Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

ZOHO ManageEngine AssetExplorer Panel - Detect

By kannthu

Informative
Vidoc logoVidoc Module
#panel#zoho#manageengine
Description

What is the "ZOHO ManageEngine AssetExplorer Panel - Detect?" module?

The "ZOHO ManageEngine AssetExplorer Panel - Detect" module is designed to detect the presence of the ZOHO ManageEngine AssetExplorer panel. ZOHO ManageEngine AssetExplorer is a software used for managing and tracking IT assets within an organization. This module focuses on detecting the panel and providing information about its existence.

This module has an informative severity level, which means it provides valuable information but does not pose a direct threat or vulnerability.

This module was authored by dhiyaneshDK.

Impact

The impact of detecting the ZOHO ManageEngine AssetExplorer panel is primarily informational. It indicates that the panel is accessible and can be further investigated for potential misconfigurations or vulnerabilities.

How does the module work?

The module works by sending HTTP requests and matching the responses against specific conditions. It uses two matching conditions:

- Matcher 1: It checks if the response contains the HTML title tag with the value "ManageEngine AssetExplorer". This indicates the presence of the ZOHO ManageEngine AssetExplorer panel. - Matcher 2: It verifies that the HTTP response status is 200, indicating a successful request.

If both conditions are met, the module reports the detection of the ZOHO ManageEngine AssetExplorer panel.

Here is an example of an HTTP request that the module may send:

GET / HTTP/1.1
Host: example.com

The module then analyzes the response and checks for the presence of the specified matchers.

By using this module, you can quickly identify if the ZOHO ManageEngine AssetExplorer panel is accessible and take appropriate actions based on the results.

Module preview

Concurrent Requests (0)
Passive global matcher
word: <title>ManageEngine AssetExplorer</title...and
status: 200
On match action
Report vulnerability