Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Canny Takeover Detection

By kannthu

Vidoc logoVidoc Module

What is the "Canny Takeover Detection?"

The "Canny Takeover Detection" module is designed to detect potential takeover vulnerabilities in a specific software. It focuses on identifying misconfigurations or vulnerabilities that could allow an attacker to gain unauthorized control over the targeted system. This module has a high severity level, indicating the potential impact of a successful takeover.

This module was authored by pdteam.


A successful takeover of the targeted software can lead to severe consequences, including unauthorized access, data breaches, and potential disruption of services. It is crucial to address any identified vulnerabilities promptly to prevent potential exploitation by malicious actors.

How does the module work?

The "Canny Takeover Detection" module utilizes HTTP request templates and matching conditions to identify potential takeover vulnerabilities. It performs specific checks against the targeted software to detect any signs of misconfiguration or vulnerability.

While the exact details of the module's implementation are not provided, it is likely that it sends HTTP requests to the target system and analyzes the responses for specific patterns or indicators of a takeover vulnerability.

For example, the module may check if the response contains phrases such as "Company Not Found" or "There is no such company. Did you enter the right URL?" to identify potential misconfigurations or vulnerabilities.

It is important to note that the module's functionality is based on the provided JSON definition, which includes the matching conditions and other relevant parameters.

For more information about the module, you can refer to the reference.

The maximum number of requests made by this module is limited to 1.

Module preview

Concurrent Requests (0)
Passive global matcher
dsl: Host != ipand
word: Company Not Found, There is no such comp...
On match action
Report vulnerability