Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

TurnKey OpenVPN Panel - Detect

By kannthu

Vidoc logoVidoc Module

What is the "TurnKey OpenVPN Panel - Detect" module?

The "TurnKey OpenVPN Panel - Detect" module is designed to detect the presence of the TurnKey OpenVPN panel. TurnKey OpenVPN is a web-based panel that allows users to manage their OpenVPN server. This module focuses on identifying instances of the TurnKey OpenVPN panel and provides information about its configuration and potential vulnerabilities.

This module is categorized as informative, which means it provides valuable insights and information about the target software but does not actively exploit any vulnerabilities or misconfigurations.


The impact of this module is limited to providing information about the presence and configuration of the TurnKey OpenVPN panel. It does not directly impact the security or functionality of the target system.

How the module works?

The "TurnKey OpenVPN Panel - Detect" module works by sending HTTP requests to the target system and analyzing the responses. It uses specific matching conditions to identify instances of the TurnKey OpenVPN panel.

One of the matching conditions used by this module is a word-based matcher that looks for the presence of the phrases "TurnKey OpenVPN" and "Web Shell" in the response body. Additionally, it checks the HTTP status code of the response to ensure it is 200 (OK).

Here is an example of an HTTP request that may be sent by this module:

GET / HTTP/1.1
User-Agent: Vidoc-Scanner

If the response to this request contains the expected phrases and has a status code of 200, the module will report the presence of the TurnKey OpenVPN panel.

It's important to note that this module does not perform any active exploitation or modification of the target system. It solely focuses on detection and information gathering.

Module preview

Concurrent Requests (0)
Passive global matcher
word: TurnKey OpenVPN, Web Shelland
status: 200
On match action
Report vulnerability