Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Webroot Login Panel - Detect

By kannthu

Informative
Vidoc logoVidoc Module
#panel#webroot
Description

What is the "Webroot Login Panel - Detect?"

The "Webroot Login Panel - Detect" module is designed to detect the presence of the Webroot login panel. Webroot is a software that provides cybersecurity solutions. This module focuses on identifying the login panel of the Webroot software. It is an informative module that helps users determine if the Webroot login panel is properly configured.

Impact

This module has an informative severity level, which means it provides valuable information without indicating any immediate security risks or vulnerabilities. It helps users assess the presence and configuration of the Webroot login panel, allowing them to make informed decisions regarding their cybersecurity setup.

How the module works?

The "Webroot Login Panel - Detect" module works by sending an HTTP GET request to the "/Login" path. It then applies two matching conditions to determine if the Webroot login panel is present:

    - The module checks if the response body contains the HTML title tag "<title>Webroot - Login</title>". This indicates that the login panel is present. - The module verifies that the HTTP response status is 200, indicating a successful request.

If both conditions are met, the module identifies the presence of the Webroot login panel.

For example, the module sends an HTTP GET request to the "/Login" path and expects a response with a status code of 200 and a body containing the HTML title tag "<title>Webroot - Login</title>".

This module is a valuable tool for users who want to ensure the proper configuration of their Webroot login panel. It provides insights into the presence of the login panel and helps users maintain a secure cybersecurity setup.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/Login
Matching conditions
word: <title>Webroot - Login</title>and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability