Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Atvise Login Panel

By kannthu

Informative
Vidoc logoVidoc Module
#panel#atvise#edb
Description

What is the "Atvise Login Panel"?

The "Atvise Login Panel" module is a test case designed to detect the presence of an Atvise login panel. Atvise is a leading visualization and control center solution based on pure web technology. This module targets the Atvise software and aims to identify any misconfigurations or vulnerabilities related to the login panel.

This module has an informative severity level, which means it provides valuable information without indicating a critical security issue.

Impact

The "Atvise Login Panel" module does not have a direct impact on the system. Instead, it helps identify potential security weaknesses or misconfigurations in the Atvise login panel, which could be exploited by attackers to gain unauthorized access or perform malicious activities.

How the module works?

The "Atvise Login Panel" module works by sending HTTP requests to the target system and analyzing the responses based on predefined matching conditions. It checks for the presence of the "" string in the response body and verifies that the HTTP status code is 200 (OK).

By detecting these specific conditions, the module can determine if the Atvise login panel is properly configured and functioning as expected. If any issues or vulnerabilities are found, the module will report them as part of the scanning process.

Here is an example of an HTTP request sent by the module:

GET / HTTP/1.1
Host: example.com
User-Agent: Vidoc-Scanner/1.0

The module's matching conditions are:

- The response body must contain the "" string. - The HTTP status code must be 200 (OK).

If both conditions are met, the module considers the Atvise login panel to be present and properly configured.

Module preview

Concurrent Requests (0)
Passive global matcher
word: <title>atvise - next generation</title>and
status: 200
On match action
Report vulnerability