Skip to main content
All CollectionsExternal vulnerability scanningFAQs
Will Intruder's scans damage my systems?
Will Intruder's scans damage my systems?

Are Intruder's scans safe? Will scans cause downtime or disruption?

Updated over a week ago

If you're worried about our scanning bringing a system offline or causing heavy traffic to a production system, rest assured that Intruder's scanning engines are configured to be safe to use.



What about authenticated web-app scanning?

We always err on the side of caution and recommend scanning test environments, or those connected to a test harness. Though we don't recommend it, if you're wanting to add admin credentials, then please read this first.

For full transparency, it's worth understanding exactly what happens when you kick off an authenticated scan:

  • Our scanner crawls all pages within your application

  • Identifies different points where data can be sent to your application

  • Sends data (and crafted requests) to the application

  • Checks responses to see if there has been any successful exploitation or any vulnerabilities exist

Since the scanner will attempt to send different types of data to pages behind the login page, it's worth considering what kind of functionality the scanner will be able to interact with and what processes might be triggered. For example:

  • Creating an entry in our IT help desk ticketing system

  • Sending Slack/Teams messages

  • Sending requests to third-party organisations

If you choose to scan an application that has this sort of functionality you may see an increase in submissions as the scanner attempts to send multiple requests in a short timeframe.

What about API Scanning?

When you upload an API and kick off a scan, the scanner will parse the schema to build a list of endpoints and requests.

If your schema contains endpoints that can modify or delete data (for example a DELETE endpoint) and you provide credentials that permit this behaviour, the scanner has the potential to modify that data. It is therefore recommended to review the endpoints in the schema in the context of the account you're giving the scanner access to and either modify the schema or revoke account permissions.

What about Internal Scanning?

Our internal vulnerability scanner uses an agent installed onto the local machine. This agent is designed not to cause any damage to the machine on which it is installed. It does not require access to documents on the machine and will be predominantly checking system directories (e.g. C:/WINDOWS) and Application/Program Files.

The minimum requirements for the agent is a CPU Speed >= 1GHz and 1GB or more of RAM - provided these resource requirements are met (or exceeded) then the scanner will not experience any issues such as running out of memory or CPU capacity.

What about DoS?

We test for denial of service (DoS) vulnerabilities, but don’t exploit them so no need to worry about your systems being taken offline.


FAQs

How do I cancel a scan

If you ever need to cancel a scan, just head to Scans > click the x > click OK:

Can I throttle a scan?

Yes! If you know of any significant resource constraints on a certain system or reasons why your system may not respond well to a peak in traffic, Intruder does offer a throttled scan setting which can be used to scan at slower speeds. This shouldn't be required normally but may be helpful when scanning certain problematic hosts.

⚠️ This feature is only available on the Pro, Premium and Vanguard plans

Can I limit the ports that get scanned?

Yes, absolutely. This would be especially helpful for those users with Application licenses, that want to limit scanning to just the application (and not the broader infrastructure).


If you have any further questions around how Intruder's scans might affect your systems, please contact us in the in-app chat box.

Did this answer your question?