Network
Nuclei can act as an automatable Netcat, allowing users to send bytes across the wire and receive them, while providing matching and extracting capabilities on the response.
Network Requests start with a network block which specifies the start of the requests for the template.
Inputs
First thing in the request is inputs. Inputs are the data that will be sent to the server, and optionally any data to read from the server.
At it’s most simple, just specify a string, and it will be sent across the network socket.
You can also send hex encoded text that will be first decoded and the raw bytes will be sent to the server.
Helper function expressions can also be defined in input and will be first evaluated and then sent to the server. The last Hex Encoded example can be sent with helper functions this way -
One last thing that can be done with inputs is reading data from the socket. Specifying read-size
with a non-zero value will do the trick. You can also assign the read data some name, so matching can be done on that part.
Example with reading a number of bytes, and only matching on them.
Multiple steps can be chained together in sequence to do network reading / writing.
Host
The next part of the requests is the host to connect to. Dynamic variables can be placed in the path to modify its value on runtime. Variables start with {{
and end with }}
and are case-sensitive.
- Hostname - variable is replaced by the hostname provided on command line.
An example name value:
Nuclei can also do TLS connection to the target server. Just add tls://
as prefix before the Hostname and you’re good to go.
If a port is specified in the host, the user supplied port is ignored and the template port takes precedence.
Port
Starting from Nuclei v2.9.15, a new field called port
has been introduced in network templates. This field allows users to specify the port separately instead of including it in the host field.
Previously, if you wanted to write a network template for an exploit targeting SSH, you would have to specify both the hostname and the port in the host field, like this:
In the above example, two network requests are sent: one to the port specified in the input/target, and another to the default SSH port (22).
The reason behind introducing the port field is to provide users with more flexibility when running network templates on both default and non-default ports. For example, if a user knows that the SSH service is running on a non-default port of 2222 (after performing a port scan with service discovery), they can simply run:
In this case, Nuclei will use port 2222 instead of the default port 22. If the user doesn’t specify any port in the input, port 22 will be used by default. However, this approach may not be straightforward to understand and can generate warnings in logs since one request is expected to fail.
Another issue with the previous design of writing network templates is that requests can be sent to unexpected ports. For example, if a web service is running on port 8443 and the user runs:
In this case, xyz-ssh-exploit
template will send one request to scanme.sh:22
and another request to scanme.sh:8443
, which may return unexpected responses and eventually result in errors. This is particularly problematic in automation scenarios.
To address these issues while maintaining the existing functionality, network templates can now be written in the following way:
In this new design, the functionality to run templates on non-standard ports will still exist, except for the default reserved ports (80
, 443
, 8080
, 8443
, 8081
, 53
). Additionally, the list of default reserved ports can be customized by adding a new field called exclude-ports:
When exclude-ports
is used, the default reserved ports list will be overwritten. This means that if you want to run a network template on port 80
, you will have to explicitly specify it in the port field.
Matchers / Extractor Parts
Valid part
values supported by Network protocol for Matchers / Extractor are -
Value | Description |
---|---|
request | Network Request |
data | Final Data Read From Network Socket |
raw / body / all | All Data received from Socket |
Example Network Template
The final example template file for a hex
encoded input to detect MongoDB running on servers with working matchers is provided below.
More complete examples are provided here.