IntruderReport2 - 04 Oct 2021
IntruderReport2 - 04 Oct 2021
High
Threat Level
While no imminent risk of a breach was detected, the high severity issues could lead to a breach by attackers with existing access to the
affected systems, such as malicious customers or employees, or by reasonably highly skilled, determined or well resourced attackers.
High severity issues should ideally be resolved within thirty days to minimise the risk of a breach.
0 1 2 0
Critical 0 Critical 0 0
High 0 High 0 0
Medium 0 Medium 0 0
Low 0 Low 0 0
1 of 9
What we checked you for
You're on our Pro plan, which means all the targets included and their reachable webpages were checked for over
10,000 weaknesses including:
Vulnerable Software
Thousands of checks for known weaknesses in a huge variety of software and hardware, such as: Web servers
(e.g. Apache, Nginx), mail servers (e.g. Exim), development software (e.g. PHP), network monitoring software (e.g.
Zabbix, Nagios), networking systems (e.g. Cisco ASA), content management systems (e.g. Drupal, WordPress), as well
as other well-known weaknesses, such as 'Shellshock'
Encryption Weaknesses
Weaknesses in SSL/TLS implementations, such as: 'Heartbleed', 'CRIME', 'BEAST', and 'ROBOT', weak encryption
ciphers, weak encryption protocols, SSL certificate misconfigurations, unencrypted services such as FTP
Information Leakage
Checks for information which your systems are reporting to end-users which should remain private. This
information includes data which could be used to assist in the mounting of further attacks, such as: Local
directory path information, and internal IP addresses.
Those are the checks that were made for this report. However, your service with us also includes:
Monthly Checks
On average, more than 20 new vulnerabilities are discovered every day. A hacker may only need one of these
to breach your systems. The Pro plan includes monthly checks for the latest weaknesses which may affect
your systems, and ensures any recent changes haven't compromised your security.
Emerging Threats
The time between new vulnerabilities emerging and hackers exploiting them is now days, not weeks. For
organisations who need a more mature approach to cyber security, our emerging threat scans detect critical
threats to your systems without waiting for the next monthly check.
2 of 9
Issue Summary
3 of 9
Issues
Description
Our scanner detected some potential interference with the scan, this may prevent us from correctly finding your
weaknesses, and prevent you from fixing them.
A common way systems like firewalls or 'Intrusion Prevention Systems' try to deter or prevent hackers is to detect their
attacks and block all communication from that source. This works when the attacker behaviour is obvious; like our scans
that try to identify thousands of weaknesses in a short space of time. However, in situations where attackers target
specific issues across a wide variety of targets (like the whole internet), or disguise their attacks by sending them from
multiple locations, these attacks can sneak through this type of blocking.
If you are using an Intrusion Prevention System, or your firewall has a similar service built in, you might be preventing
our scans from finding a weaknesses that a hacker could later exploit, and not benefitting from our service to help
secure your systems. This issue can also be triggered by web application firewalls (WAFs).
Note that we detect this by identifying when services that initially look open to our scans are later closed. This can indicate that
blocking is in place, that the server was restarted, that there was network interference or that firewall settings were changed
during the scan.
Remediation Advice
Consider adding our scanning IPs to your Intrusion Prevention System or web application firewall 'whitelist'. This will
allow our scans to operate without being blocked, and help us identify your weaknesses, so you can fix them before a
hacker finds them. The full list of our scanning IPs is shown below:
35.177.219.0/26
3.9.159.128/25
18.168.180.128/25
18.168.224.128/25
54.93.254.128/26
18.194.95.64/26
3.124.123.128/25
3.67.7.128/25
139.162.214.111
203.12.218.0/24 (most recent)
Occurrences
First seen
Description
The email server allows users to send their username and password without encryption.
Passwords and other data submitted over a connection lacking encryption are vulnerable to capture by an attacker who
is suitably positioned to view traffic sent between the user and email server, in what is referred to as a Man-in-the-
Middle (MitM) attack. Traffic that is encrypted in transit remains confidential end-to-end.
MitM attacks could be carried out by any malicious party located in areas such as the client's own network (e.g. using an
unsecured WiFi network at a cafe, or gym), within the client or server's Internet Service Provider (ISP), or within the
server's hosting infrastructure.
4 of 9
Remediation Advice
The email server should be configured to only allow encrypted authentication methods.
Occurrences
First seen
Description
The SSH service on the host was found to support weak ciphers. If an attacker is able to intercept the communications
between the SSH client and server, they would theoretically be able to decrypt this communication. Please note that the
complexity and mathematics behind the attack are non-trivial and make it infeasible for all but the most highly skilled
and resourced attackers.
Remediation Advice
The SSH service should be configured to allow only strong ciphers. For example, in OpenSSH v6.7+, the following
directive can be configured in "/etc/ssh/sshd_config":
Ciphers [email protected],[email protected],[email protected],aes256-ctr,aes192-
ctr,aes128-ctr
Occurrences
5 of 9
Raw Reconnaissance Data
Target (IP and Hostnames) Port Protocol Service Service info
6 of 9
Scan Info
Targets included in this scan
95.111.195.84 www.flowbee.com
Scan timings
This scan ran from 04 Oct 2021 04:30 to 04 Oct 2021 14:46.
7 of 9
About Intruder
Intruder Systems Ltd is an independent security advisory company, specialising in providing continuous security
monitoring for internet-facing web applications and infrastructure.
Intruder consultants have previously worked for Big Four professional services firms, as well as specialist technical
security consultancies. This background has afforded Intruder industry-leading technical skills combined with thorough
professionalism. Intruder consultants have delivered work for government agencies, international financial institutions,
and global retail giants.
Intruder aims to deliver the highest calibre of security assessments in the industry, with a focus on technical excellence,
risks presented in the context of realistic scenarios, and delivered with the utmost quality.
Professional Membership
The Cyber-security Information Sharing Partnership (CiSP), part of CERT-UK, is a joint industry government initiative to
share cyber threat and vulnerability information in order to increase overall situational awareness of the cyber threat
and therefore reduce the impact on UK business.
The Cyber Growth Partnership (CGP) is a group composed of representatives from UK industry, government and
academia. The GCP provides oversight and gives strategic guidance to the Government on supporting the development
of the UK cyber security ecosystem.
Credentials
8 of 9
www.intruder.io [email protected] intruder_io
9 of 9