Skip to content

Payment Security

5 automated security scanners


Purpose: The Payment Gateway Security Scanner is designed to identify vulnerabilities in payment gateways, API security issues, and authentication mechanisms, ensuring robust protection against financial fraud and unauthorized access.

What It Detects:

  • Security Headers Analysis: Checks for the presence of critical security headers such as Strict-Transport-Security, Content-Security-Policy, X-Frame-Options, and X-Content-Type-Options.
  • TLS/SSL Inspection: Identifies outdated or insecure TLS versions (e.g., TLSv1.0, TLSv1.1) and detects weak cipher suites like RC4, DES, and MD5.
  • DNS Record Validation: Validates SPF records to ensure proper email sending authorization, checks DMARC policies for alignment with SPF settings, and verifies DKIM records for domain key authentication.
  • HTTP Request Analysis: Examines security headers in HTTP responses, analyzes redirects and content for potential vulnerabilities.
  • Port Scanning and Service Fingerprinting: Scans common ports to identify open services and attempts service fingerprinting to determine running software versions.

Inputs Required:

  • domain (string): The domain of the payment gateway to analyze (e.g., securepay.com).
  • url (string): The URL of the payment gateway API endpoint (e.g., https://api.securepay.com/v1).

Business Impact: Ensuring robust security measures in payment gateways is crucial for protecting financial transactions against unauthorized access and fraud, maintaining trust with customers and stakeholders, and complying with regulatory requirements such as PCI DSS.

Risk Levels:

  • Critical: Conditions that could lead to immediate system compromise or significant data exposure, requiring urgent attention.
  • High: Conditions that pose a high risk of financial loss or severe impact on business operations, but not immediately compromising the system.
  • Medium: Conditions that may indicate potential vulnerabilities but do not currently threaten critical systems or data integrity.
  • Low: Informative findings that provide insights into non-critical areas but are generally benign in nature.
  • Info: General security recommendations and informational findings that enhance understanding of the environment without immediate action required.

If specific risk levels are not specified, they can be inferred based on severity and urgency needed for remediation.

Example Findings:

  1. The payment gateway lacks a Strict-Transport-Security header, exposing it to potential man-in-the-middle attacks.
  2. Insecure TLS version (e.g., TLSv1.0) and weak cipher suite (RC4) detected on the API endpoint, compromising data encryption and integrity.

Purpose: The Card-Not-Present Fraud Scanner is designed to enhance e-commerce payment security by analyzing various aspects of a domain, including DNS records, HTTP security headers, TLS/SSL configurations, port usage, and API endpoints. This tool aims to detect potential fraud, stolen cards, and card testing through comprehensive analysis, ensuring robust measures are in place against unauthorized access and data breaches.

What It Detects:

  • Security Headers Analysis: The scanner checks for the presence of critical security headers such as Strict-Transport-Security, Content-Security-Policy, X-Frame-Options, and X-Content-Type-Options. These headers are crucial for enhancing web application security.
  • TLS/SSL Configuration Issues: It identifies outdated or insecure TLS versions (e.g., TLSv1.0, TLSv1.1) and weak cipher suites (e.g., RC4, DES, MD5). Ensuring the latest SSL/TLS standards are implemented is essential for maintaining secure communications.
  • DNS Record Validation: The scanner examines TXT, MX, NS, CAA, and DMARC records to ensure proper configuration, preventing unauthorized access and safeguarding email security.
  • Port Scanning and Service Fingerprinting: By scanning common ports (e.g., 80, 443) and performing service fingerprinting, the scanner detects open services and potential vulnerabilities that could be exploited by attackers.
  • API Endpoint Security: The analysis of API endpoints for security headers and proper TLS configurations helps in preventing unauthorized access and safeguarding data integrity through APIs.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com). This is the essential input that serves as the basis for all subsequent analyses performed by the scanner.

Business Impact: Ensuring robust payment security measures in place against unauthorized access and data breaches is crucial for maintaining trust with customers and complying with regulatory standards such as PCI DSS. The findings from this scanner can significantly impact a business’s security posture, potentially affecting customer confidence and compliance penalties.

Risk Levels:

  • Critical: Conditions that directly lead to severe vulnerabilities or unauthorized access are critical. Examples include missing essential security headers or misconfigured DNS records leading to significant exposure.
  • High: High-risk conditions involve substantial risks but may not necessarily lead to immediate severe impacts. For example, using outdated TLS versions could be risky if the service is exposed to high volumes of traffic.
  • Medium: Medium-risk findings are those that pose moderate risk and might require attention for improvement in security practices without being critical.
  • Low: Low-risk conditions generally involve minor issues that do not significantly impact overall security but still need resolution for optimal performance.
  • Info: Informational findings provide insights into the current state of security measures without posing immediate risks, useful for continuous monitoring and improvement.

If specific risk levels are not detailed in the README, they have been inferred based on the purpose of the scanner and its impact.

Example Findings:

  • “The domain lacks a Strict-Transport-Security header, which is critical for enforcing HTTPS usage across all connections.”
  • “An outdated TLS version (TLSv1.0) is detected, posing risks to secure communications due to known vulnerabilities in this protocol version.”

Purpose: The Mobile Payment Security Scanner is designed to identify vulnerabilities in mobile payment applications related to wallet security, NFC (Near Field Communication) security, and QR code security. It ensures that these applications adhere to best practices for secure communication and data handling.

What It Detects:

  • Wallet Security Vulnerabilities: Weak encryption methods used in storing sensitive financial information are detected. Additionally, the presence of secure authentication mechanisms for accessing the wallet is verified.
  • NFC Security Issues: The scanner identifies vulnerabilities in NFC payment processing, such as improper handling of transaction data and ensures that NFC communication is encrypted and protected against eavesdropping.
  • QR Code Security Flaws: Potential security weaknesses in QR code generation and scanning processes are analyzed, including the integrity and authenticity of QR codes used for payments.
  • HTTP Security Headers: The scanner examines HTTP response headers for critical security directives like Strict-Transport-Security, Content-Security-Policy, X-Frame-Options, and X-Content-Type-Options.
  • TLS/SSL Configuration: SSL/TLS configurations are inspected to identify outdated protocols (e.g., TLSv1.0, TLSv1.1) and weak cipher suites (e.g., RC4, DES, MD5).

Inputs Required:

  • domain (string): The primary domain of the mobile payment application (e.g., acme.com).
  • app_identifier (string): The unique identifier for the mobile application (e.g., com.acme.payment).

Business Impact: Ensuring that mobile payment applications adhere to best practices for secure communication and data handling is crucial for maintaining the integrity of financial transactions and protecting sensitive information from unauthorized access.

Risk Levels:

  • Critical: The scanner identifies weak encryption methods or improper handling of transaction data in NFC payments, which could lead to significant security breaches.
  • High: Outdated SSL/TLS protocols or weak cipher suites can expose applications to eavesdropping and man-in-the-middle attacks, posing a high risk to user data.
  • Medium: Issues with HTTP security headers might not directly compromise security but are indicative of poor configuration that could be improved for enhanced protection.
  • Low: Informational findings about potentially insecure QR code generation processes or weak authentication mechanisms are considered low risk unless they pose an immediate threat.
  • Info: These are general recommendations to improve the overall security posture without being critical.

Example Findings:

  1. The application uses RC4 encryption for sensitive financial data, which is known to be vulnerable and should be replaced with a stronger method like AES-256.
  2. The NFC transactions do not enforce any form of encryption, leaving them open to interception by malicious actors.

Purpose: The Point-of-Sale Security Scanner is designed to identify and assess potential vulnerabilities in terminal security, pin entry device weaknesses, and skimming activities within point-of-sale systems. It aims to ensure compliance with payment security standards and detect any gaps in the system’s security measures by analyzing public records, OSINT sources, and company disclosures.

What It Detects:

  • Terminal Security Vulnerabilities: The scanner identifies outdated or unpatched POS terminals that may be susceptible to attacks. It also detects weak encryption protocols used for data transmission, which could lead to unauthorized access. Additionally, it checks for default passwords or lack of password policies on POS devices, posing a significant risk.

  • Pin Entry Device Weaknesses: The scanner analyzes the security measures in place for PIN pads and other entry devices, looking for vulnerabilities related to keylogging or tampering with these devices. It verifies compliance with PCI DSS requirements for PIN protection, which is crucial for safeguarding customer financial information.

  • Skimming Activities: The scanner searches for mentions of data breaches, unauthorized access, or compromised systems that could indicate potential skimming attacks. It identifies patterns indicating unusual transaction spikes and detects any claims of third-party vendor responsibility without technical evidence, highlighting potential fraudulent activities.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com) - This is necessary for searching public records, OSINT sources, and company disclosures related to the point-of-sale system’s security posture.
  • company_name (string): Company name for statement searching - Providing the company’s name helps in targeting specific search queries that may reveal relevant information about past breaches or vulnerabilities.

Business Impact: This scanner is critical as it directly impacts the financial and personal data security of customers using point-of-sale systems. Unaddressed vulnerabilities can lead to significant data breaches, resulting in substantial financial losses, legal repercussions, and damage to customer trust.

Risk Levels:

  • Critical: Conditions that could lead to immediate system compromise or unauthorized access to sensitive information are considered critical risks. This includes default passwords, unpatched software, and weak encryption protocols.

  • High: Risks associated with outdated systems, lack of PIN protection compliance, and significant data exposure are classified as high risks. These issues require immediate attention to prevent potential breaches that could impact the company’s reputation and regulatory compliance.

  • Medium: Vulnerabilities such as undiscovered skimming activities or incomplete password policies are considered medium risks. While less severe than critical or high risks, they still pose a significant threat and should be addressed in the short term to enhance overall security posture.

  • Low: Informational findings related to minor system misconfigurations or non-critical software versions can be classified as low risks. These issues are generally not directly harmful but may indicate areas for improvement that could be addressed at a later stage.

Example Findings: The scanner might flag outdated POS terminals in an older version of Windows, default passwords on new devices, and unencrypted data transmissions over the network as critical or high-risk findings. It might also identify PIN pads without any security measures in place as medium-risk issues.


Purpose: The Alternative Payment Methods Security Scanner is designed to identify vulnerabilities and security issues related to cryptocurrency payments, peer-to-peer (P2P) transactions, and buy-now-pay-later (BNPL) services on a given domain. It aims to ensure compliance with best practices in payment security by detecting the presence of cryptocurrencies, P2P platforms, BNPL services, and examining critical web security headers and TLS/SSL configurations.

What It Detects:

  • Cryptocurrency Payment Security: The scanner detects the presence of cryptocurrency wallets, APIs related to cryptocurrency exchanges, or mentions of specific cryptocurrencies such as Bitcoin, Ethereum, Litecoin, and more.
  • Peer-to-Peer (P2P) Payment Security: Identifies P2P payment platforms, APIs, or mentions of specific P2P services like Bitcoin Cash and Ripple.
  • Buy-Now-Pay-Later (BNPL) Security: Detects BNPL services, APIs, or mentions of specific BNPL providers such as Afterpay and Klarna.
  • Security Headers: Checks for the presence and correctness of security headers that protect against common web vulnerabilities including strict-transport-security, content-security-policy, x-frame-options, and x-content-type-options.
  • TLS/SSL Issues: Identifies outdated or insecure TLS/SSL configurations, weak cipher suites, and deprecated protocol versions such as TLSv1.0, TLSv1.1, RC4, DES, and MD5.

Inputs Required:

  • domain (string): The primary domain to analyze, e.g., acme.com. This is essential for DNS queries, HTTP requests, and TLS/SSL inspection to assess the security posture of the target domain.

Business Impact: Ensuring that cryptocurrency payments, P2P transactions, and BNPL services are securely implemented is crucial for maintaining trust and compliance with financial regulations. The scanner’s findings can significantly impact a company’s reputation if not properly secured, potentially leading to significant financial losses and legal repercussions.

Risk Levels:

  • Critical: Findings that indicate direct exposure to high risk such as unencrypted data transmission (e.g., using HTTP instead of HTTPS), presence of known vulnerabilities in cryptocurrency wallets or APIs, or incorrect implementation of security headers.
  • High: Issues where the system’s functionality is significantly impaired or sensitive information is at risk, such as missing critical security headers or outdated TLS/SSL configurations that could lead to data interception.
  • Medium: Vulnerabilities that are less severe but still pose a significant risk if not addressed, such as detection of weak cipher suites or deprecated protocols in TLS configuration.
  • Low: Informative findings that do not directly affect security but provide valuable insights for improving the overall web application security posture, such as presence of non-critical cryptocurrencies or P2P services without associated risks.

Example Findings:

  1. The scanner identifies a cryptocurrency wallet API endpoint on the domain, indicating potential exposure to cryptocurrency theft through compromised APIs.
  2. A critical missing security header (e.g., x-frame-options) is detected, which could lead to clickjacking attacks and unauthorized access to sensitive information displayed within iframes.