Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Tectuus SCADA Monitor Panel - Detect

By kannthu

Informative
Vidoc logoVidoc Module
#panel#tectuus#scada
Description

Tectuus SCADA Monitor Panel - Detect

What is the "Tectuus SCADA Monitor Panel - Detect" module?

The "Tectuus SCADA Monitor Panel - Detect" module is a scanning module designed to detect the presence of the Tectuus SCADA Monitor panel. It is used to identify systems that utilize the Tectuus SCADA Monitor software. This module focuses on detecting the software rather than identifying misconfigurations or vulnerabilities. The severity of this module is classified as informative, meaning it provides valuable information without indicating any immediate threats or risks. The original author of this module is not specified.

Impact

The impact of this module is limited to providing information about the presence of the Tectuus SCADA Monitor panel. It does not directly identify any vulnerabilities or misconfigurations within the software.

How the module works?

The "Tectuus SCADA Monitor Panel - Detect" module works by sending HTTP requests to the target system and analyzing the responses. It uses specific matching conditions to determine if the Tectuus SCADA Monitor panel is present. The module checks for a response status code of 200 and searches for the presence of the "" tag in the response body. If both conditions are met, the module considers the Tectuus SCADA Monitor panel to be detected.

Example HTTP request:

GET / HTTP/1.1
Host: example.com
User-Agent: Vidoc-Scanner

The module's matching conditions:

- The response status code must be 200. - The response body must contain the "" tag.

By analyzing the HTTP responses and applying these matching conditions, the module determines whether the Tectuus SCADA Monitor panel is present on the target system.

Module preview

Concurrent Requests (0)
Passive global matcher
status: 200and
word: <title>SCADAmonitor</title>
On match action
Report vulnerability