Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Persis Panel - Detect

By kannthu

Informative
Vidoc logoVidoc Module
#panel#persis
Description

What is the "Persis Panel - Detect" module?

The "Persis Panel - Detect" module is designed to detect the presence of the Persis panel software. The Persis panel is a web-based interface used for managing and controlling various aspects of a system. This module focuses on identifying instances of the Persis panel and provides information about its configuration and vulnerabilities.

This module has an informative severity level, which means it provides valuable insights and information about the detected software without indicating any immediate threats or risks.

This module was authored by righettod.

Impact

The impact of the Persis panel software depends on its specific configuration and usage within a system. As a management interface, it can potentially expose sensitive information or provide unauthorized access to system resources if not properly secured or configured.

How does the module work?

The "Persis Panel - Detect" module works by sending HTTP requests to the target system and analyzing the responses based on predefined matching conditions. It checks for specific patterns in the response body and verifies the HTTP status codes to determine if the Persis panel is present.

For example, one of the matching conditions checks if the response body contains the following keywords: "<title>Persis</title>", "/persis/", "persis.require", "persis.ui.progress", or "images_persis/". Additionally, it verifies that the HTTP status code is either 200, 301, or 302.

By analyzing the responses and matching conditions, the module can accurately detect the presence of the Persis panel software.

For more information about the Persis panel, you can visit their official website: https://www.persis.de/

Metadata:

- max-request: 2

- verified: true

- shodan-query: title:"Persis"

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/main
Matching conditions
word: <title>Persis</title>, /persis/, persis....and
status: 200, 301, 302
Passive global matcher
No matching conditions.
On match action
Report vulnerability