Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

FatPipe WARP - Panel Detect

By kannthu

Informative
Vidoc logoVidoc Module
#tech#fatpipe#panel
Description

What is the "FatPipe WARP - Panel Detect?"

The "FatPipe WARP - Panel Detect" module is designed to detect the presence of the FatPipe WARP administration panel. FatPipe WARP is a software solution that provides wide area network (WAN) optimization and security capabilities. This module focuses on identifying the administration panel, which is used for managing and configuring the FatPipe WARP system.

This module has an informative severity level, meaning it provides valuable information but does not indicate a critical vulnerability or misconfiguration.

This module was authored by princechaddha.

Impact

The impact of detecting the FatPipe WARP administration panel is primarily informational. It helps security professionals and administrators identify the presence of the panel, which can be useful for assessing the overall security posture of the FatPipe WARP system.

How does the module work?

The "FatPipe WARP - Panel Detect" module works by sending an HTTP GET request to the "/fpui/jsp/login.jsp" path of the target system. It then applies two matching conditions to determine if the FatPipe WARP administration panel is present:

    - The module checks if the response body contains the HTML title tag "<title>FatPipe WARP | Log in</title>". This indicates that the login page for the administration panel is present. - The module verifies that the HTTP response status code is 200, indicating a successful request.

If both matching conditions are met, the module reports a successful detection of the FatPipe WARP administration panel.

For more information about FatPipe WARP, you can visit their official website.

Metadata: max-request: 1

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/fpui/jsp/login.jsp
Matching conditions
word: <title>FatPipe WARP&nbsp;| Log in</title...and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability