Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Vigor Login Panel - Detect

By kannthu

Vidoc logoVidoc Module

What is the "Vigor Login Panel - Detect?"

The "Vigor Login Panel - Detect" module is designed to detect the presence of the Vigor login panel. Vigor is a software that provides login functionality for a web application. This module focuses on identifying the login panel and does not perform any further actions. The severity of this module is classified as informative, meaning it provides valuable information but does not pose a direct security risk. The original author of this module is dhiyaneshDK.


This module does not have a direct impact on the security of the target system. It simply detects the presence of the Vigor login panel, which can be useful for further analysis and assessment of the web application's security posture.

How does the module work?

The "Vigor Login Panel - Detect" module works by sending an HTTP GET request to the "/weblogin.htm" path of the target web application. It then applies two matching conditions to determine if the Vigor login panel is present:

- The module checks if the response body contains the HTML title tag "<title>Vigor Login Page</title>". - The module verifies that the HTTP response status code is 200, indicating a successful request.

If both conditions are met, the module considers the Vigor login panel to be detected.

For example, the module's HTTP request template would look like this:

GET /weblogin.htm

The matching conditions are:

- The response body must contain the HTML title tag "<title>Vigor Login Page</title>". - The HTTP response status code must be 200.

By analyzing the response of the target web application, the module can determine if the Vigor login panel is present or not.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: <title>Vigor Login Page</title>and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability