Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

NETGEAR Router Panel - Detect

By kannthu

Informative
Vidoc logoVidoc Module
#panel#router#netgear
Description

NETGEAR Router Panel - Detect

What is the "NETGEAR Router Panel - Detect?"

The "NETGEAR Router Panel - Detect" module is designed to detect the presence of a NETGEAR router panel. It is a test case that can be used to identify misconfigurations, vulnerabilities, or specific software related to NETGEAR routers. This module has an informative severity level, meaning it provides valuable information without actively exploiting any vulnerabilities. The original author of this module is not specified.

Impact

This module does not have any direct impact on the target system. It is purely a detection module and does not perform any actions that could cause harm or compromise the system.

How the module works?

The "NETGEAR Router Panel - Detect" module works by sending an HTTP GET request to the "/currentsetting.htm" path of the target NETGEAR router. It then applies matching conditions to determine if the router panel is present. The matching conditions include checking the HTTP response status code, which should be 200, and using a regular expression to match specific patterns in the response body.

For example, the regular expression used in this module matches patterns that start with any of the following: "ReadyShareSupportedLevel", "RegionTag", "InternetConnectionStatus", "SOAPVersion", "Firmware", "Model", "Region", "LoginMethod", or "ParentalControlSupported". If any of these patterns are found in the response body, it indicates the presence of the NETGEAR router panel.

It's important to note that this module does not perform any actions beyond the detection process. It simply provides information about the presence of the router panel.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/currentsetting.htm
Matching conditions
status: 200and
regex: ^((((Re(adyShareSupportedLevel|gionTag)|...
Passive global matcher
No matching conditions.
On match action
Report vulnerability