Security for everyone

Htaccess Config File Scanner

Critical information can be compromised if config files are accessed by anyone.

SCAN NOW

Short Info


Level

Medium

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Url

Source

-

Config files are used for communication with other systems or services. These files may contain critical information.


Critical information can be compromised if these files are accessed by anyone. This information can be:

  1. Username and Password
  2. Used System
  3. IP Addresses
  4. URL Information
  5. Referrings
  6. Application Directories and Files
  7. Critical links
  8. Session information


It would also be critical if it combines with other weaknesses.

cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture