Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Acunetix Login Panel - Detect

By kannthu

Informative
Vidoc logoVidoc Module
#panel#acunetix
Description

What is the "Acunetix Login Panel - Detect?"

The "Acunetix Login Panel - Detect" module is designed to detect the presence of the Acunetix login panel. Acunetix is a web vulnerability scanner used to identify security flaws in web applications. This module focuses specifically on detecting the login panel, which can provide valuable information about the target application's security posture.

This module has an informative severity level, meaning it provides valuable information but does not indicate a direct vulnerability or misconfiguration.

Author: tess

Impact

The impact of detecting the Acunetix login panel is primarily informational. It indicates that the target application is using Acunetix as a web vulnerability scanner. This information can be useful for security professionals and researchers to understand the security measures implemented by the target application.

How does the module work?

The module works by sending an HTTP GET request to the "/#/login" path of the target application. It then applies a series of matching conditions to determine if the Acunetix login panel is present.

The matching conditions include:

- Checking the response body for the presence of the "<title>Acunetix</title>" and "assets/images/invicti-acunetix-logo.svg" strings. - Verifying that the response header contains the "text/html" content type. - Ensuring that the response status code is 200 (OK).

If all of these conditions are met, the module considers the Acunetix login panel to be detected.

Example HTTP request:

GET /#/login

Note: The above example is a simplified representation of the HTTP request and does not include headers or other details.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/#/login
Matching conditions
word: <title>Acunetix</title>, assets/images/i...and
word: text/htmland
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability