmation - info - low_severity diff --git a/nettacker/modules/scan/port.yaml b/nettacker/modules/scan/port.yaml index e6e0cdfb..47f79fac 100644 --- a/nettacker/modules/scan/port.yaml +++ b/nettacker/modules/scan/port.yaml @@ -7,8 +7,6 @@ info: profiles: - scan - http - - information_gathering - - infortmation - info - low_severity diff --git a/nettacker/modules/scan/subdomain.yaml b/nettacker/modules/scan/subdomain.yaml index 629e4903..05c1c090 100644 --- a/nettacker/modules/scan/subdomain.yaml +++ b/nettacker/modules/scan/subdomain.yaml @@ -6,8 +6,6 @@ info: reference: profiles: - scan - - information_gathering - - infortmation - info - low_severity diff --git a/nettacker/modules/scan/wordpress_version.yaml b/nettacker/modules/scan/wordpress_version.yaml index d4117252..6de7a618 100644 --- a/nettacker/modules/scan/wordpress_version.yaml +++ b/nettacker/modules/scan/wordpress_version.yaml @@ -9,7 +9,6 @@ info: - http - backup - low_severity - - wp - wordpress payloads: diff --git a/nettacker/modules/scan/wp_plugin.yaml b/nettacker/modules/scan/wp_plugin.yaml index 70083cd3..a56d04fd 100644 --- a/nettacker/modules/scan/wp_plugin.yaml +++ b/nettacker/modules/scan/wp_plugin.yaml @@ -9,7 +9,6 @@ info: - http - backup - low_severity - - wp - wordpress payloads: - library: http diff --git a/nettacker/modules/scan/wp_theme.yaml b/nettacker/modules/scan/wp_theme.yaml index 2d87bf47..747f86f0 100644 --- a/nettacker/modules/scan/wp_theme.yaml +++ b/nettacker/modules/scan/wp_theme.yaml @@ -9,7 +9,6 @@ info: - http - backup - low_severity - - wp - wordpress - wp_theme diff --git a/nettacker/modules/scan/wp_timethumbs.yaml b/nettacker/modules/scan/wp_timethumbs.yaml index dab32400..a86ee5eb 100644 --- a/nettacker/modules/scan/wp_timethumbs.yaml +++ b/nettacker/modules/scan/wp_timethumbs.yaml @@ -9,7 +9,6 @@ info: - http - backup - low_severity - - wp - wp_timethumbs - wordpress diff --git a/nettacker/modules/vuln/accela_cve_2021_34370.yaml b/nettacker/modules/vuln/accela_cve_2021_34370.yaml index fc01d8b8..2a653c03 100644 --- a/nettacker/modules/vuln/accela_cve_2021_34370.yaml +++ b/nettacker/modules/vuln/accela_cve_2021_34370.yaml @@ -8,7 +8,6 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-34370 profiles: - vuln - - vulnerability - http - medium_severity - cve2021 diff --git a/nettacker/modules/vuln/adobe_coldfusion_cve_2023_26360.yaml b/nettacker/modules/vuln/adobe_coldfusion_cve_2023_26360.yaml index 9bd9bf99..f84defe9 100644 --- a/nettacker/modules/vuln/adobe_coldfusion_cve_2023_26360.yaml +++ b/nettacker/modules/vuln/adobe_coldfusion_cve_2023_26360.yaml @@ -9,7 +9,6 @@ info: - http://packetstormsecurity.com/files/172079/Adobe-ColdFusion-Unauthenticated-Remote-Code-Execution.html profiles: - vuln - - vulnerability - http - critical_severity - cve diff --git a/nettacker/modules/vuln/apache_cve_2021_41773.yaml b/nettacker/modules/vuln/apache_cve_2021_41773.yaml index 3796c7c5..185d4505 100644 --- a/nettacker/modules/vuln/apache_cve_2021_41773.yaml +++ b/nettacker/modules/vuln/apache_cve_2021_41773.yaml @@ -8,7 +8,6 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-41773 profiles: - vuln - - vulnerability - http - critical_severity - cve2021 diff --git a/nettacker/modules/vuln/apache_cve_2021_42013.yaml b/nettacker/modules/vuln/apache_cve_2021_42013.yaml index 3ddbe45e..07e9e128 100644 --- a/nettacker/modules/vuln/apache_cve_2021_42013.yaml +++ b/nettacker/modules/vuln/apache_cve_2021_42013.yaml @@ -8,7 +8,6 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-42013 profiles: - vuln - - vulnerability - http - critical_severity - cve2021 diff --git a/nettacker/modules/vuln/apache_ofbiz_cve_2024_38856.yaml b/nettacker/modules/vuln/apache_ofbiz_cve_2024_38856.yaml index a535cef1..5bb5feab 100644 --- a/nettacker/modules/vuln/apache_ofbiz_cve_2024_38856.yaml +++ b/nettacker/modules/vuln/apache_ofbiz_cve_2024_38856.yaml @@ -10,7 +10,6 @@ info: profiles: - vuln - - vulnerability - http - critical_severity - cve diff --git a/nettacker/modules/vuln/apache_struts.yaml b/nettacker/modules/vuln/apache_struts.yaml index b94b18fe..7f5b180d 100644 --- a/nettacker/modules/vuln/apache_struts.yaml +++ b/nettacker/modules/vuln/apache_struts.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - vuln - - vulnerability - http - low_severity - apache_struts diff --git a/nettacker/modules/vuln/aviatrix_cve_2021_40870.yaml b/nettacker/modules/vuln/aviatrix_cve_2021_40870.yaml index d1aa1f48..43d31cd3 100644 --- a/nettacker/modules/vuln/aviatrix_cve_2021_40870.yaml +++ b/nettacker/modules/vuln/aviatrix_cve_2021_40870.yaml @@ -8,7 +8,6 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-40870 profiles: - vuln - - vulnerability - http - critical_severity - cve2021 diff --git a/nettacker/modules/vuln/cisco_hyperflex_cve_2021_1497.yaml b/nettacker/modules/vuln/cisco_hyperflex_cve_2021_1497.yaml index d46f53ae..6dab1005 100644 --- a/nettacker/modules/vuln/cisco_hyperflex_cve_2021_1497.yaml +++ b/nettacker/modules/vuln/cisco_hyperflex_cve_2021_1497.yaml @@ -8,7 +8,6 @@ info: - https://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html profiles: - vuln - - vulnerability - http - high_severity - cve diff --git a/nettacker/modules/vuln/citrix_cve_2019_19781.yaml b/nettacker/modules/vuln/citrix_cve_2019_19781.yaml index c7c5f933..ca37bcee 100644 --- a/nettacker/modules/vuln/citrix_cve_2019_19781.yaml +++ b/nettacker/modules/vuln/citrix_cve_2019_19781.yaml @@ -7,7 +7,6 @@ info: - https://support.citrix.com/article/CTX267027 profiles: - vuln - - vulnerability - http - high_severity - cve diff --git a/nettacker/modules/vuln/citrix_cve_2023_24488.yaml b/nettacker/modules/vuln/citrix_cve_2023_24488.yaml index 83e0abb9..ebdaed5f 100644 --- a/nettacker/modules/vuln/citrix_cve_2023_24488.yaml +++ b/nettacker/modules/vuln/citrix_cve_2023_24488.yaml @@ -9,7 +9,6 @@ info: - https://blog.assetnote.io/2023/06/29/citrix-xss-advisory/ profiles: - vuln - - vulnerability - http - medium_severity - cve diff --git a/nettacker/modules/vuln/citrix_cve_2023_4966.yaml b/nettacker/modules/vuln/citrix_cve_2023_4966.yaml index b7dee97c..4473edc7 100644 --- a/nettacker/modules/vuln/citrix_cve_2023_4966.yaml +++ b/nettacker/modules/vuln/citrix_cve_2023_4966.yaml @@ -10,7 +10,6 @@ info: - https://github.com/advisories/GHSA-2g42-2pwg-93cj profiles: - vuln - - vulnerability - http - high_severity - cve diff --git a/nettacker/modules/vuln/clickjacking.yaml b/nettacker/modules/vuln/clickjacking.yaml index 3475c1da..40722134 100644 --- a/nettacker/modules/vuln/clickjacking.yaml +++ b/nettacker/modules/vuln/clickjacking.yaml @@ -6,7 +6,6 @@ info: reference: "https://cheatsheetseries.owasp.org/cheatsheets/Clickjacking_Defense_Cheat_Sheet.html" profiles: - vuln - - vulnerability - http - medium_severity diff --git a/nettacker/modules/vuln/cloudron_cve_2021_40868.yaml b/nettacker/modules/vuln/cloudron_cve_2021_40868.yaml index 8b42ee88..9b5596d8 100644 --- a/nettacker/modules/vuln/cloudron_cve_2021_40868.yaml +++ b/nettacker/modules/vuln/cloudron_cve_2021_40868.yaml @@ -8,7 +8,6 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-40868 profiles: - vuln - - vulnerability - http - medium_severity - cve2021 diff --git a/nettacker/modules/vuln/confluence_cve_2023_22515.yaml b/nettacker/modules/vuln/confluence_cve_2023_22515.yaml index f3b7865e..71af21ac 100644 --- a/nettacker/modules/vuln/confluence_cve_2023_22515.yaml +++ b/nettacker/modules/vuln/confluence_cve_2023_22515.yaml @@ -12,7 +12,6 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2023-22515 profiles: - vuln - - vulnerability - http - critical_severity - cve diff --git a/nettacker/modules/vuln/confluence_cve_2023_22527.yaml b/nettacker/modules/vuln/confluence_cve_2023_22527.yaml index 9bbe7afe..27f99a36 100644 --- a/nettacker/modules/vuln/confluence_cve_2023_22527.yaml +++ b/nettacker/modules/vuln/confluence_cve_2023_22527.yaml @@ -9,7 +9,6 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2023-22527 profiles: - vuln - - vulnerability - http - critical_severity - cve diff --git a/nettacker/modules/vuln/content_security_policy.yaml b/nettacker/modules/vuln/content_security_policy.yaml index 95e9557f..f6dc7ae3 100644 --- a/nettacker/modules/vuln/content_security_policy.yaml +++ b/nettacker/modules/vuln/content_security_policy.yaml @@ -6,7 +6,6 @@ info: reference: "https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html" profiles: - vuln - - vulnerability - http - low_severity - csp diff --git a/nettacker/modules/vuln/content_type_options.yaml b/nettacker/modules/vuln/content_type_options.yaml index f00a174e..32e65287 100644 --- a/nettacker/modules/vuln/content_type_options.yaml +++ b/nettacker/modules/vuln/content_type_options.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - vuln - - vulnerability - http - low_severity diff --git a/nettacker/modules/vuln/cyberoam_netgenie_cve_2021_38702.yaml b/nettacker/modules/vuln/cyberoam_netgenie_cve_2021_38702.yaml index eb3cad53..80c6d3a1 100644 --- a/nettacker/modules/vuln/cyberoam_netgenie_cve_2021_38702.yaml +++ b/nettacker/modules/vuln/cyberoam_netgenie_cve_2021_38702.yaml @@ -6,10 +6,8 @@ info: reference: https://seclists.org/fulldisclosure/2021/Aug/20 profiles: - vuln - - vulnerability - http - medium_severity - - cve_2021_38702 - cve2021 - cve - cyberoam diff --git a/nettacker/modules/vuln/exponent_cms_cve_2021_38751.yaml b/nettacker/modules/vuln/exponent_cms_cve_2021_38751.yaml index f62a9561..33c961b3 100644 --- a/nettacker/modules/vuln/exponent_cms_cve_2021_38751.yaml +++ b/nettacker/modules/vuln/exponent_cms_cve_2021_38751.yaml @@ -8,7 +8,6 @@ info: - https://github.com/exponentcms/exponent-cms/blob/a9fa9358c5e8dc2ce7ad61d7d5bea38505b8515c/exponent_constants.php#L56-L64 profiles: - vuln - - vulnerability - http - medium_severity - cve diff --git a/nettacker/modules/vuln/f5_cve_2020_5902.yaml b/nettacker/modules/vuln/f5_cve_2020_5902.yaml index a0aa0a24..b7ef88c9 100644 --- a/nettacker/modules/vuln/f5_cve_2020_5902.yaml +++ b/nettacker/modules/vuln/f5_cve_2020_5902.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - vuln - - vulnerability - http - critical_severity - cve diff --git a/nettacker/modules/vuln/forgerock_am_cve_2021_35464.yaml b/nettacker/modules/vuln/forgerock_am_cve_2021_35464.yaml index 2f9286b3..a35fdded 100644 --- a/nettacker/modules/vuln/forgerock_am_cve_2021_35464.yaml +++ b/nettacker/modules/vuln/forgerock_am_cve_2021_35464.yaml @@ -7,7 +7,6 @@ info: - https://portswigger.net/research/pre-auth-rce-in-forgerock-openam-cve-2021-35464 profiles: - vuln - - vulnerability - http - critical_severity - cve2021 diff --git a/nettacker/modules/vuln/galera_webtemp_cve_2021_40960.yaml b/nettacker/modules/vuln/galera_webtemp_cve_2021_40960.yaml index 9799832f..ef7ef9b0 100644 --- a/nettacker/modules/vuln/galera_webtemp_cve_2021_40960.yaml +++ b/nettacker/modules/vuln/galera_webtemp_cve_2021_40960.yaml @@ -8,7 +8,6 @@ info: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40960 profiles: - vuln - - vulnerability - http - high_severity - cve2021 diff --git a/nettacker/modules/vuln/grafana_cve_2021_43798.yaml b/nettacker/modules/vuln/grafana_cve_2021_43798.yaml index 798a927b..9212c70f 100644 --- a/nettacker/modules/vuln/grafana_cve_2021_43798.yaml +++ b/nettacker/modules/vuln/grafana_cve_2021_43798.yaml @@ -8,7 +8,6 @@ info: - https://github.com/jas502n/Grafana-VulnTips profiles: - vuln - - vulnerability - http - critical_severity - grafana diff --git a/nettacker/modules/vuln/graphql.yaml b/nettacker/modules/vuln/graphql.yaml index e6e8c7c4..2ddfddab 100644 --- a/nettacker/modules/vuln/graphql.yaml +++ b/nettacker/modules/vuln/graphql.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - vuln - - information_gathering - http - low_severity - graphql diff --git a/nettacker/modules/vuln/gurock_testrail_cve_2021_40875.yaml b/nettacker/modules/vuln/gurock_testrail_cve_2021_40875.yaml index ef0a1021..16cc920e 100644 --- a/nettacker/modules/vuln/gurock_testrail_cve_2021_40875.yaml +++ b/nettacker/modules/vuln/gurock_testrail_cve_2021_40875.yaml @@ -8,7 +8,6 @@ info: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40875 profiles: - vuln - - vulnerability - http - medium_severity - cve2021 diff --git a/nettacker/modules/vuln/hoteldruid_cve_2021-37833.yaml b/nettacker/modules/vuln/hoteldruid_cve_2021-37833.yaml index 9a8cd665..638931c1 100644 --- a/nettacker/modules/vuln/hoteldruid_cve_2021-37833.yaml +++ b/nettacker/modules/vuln/hoteldruid_cve_2021-37833.yaml @@ -8,7 +8,6 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-37833 profiles: - vuln - - vulnerability - http - medium_severity - cve2021 diff --git a/nettacker/modules/vuln/http_cookie.yaml b/nettacker/modules/vuln/http_cookie.yaml index 8cd2b60f..e1202a2e 100644 --- a/nettacker/modules/vuln/http_cookie.yaml +++ b/nettacker/modules/vuln/http_cookie.yaml @@ -8,7 +8,6 @@ info: - https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html profiles: - vuln - - vulnerability - http - low_severity diff --git a/nettacker/modules/vuln/http_cors.yaml b/nettacker/modules/vuln/http_cors.yaml index be23afcb..d116f363 100644 --- a/nettacker/modules/vuln/http_cors.yaml +++ b/nettacker/modules/vuln/http_cors.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - vuln - - vulnerability - http - low_severity diff --git a/nettacker/modules/vuln/http_options_enabled.yaml b/nettacker/modules/vuln/http_options_enabled.yaml index 8c31cf23..addc6d3e 100644 --- a/nettacker/modules/vuln/http_options_enabled.yaml +++ b/nettacker/modules/vuln/http_options_enabled.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - vuln - - vulnerability - http - low_severity diff --git a/nettacker/modules/vuln/ivanti_epmm_cve_2023_35082.yaml b/nettacker/modules/vuln/ivanti_epmm_cve_2023_35082.yaml index 6ed6501e..41b88857 100644 --- a/nettacker/modules/vuln/ivanti_epmm_cve_2023_35082.yaml +++ b/nettacker/modules/vuln/ivanti_epmm_cve_2023_35082.yaml @@ -10,7 +10,6 @@ info: - https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/ profiles: - vuln - - vulnerability - http - high_severity - cve diff --git a/nettacker/modules/vuln/ivanti_ics_cve_2023_46805.yaml b/nettacker/modules/vuln/ivanti_ics_cve_2023_46805.yaml index 15433c60..f829af52 100644 --- a/nettacker/modules/vuln/ivanti_ics_cve_2023_46805.yaml +++ b/nettacker/modules/vuln/ivanti_ics_cve_2023_46805.yaml @@ -8,7 +8,6 @@ info: - https://labs.watchtowr.com/welcome-to-2024-the-sslvpn-chaos-continues-ivanti-cve-2023-46805-cve-2024-21887 profiles: - vuln - - vulnerability - http - high_severity - cve diff --git a/nettacker/modules/vuln/justwirting_cve_2021_41878.yaml b/nettacker/modules/vuln/justwirting_cve_2021_41878.yaml index 333474b1..25bb2dc5 100644 --- a/nettacker/modules/vuln/justwirting_cve_2021_41878.yaml +++ b/nettacker/modules/vuln/justwirting_cve_2021_41878.yaml @@ -8,7 +8,6 @@ info: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41878 profiles: - vuln - - vulnerability - http - medium_severity - cve2021 diff --git a/nettacker/modules/vuln/log4j_cve_2021_44228.yaml b/nettacker/modules/vuln/log4j_cve_2021_44228.yaml index eec34b72..165731ed 100644 --- a/nettacker/modules/vuln/log4j_cve_2021_44228.yaml +++ b/nettacker/modules/vuln/log4j_cve_2021_44228.yaml @@ -8,7 +8,6 @@ info: - https://github.com/huntresslabs/log4shell-tester profiles: - vuln - - vulnerability - http - critical_severity - cve2021 diff --git a/nettacker/modules/vuln/maxsite_cms_cve_2021_35265.yaml b/nettacker/modules/vuln/maxsite_cms_cve_2021_35265.yaml index 722416be..3b6c6101 100644 --- a/nettacker/modules/vuln/maxsite_cms_cve_2021_35265.yaml +++ b/nettacker/modules/vuln/maxsite_cms_cve_2021_35265.yaml @@ -8,7 +8,6 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-35265 profiles: - vuln - - vulnerability - http - medium_severity - cve2021 diff --git a/nettacker/modules/vuln/msexchange_cve_2021_26855.yaml b/nettacker/modules/vuln/msexchange_cve_2021_26855.yaml index 69871d0e..54f5e5ae 100644 --- a/nettacker/modules/vuln/msexchange_cve_2021_26855.yaml +++ b/nettacker/modules/vuln/msexchange_cve_2021_26855.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - vuln - - vulnerability - http - critical_severity - msexchange diff --git a/nettacker/modules/vuln/msexchange_cve_2021_34473.yaml b/nettacker/modules/vuln/msexchange_cve_2021_34473.yaml index 31f5638a..f688dae9 100644 --- a/nettacker/modules/vuln/msexchange_cve_2021_34473.yaml +++ b/nettacker/modules/vuln/msexchange_cve_2021_34473.yaml @@ -8,7 +8,6 @@ info: - https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html profiles: - vuln - - vulnerability - http - critical_severity - msexchange diff --git a/nettacker/modules/vuln/novnc_cve_2021_3654.yaml b/nettacker/modules/vuln/novnc_cve_2021_3654.yaml index d788a062..6919fd21 100644 --- a/nettacker/modules/vuln/novnc_cve_2021_3654.yaml +++ b/nettacker/modules/vuln/novnc_cve_2021_3654.yaml @@ -8,7 +8,6 @@ info: - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3654 profiles: - vuln - - vulnerability - http - low_severity - cve2021 diff --git a/nettacker/modules/vuln/omigod_cve_2021_38647.yaml b/nettacker/modules/vuln/omigod_cve_2021_38647.yaml index bd068c36..50921910 100644 --- a/nettacker/modules/vuln/omigod_cve_2021_38647.yaml +++ b/nettacker/modules/vuln/omigod_cve_2021_38647.yaml @@ -8,7 +8,6 @@ info: - https://github.com/microsoft/omi profiles: - vuln - - vulnerability - http - critical_severity - cve2021 diff --git a/nettacker/modules/vuln/paloalto_panos_cve_2025_0108.yaml b/nettacker/modules/vuln/paloalto_panos_cve_2025_0108.yaml index 9acc975e..5064b485 100644 --- a/nettacker/modules/vuln/paloalto_panos_cve_2025_0108.yaml +++ b/nettacker/modules/vuln/paloalto_panos_cve_2025_0108.yaml @@ -10,7 +10,6 @@ info: - https://thehackernews.com/2025/02/cisa-adds-palo-alto-networks-and.html profiles: - vuln - - vulnerability - http - high_severity - cve diff --git a/nettacker/modules/vuln/payara_cve_2021_41381.yaml b/nettacker/modules/vuln/payara_cve_2021_41381.yaml index 1b5fc0e0..38dbf042 100644 --- a/nettacker/modules/vuln/payara_cve_2021_41381.yaml +++ b/nettacker/modules/vuln/payara_cve_2021_41381.yaml @@ -8,7 +8,6 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-41381 profiles: - vuln - - vulnerability - http - medium_severity - cve2021 diff --git a/nettacker/modules/vuln/phpinfo_cve_2021_37704.yaml b/nettacker/modules/vuln/phpinfo_cve_2021_37704.yaml index 89fb2079..c19294cc 100644 --- a/nettacker/modules/vuln/phpinfo_cve_2021_37704.yaml +++ b/nettacker/modules/vuln/phpinfo_cve_2021_37704.yaml @@ -8,7 +8,6 @@ info: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37704 profiles: - vuln - - vulnerability - http - medium_severity - cve2021 diff --git a/nettacker/modules/vuln/placeos_cve_2021_41826.yaml b/nettacker/modules/vuln/placeos_cve_2021_41826.yaml index 8f97183b..bba02912 100644 --- a/nettacker/modules/vuln/placeos_cve_2021_41826.yaml +++ b/nettacker/modules/vuln/placeos_cve_2021_41826.yaml @@ -8,7 +8,6 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-41826 profiles: - vuln - - vulnerability - http - low_severity - cve2021 diff --git a/nettacker/modules/vuln/prestashop_cve_2021_37538.yaml b/nettacker/modules/vuln/prestashop_cve_2021_37538.yaml index d1add746..9b8e8b2a 100644 --- a/nettacker/modules/vuln/prestashop_cve_2021_37538.yaml +++ b/nettacker/modules/vuln/prestashop_cve_2021_37538.yaml @@ -8,7 +8,6 @@ info: - https://blog.sorcery.ie/posts/smartblog_sqli/ profiles: - vuln - - vulnerability - http - critical_severity - cve2021 diff --git a/nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41648.yaml b/nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41648.yaml index d67f15d8..7d32ee15 100644 --- a/nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41648.yaml +++ b/nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41648.yaml @@ -7,12 +7,10 @@ info: - https://github.com/MobiusBinary/CVE-2021-41648 profiles: - vuln - - vulnerability - http - high_severity - cve2021 - cve - - puneethreddyhc - sqli payloads: diff --git a/nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41649.yaml b/nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41649.yaml index 77831bf2..6c46cb91 100644 --- a/nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41649.yaml +++ b/nettacker/modules/vuln/puneethreddyhc_sqli_cve_2021_41649.yaml @@ -7,12 +7,10 @@ info: - https://github.com/MobiusBinary/CVE-2021-41649 profiles: - vuln - - vulnerability - http - high_severity - cve2021 - cve - - puneethreddyhc - sqli payloads: diff --git a/nettacker/modules/vuln/qsan_storage_xss_cve_2021_37216.yaml b/nettacker/modules/vuln/qsan_storage_xss_cve_2021_37216.yaml index 6b1481f6..33d865f0 100644 --- a/nettacker/modules/vuln/qsan_storage_xss_cve_2021_37216.yaml +++ b/nettacker/modules/vuln/qsan_storage_xss_cve_2021_37216.yaml @@ -7,7 +7,6 @@ info: - https://www.twcert.org.tw/tw/cp-132-4962-44cd2-1.html profiles: - vuln - - vulnerability - http - medium_severity - cve2021 diff --git a/nettacker/modules/vuln/server_version.yaml b/nettacker/modules/vuln/server_version.yaml index d9bed2dc..fa919ed1 100644 --- a/nettacker/modules/vuln/server_version.yaml +++ b/nettacker/modules/vuln/server_version.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - vuln - - vulnerability - http - low_severity diff --git a/nettacker/modules/vuln/sonicwall_sslvpn_cve_2024_53704.yaml b/nettacker/modules/vuln/sonicwall_sslvpn_cve_2024_53704.yaml index dbc057dc..e4430faf 100644 --- a/nettacker/modules/vuln/sonicwall_sslvpn_cve_2024_53704.yaml +++ b/nettacker/modules/vuln/sonicwall_sslvpn_cve_2024_53704.yaml @@ -9,7 +9,6 @@ info: - https://www.cisa.gov/news-events/alerts/2025/02/18/cisa-adds-two-known-exploited-vulnerabilities-catalog profiles: - vuln - - vulnerability - http - high_severity - cve diff --git a/nettacker/modules/vuln/strict_transport_security.yaml b/nettacker/modules/vuln/strict_transport_security.yaml index 4ac71af7..f404b8f7 100644 --- a/nettacker/modules/vuln/strict_transport_security.yaml +++ b/nettacker/modules/vuln/strict_transport_security.yaml @@ -8,7 +8,6 @@ info: - https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/02-Configuration_and_Deployment_Management_Testing/07-Test_HTTP_Strict_Transport_Security profiles: - vuln - - vulnerability - http - low_severity diff --git a/nettacker/modules/vuln/subdomain_takeover.yaml b/nettacker/modules/vuln/subdomain_takeover.yaml index 4b8cf50a..e05eb814 100644 --- a/nettacker/modules/vuln/subdomain_takeover.yaml +++ b/nettacker/modules/vuln/subdomain_takeover.yaml @@ -6,7 +6,6 @@ info: reference: "https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/02-Configuration_and_Deployment_Management_Testing/10-Test_for_Subdomain_Takeover" profiles: - vuln - - vulnerability - http - medium_severity - takeover diff --git a/nettacker/modules/vuln/teamcity_cve_2024_27198.yaml b/nettacker/modules/vuln/teamcity_cve_2024_27198.yaml index 3e84590f..79fbe20a 100644 --- a/nettacker/modules/vuln/teamcity_cve_2024_27198.yaml +++ b/nettacker/modules/vuln/teamcity_cve_2024_27198.yaml @@ -10,7 +10,6 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2024-27198 profiles: - vuln - - vulnerability - http - critical_severity - cve diff --git a/nettacker/modules/vuln/tieline_cve_2021_35336.yaml b/nettacker/modules/vuln/tieline_cve_2021_35336.yaml index c5f31e5b..1dfa45a8 100644 --- a/nettacker/modules/vuln/tieline_cve_2021_35336.yaml +++ b/nettacker/modules/vuln/tieline_cve_2021_35336.yaml @@ -8,7 +8,6 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-35336 profiles: - vuln - - vulnerability - http - critical_severity - cve2021 diff --git a/nettacker/modules/vuln/tjws_cve_2021_37573.yaml b/nettacker/modules/vuln/tjws_cve_2021_37573.yaml index a7a829ee..ab7f524c 100644 --- a/nettacker/modules/vuln/tjws_cve_2021_37573.yaml +++ b/nettacker/modules/vuln/tjws_cve_2021_37573.yaml @@ -7,7 +7,6 @@ info: - https://seclists.org/fulldisclosure/2021/Aug/13 profiles: - vuln - - vulnerability - http - medium_severity - cve2021 diff --git a/nettacker/modules/vuln/vbulletin_cve_2019_16759.yaml b/nettacker/modules/vuln/vbulletin_cve_2019_16759.yaml index fbd15d12..886a3d3e 100644 --- a/nettacker/modules/vuln/vbulletin_cve_2019_16759.yaml +++ b/nettacker/modules/vuln/vbulletin_cve_2019_16759.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - vuln - - vulnerability - http - critical_severity - vbulletin diff --git a/nettacker/modules/vuln/wp_plugin_cve_2021_38314.yaml b/nettacker/modules/vuln/wp_plugin_cve_2021_38314.yaml index 6f2bed84..6b2c22f4 100644 --- a/nettacker/modules/vuln/wp_plugin_cve_2021_38314.yaml +++ b/nettacker/modules/vuln/wp_plugin_cve_2021_38314.yaml @@ -8,7 +8,6 @@ info: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38314 profiles: - vuln - - vulnerability - http - high_severity - cve2021 diff --git a/nettacker/modules/vuln/wp_plugin_cve_2021_39316.yaml b/nettacker/modules/vuln/wp_plugin_cve_2021_39316.yaml index a0898b22..5132227e 100644 --- a/nettacker/modules/vuln/wp_plugin_cve_2021_39316.yaml +++ b/nettacker/modules/vuln/wp_plugin_cve_2021_39316.yaml @@ -8,7 +8,6 @@ info: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39316 profiles: - vuln - - vulnerability - http - high_severity - cve2021 diff --git a/nettacker/modules/vuln/wp_plugin_cve_2021_39320.yaml b/nettacker/modules/vuln/wp_plugin_cve_2021_39320.yaml index 24fade82..d5554c1d 100644 --- a/nettacker/modules/vuln/wp_plugin_cve_2021_39320.yaml +++ b/nettacker/modules/vuln/wp_plugin_cve_2021_39320.yaml @@ -8,7 +8,6 @@ info: - https://nvd.nist.gov/vuln/detail/CVE-2021-39320 profiles: - vuln - - vulnerability - http - medium_severity - cve2021 diff --git a/nettacker/modules/vuln/wp_plugin_cve_2023_47668.yaml b/nettacker/modules/vuln/wp_plugin_cve_2023_47668.yaml index faa4dd6b..85d4bc5c 100644 --- a/nettacker/modules/vuln/wp_plugin_cve_2023_47668.yaml +++ b/nettacker/modules/vuln/wp_plugin_cve_2023_47668.yaml @@ -9,11 +9,9 @@ info: profiles: - vuln - - vulnerability - http - medium_severity - wordpress - - wp payloads: - library: http diff --git a/nettacker/modules/vuln/wp_plugin_cve_2023_6875.yaml b/nettacker/modules/vuln/wp_plugin_cve_2023_6875.yaml index 30cf3bcc..07e1347f 100644 --- a/nettacker/modules/vuln/wp_plugin_cve_2023_6875.yaml +++ b/nettacker/modules/vuln/wp_plugin_cve_2023_6875.yaml @@ -9,7 +9,6 @@ info: - https://www.cve.org/CVERecord?id=CVE-2023-6875 profiles: - vuln - - vulnerability - http - critical_severity - cve2023 diff --git a/nettacker/modules/vuln/wp_xmlrpc_bruteforce.yaml b/nettacker/modules/vuln/wp_xmlrpc_bruteforce.yaml index dec2e5ef..8de6ec0c 100644 --- a/nettacker/modules/vuln/wp_xmlrpc_bruteforce.yaml +++ b/nettacker/modules/vuln/wp_xmlrpc_bruteforce.yaml @@ -6,11 +6,9 @@ info: reference: profiles: - vuln - - vulnerability - http - low_severity - wordpress - - wp payloads: - library: http diff --git a/nettacker/modules/vuln/wp_xmlrpc_dos.yaml b/nettacker/modules/vuln/wp_xmlrpc_dos.yaml index ea60fe42..ea12fde9 100644 --- a/nettacker/modules/vuln/wp_xmlrpc_dos.yaml +++ b/nettacker/modules/vuln/wp_xmlrpc_dos.yaml @@ -6,10 +6,8 @@ info: reference: profiles: - vuln - - vulnerability - http - wordpress - - wp payloads: - library: http diff --git a/nettacker/modules/vuln/wp_xmlrpc_pingback.yaml b/nettacker/modules/vuln/wp_xmlrpc_pingback.yaml index 0254bfb6..4564895c 100644 --- a/nettacker/modules/vuln/wp_xmlrpc_pingback.yaml +++ b/nettacker/modules/vuln/wp_xmlrpc_pingback.yaml @@ -6,10 +6,8 @@ info: reference: profiles: - vuln - - vulnerability - http - wordpress - - wp payloads: - library: http diff --git a/nettacker/modules/vuln/x_powered_by.yaml b/nettacker/modules/vuln/x_powered_by.yaml index 296f6956..ab5b9e0f 100644 --- a/nettacker/modules/vuln/x_powered_by.yaml +++ b/nettacker/modules/vuln/x_powered_by.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - vuln - - vulnerability - http - low_severity diff --git a/nettacker/modules/vuln/x_xss_protection.yaml b/nettacker/modules/vuln/x_xss_protection.yaml index c1b3079f..1c819aad 100644 --- a/nettacker/modules/vuln/x_xss_protection.yaml +++ b/nettacker/modules/vuln/x_xss_protection.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - vuln - - vulnerability - http - low_severity diff --git a/nettacker/modules/vuln/xdebug_rce.yaml b/nettacker/modules/vuln/xdebug_rce.yaml index 2ea4920a..3cf9718b 100644 --- a/nettacker/modules/vuln/xdebug_rce.yaml +++ b/nettacker/modules/vuln/xdebug_rce.yaml @@ -6,7 +6,6 @@ info: reference: profiles: - vuln - - vulnerability - http - critical_severity - rce diff --git a/nettacker/modules/vuln/zoho_cve_2021_40539.yaml b/nettacker/modules/vuln/zoho_cve_2021_40539.yaml index f97e268f..4ab9d5ae 100644 --- a/nettacker/modules/vuln/zoho_cve_2021_40539.yaml +++ b/nettacker/modules/vuln/zoho_cve_2021_40539.yaml @@ -8,7 +8,6 @@ info: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40539 profiles: - vuln - - vulnerability - http - critical_severity - cve2021