Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

VMware FTP Server Login Panel - Detect

By kannthu

Informative
Vidoc logoVidoc Module
#panel#vmware#ftp
Description

VMware FTP Server Login Panel - Detect

What is the "VMware FTP Server Login Panel - Detect?"

The "VMware FTP Server Login Panel - Detect" module is designed to detect the presence of the VMware FTP Server login panel. This module focuses on identifying the login panel of the VMware FTP Server software. It is an informative module that provides insights into the configuration of the FTP server.

This module is authored by DhiyaneshDK and is classified as informative, meaning it provides valuable information without indicating any specific vulnerabilities or misconfigurations.

Impact

This module does not have any direct impact on the target system. It solely focuses on detecting the presence of the VMware FTP Server login panel and does not perform any actions that could potentially impact the system's security or functionality.

How does the module work?

The "VMware FTP Server Login Panel - Detect" module works by sending a GET request to the "/login" path of the target system. It then applies two matching conditions to determine if the VMware FTP Server login panel is present:

- The module checks the response body for the presence of the phrase "VMWARE FTP SERVER". - It also verifies that the response status code is 200, indicating a successful request.

If both conditions are met, the module reports the detection of the VMware FTP Server login panel.

Here is an example of the HTTP request sent by the module:

GET /login

The matching conditions are:

- The response body must contain the phrase "VMWARE FTP SERVER". - The response status code must be 200.

By analyzing the response of the target system, the module determines if the VMware FTP Server login panel is present.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/login
Matching conditions
word: VMWARE FTP SERVERand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability