POC Coverage
scan4all integrates three major POC sources for comprehensive vulnerability coverage:Nuclei Templates
Embedded nuclei templates provide the largest coverage with 3922 YAML-based POCs.Top 10 Statistics
By Tag
| Tag | Count |
|---|---|
| cve | 1430 |
| panel | 655 |
| edb | 563 |
| lfi | 509 |
| xss | 491 |
| wordpress | 419 |
| exposure | 407 |
| cve2021 | 352 |
| rce | 337 |
| wp-plugin | 316 |
By Severity
| Severity | Count |
|---|---|
| info | 1474 |
| high | 1009 |
| medium | 818 |
| critical | 478 |
| low | 225 |
| unknown | 11 |
Coverage by Category
| Directory | Files | Description |
|---|---|---|
| cves | 1407 | CVE exploits and checks |
| exposed-panels | 662 | Admin panel detection |
| vulnerabilities | 509 | Known vulnerability checks |
| technologies | 282 | Technology-specific checks |
| exposures | 275 | Information disclosure |
| misconfiguration | 237 | Config errors |
| token-spray | 230 | Token/credential checks |
| workflows | 189 | Multi-step checks |
| default-logins | 103 | Default credentials |
| file | 76 | File-based checks |
VScan POCs
Integrated vscan engine includes:- 300+ xray 2.0 POCs - Covering web vulnerabilities and framework exploits
- Custom Go POCs - Native Go implementations for specific vulnerabilities
- Enhanced matching - Advanced detection logic for complex vulnerabilities
Scan4all Custom POCs
scan4all includes custom Go-based POCs for critical vulnerabilities:View the complete POC list in the source repository at
static/pocs.mdVulnerability Detection Process
scan4all’s vulnerability detection follows an intelligent workflow:Service Fingerprinting
After port scanning, services are fingerprinted to identify technology stacks, versions, and frameworks.
POC Selection
Relevant POCs are selected based on:
- Detected technologies (Weblogic, Spring, etc.)
- Service types (HTTP, database, etc.)
- Fingerprint matches
- Version information
POC Execution
Selected POCs are executed with:
- Rate limiting to prevent DoS
- Custom headers and cookies
- Timeout controls
- Error handling
Result Validation
Responses are validated against POC-specific criteria:
- Status codes
- Response body patterns
- Headers
- Response timing
Configuration
Enabling/Disabling POC Checks
Custom Headers and Cookies
POC checks support custom headers for authentication:Custom cookies are compatible with nuclei, httpx, go-poc, x-ray POC, filefuzz, and HTTP Smuggling detection.
DNSLOG Integration
Many POCs require DNS logging for out-of-band detection:Ceye.io Configuration
- Detects blind SSRF vulnerabilities
- Identifies remote code execution through DNS queries
- Validates deserialization vulnerabilities
- Confirms XXE (XML External Entity) issues
Log4j Scanner Integration
scan4all links with a customized log4j-scan for comprehensive Log4Shell detection:Nuclei Template Customization
Custom DSL Helpers
scan4all enhances nuclei with custom DSL functions:Template Locations
Nuclei templates are embedded in the binary but can be customized:Vulnerability Categories
Remote Code Execution (RCE)
Spring Framework
- CVE-2022-22965 (Spring4Shell)
- CVE-2022-22947 (Gateway RCE)
Apache Log4j
- CVE-2021-44228 (Log4Shell)
- JNDI injection variants
Weblogic
- Multiple deserialization RCEs
- T3/IIOP protocol exploits
JBoss
- CVE-2017-12149
- Deserialization vulnerabilities
Authentication Bypass
Information Disclosure
- Exposed panels: 662 admin interface checks
- File exposure: .git, .svn, backups, configs
- Error messages: Stack traces, debug info
- API endpoints: Swagger, GraphQL, API docs
Deserialization Vulnerabilities
Performance Optimization
Concurrent POC Execution
scan4all uses goroutine pools for parallel POC execution:Rate Limiting
Prevent overwhelming targets:Timeout Configuration
Output and Reporting
JSON Output Format
Elasticsearch Integration
Store results in Elasticsearch for centralized management:Advanced Detection Features
Technology-Specific Checks
scan4all automatically enables POCs based on fingerprinting:Workflow Templates
Multi-step vulnerability detection:Supply Chain Scanning
Automated dependency vulnerability detection:- Identifies software components and versions
- Matches against CVE databases
- Checks for outdated libraries
- Detects vulnerable dependencies
Example Workflows
Best Practices
Troubleshooting
No Vulnerabilities Found
- Check fingerprinting: Ensure technologies were correctly identified
- Enable verbose mode:
scan4all -host example.com -v - Verify POCs enabled: Check that
-npflag is not set - Review logs: Check for POC execution errors
False Positives
- Web Application Firewalls (WAF) may trigger false positives
- Use
-proxyflag to route through Burp/ZAP for analysis - Check response bodies manually for verification
Rate Limiting
If POCs are being blocked:- Reduce rate:
-rate 50 - Decrease concurrency:
-c 5 - Increase timeout:
-timeout 10000