Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place takeover detection

By kannthu

Vidoc logoVidoc Module

What is the " takeover detection?"

The " takeover detection" module is designed to detect potential misconfigurations in the software. is a URL shortening service that allows users to create shortened links for sharing. This module focuses on identifying any vulnerabilities or misconfigurations that could potentially lead to a takeover of the domain.

This module has a severity level of high, indicating that any detected vulnerabilities or misconfigurations could have a significant impact on the security and functionality of the platform.

This module was authored by philippedelteil.


If a takeover vulnerability or misconfiguration is detected in the software, it could allow unauthorized individuals to gain control over the domain. This could potentially lead to the manipulation of shortened links, unauthorized access to user data, or other malicious activities.

How does the module work?

The " takeover detection" module works by analyzing the response received from the software and applying specific matching conditions. It checks for the presence of certain indicators that suggest a potential takeover vulnerability or misconfiguration.

One of the matching conditions used by this module is to verify that the host is not an IP address, indicating that the domain is properly configured. Additionally, it checks for the absence of specific phrases such as "Link does not exist" or "This domain is not configured on," which could indicate a misconfiguration.

By combining these matching conditions, the module can identify potential takeover vulnerabilities or misconfigurations in the software.

Here is an example of an HTTP request that the module might send:

GET / HTTP/1.1

This request is used to retrieve the homepage of the domain and analyze the response for any indicators of a takeover vulnerability or misconfiguration.

Module preview

Concurrent Requests (0)
Passive global matcher
dsl: Host != ipand
word: Link does not exist, This domain is not ...
On match action
Report vulnerability