Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Hanming Video Conferencing - Local File Inclusion

By kannthu

Vidoc logoVidoc Module

What is "Hanming Video Conferencing - Local File Inclusion?"

The "Hanming Video Conferencing - Local File Inclusion" module is designed to detect vulnerabilities related to local file inclusion in the Hanming Video Conferencing software. This module focuses on identifying misconfigurations or vulnerabilities that could potentially allow an attacker to include and execute arbitrary files on the target system. The severity of this vulnerability is classified as high, indicating the potential for significant impact if exploited.

This module was authored by ritikchaddha.


A successful exploitation of the local file inclusion vulnerability in Hanming Video Conferencing could allow an attacker to access sensitive files on the target system. This could potentially lead to unauthorized disclosure of sensitive information, unauthorized access to system resources, or even remote code execution.

How the module works?

The "Hanming Video Conferencing - Local File Inclusion" module works by sending specific HTTP requests to the target system and analyzing the responses for matching conditions. It checks for the presence of certain keywords in the response body, such as "bit app support," "fonts," and "extensions." Additionally, it uses regular expressions to search for specific patterns, such as the presence of "root:[x*]:0:0:" in any part of the response.

Here is an example of an HTTP request used by this module:

GET /register/

If the response from the target system matches any of the defined conditions, the module will report a vulnerability.

Note: This description is generated for SEO purposes and provides technical information about the "Hanming Video Conferencing - Local File Inclusion" module. It aims to inform both technical and non-technical individuals about the purpose, impact, and functionality of the module.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: bit app support, fonts, extensionsor
regex: root:[x*]:0:0:
Passive global matcher
No matching conditions.
On match action
Report vulnerability