Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Monstra Admin Panel - Detect

By kannthu

Informative
Vidoc logoVidoc Module
#panel#monstra
Description

What is the "Monstra Admin Panel - Detect" module?

The "Monstra Admin Panel - Detect" module is a test case designed to detect the presence of the Monstra admin panel. Monstra is a content management system (CMS) that allows users to create and manage websites. This module specifically targets the admin panel of Monstra.

The severity of this module is classified as informative, meaning it provides information about the presence of the admin panel but does not indicate any specific vulnerabilities or misconfigurations.

This module was authored by ritikchaddha.

Impact

The impact of detecting the Monstra admin panel is primarily informational. It indicates that the admin panel is accessible and can be used to manage the Monstra CMS.

How does the module work?

The "Monstra Admin Panel - Detect" module works by sending an HTTP GET request to the "/admin/index.php" path of the target website. It then applies two matching conditions to determine if the Monstra admin panel is present:

    - The module checks the response body for the presence of the string "content="Monstra Admin Area". If this string is found, it indicates that the Monstra admin panel is present. - The module also checks the HTTP response status code. It expects a status code of 200, indicating a successful response. If the status code is different, the module will not consider the admin panel as detected.

By combining these matching conditions, the module can accurately detect the presence of the Monstra admin panel.

For example, the module sends an HTTP GET request to "/admin/index.php" and expects a response with a status code of 200. It then checks the response body for the presence of the string "content="Monstra Admin Area". If both conditions are met, the module reports the detection of the Monstra admin panel.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/admin/index.php
Matching conditions
word: content="Monstra Admin Areaand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability