Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Strikingly Takeover Detection

By kannthu

Vidoc logoVidoc Module

What is the "Strikingly Takeover Detection?"

The "Strikingly Takeover Detection" module is designed to detect potential takeover vulnerabilities in websites built using the Strikingly platform. Strikingly is a website builder that allows users to create their own websites without coding knowledge. This module focuses on identifying misconfigurations or vulnerabilities that could potentially lead to a takeover of the website.

This module has a severity level of high, indicating that the identified vulnerabilities can have a significant impact on the security and functionality of the affected websites.

This module was authored by pdteam.


A successful takeover of a website built using the Strikingly platform can result in unauthorized access, defacement, or complete control of the website by an attacker. This can lead to the compromise of sensitive user data, loss of reputation, and potential financial losses for the website owner.

How does the module work?

The "Strikingly Takeover Detection" module works by analyzing the website's HTTP responses and matching them against predefined conditions. It checks for specific patterns or indicators that suggest a misconfiguration or vulnerability related to the Strikingly platform.

One of the matching conditions used by this module is the presence of specific phrases in the website's content, such as "But if you're looking to build your own website" and "you've come to the right place." These phrases are commonly associated with Strikingly websites and can indicate the presence of a vulnerable configuration.

Additionally, the module utilizes DSL (Domain Specific Language) matchers to compare the website's host with its IP address. If the host and IP address do not match, it suggests a potential misconfiguration that could be exploited for a takeover.

While the module does not provide the exact JSON definitions or HTTP request templates it uses, it performs these checks behind the scenes to identify potential vulnerabilities.

Here is a simplified example of an HTTP request that the module might send:

GET / HTTP/1.1
User-Agent: Vidoc-Scanner

The module then evaluates the response from the server based on the defined matching conditions to determine if a potential takeover vulnerability exists.

It's important to note that this module is designed to detect vulnerabilities and misconfigurations, not to exploit them. Its purpose is to provide website owners with information about potential security risks so that they can take appropriate actions to mitigate them.

Module preview

Concurrent Requests (0)
Passive global matcher
dsl: Host != ipand
word: But if you're looking to build your own ...
On match action
Report vulnerability