Teleport Panel Detection Scanner

This scanner detects the use of Teleport in digital assets.

Short Info


Level

Medium

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

3 weeks 6 hours

Scan only one

URL

Toolbox

-

Teleport is a tool used for securing access to SSH, Kubernetes, databases, and internal web applications. It is commonly used by DevOps and security teams to implement better security practices and to comply with security policies. Teleport provides the ability to manage access using roles and provides audit logs to trace all activities. The software is widely adopted among teams that need to manage access securely yet efficiently. The tool integrates with existing infrastructure like LDAP and SSO for seamless access management. It supports multiple platforms and cloud infrastructures making it versatile for modern engineering environments.

The scanner detects the existence of the Teleport web login interface. It is particularly focused on identifying exposed web login interfaces that could potentially be misconfigured, thereby providing unauthorized access points. The scanner looks at specific patterns such as version information and interface identifiers to confirm the presence of a Teleport login panel. This detection is crucial as having an exposed panel can lead to security issues if not properly configured and secured. By identifying these panels, organizations can take corrective measures to ensure their systems are not unnecessarily exposed.

The detection process targets the "/webapi/ping" endpoint, looking for specific regex patterns that indicate the presence of Teleport. This includes checking the body of the response for server version and the identifier 'teleport'. The scanner effectively confirms the presence by with an 'and' condition ensuring both patterns are present. Additional metadata searches like favicon hash and set-cookie headers are also utilized to confirm a match. The extraction process pulls version information, giving administrators insight into the version of Teleport being used, which can assist in vulnerability assessments and patch management.

When an exposed panel is detected, it can lead to unauthorized access, data breaches, and other security incidents. An attacker could exploit the login panel to attempt brute force attacks or other unauthorized access vectors. If the interface exposes version information, it might also inform attackers about particular vulnerabilities associated with that version. This can expedite the identification and exploitation of known vulnerabilities. The detection thus highlights a crucial entry point that could be targeted if not adequately secured.

REFERENCES

Get started to protecting your digital assets