Confidential

Security Assessment: novatech.net

External reconnaissance and vulnerability assessment for Novatech, Inc.

Date: March 16, 2026 Prepared by: myseodesk Target: novatech.net (144.208.68.255) Type: External / Non-Authenticated
2
Critical
4
High
5
Medium
3
Informational

Executive Summary

An external security reconnaissance of novatech.net was conducted on March 16, 2026. The assessment examined the site's SSL/TLS configuration, HTTP security headers, DNS records, email authentication, subdomain exposure, and technology stack from an unauthenticated external perspective.

The site runs WordPress on Apache with ModSecurity WAF protection, which is a strong positive finding. However, critical gaps exist in HTTP security headers -- the site lacks HSTS, Content Security Policy, and X-Frame-Options, leaving it vulnerable to clickjacking, protocol downgrade attacks, and content injection. The large subdomain surface (84+ subdomains) exposes internal infrastructure names including FortiGate firewalls, UniFi controllers, cPanel, and Remote Desktop Services.

Findings

Critical
Missing Strict-Transport-Security (HSTS) Header
The server does not send an HSTS header, allowing protocol downgrade attacks. An attacker on the same network can intercept the initial HTTP request before the 301 redirect to HTTPS, capturing cookies or injecting content.
Fix: Add Strict-Transport-Security: max-age=31536000; includeSubDomains; preload to Apache config.
Critical
Missing Content-Security-Policy Header
No CSP header is set, providing zero defense against XSS and content injection attacks. If any XSS vulnerability exists in WordPress or its plugins (Gravity Forms, NitroPack, Echo KB), there is no browser-level mitigation to contain it.
Fix: Implement a CSP starting with Content-Security-Policy: default-src 'self'; script-src 'self' cdn-ljfbp.nitrocdn.com www.googletagmanager.com; style-src 'self' 'unsafe-inline' fonts.googleapis.com; and iterate.
High
Missing X-Frame-Options Header
The site can be embedded in iframes on any domain, enabling clickjacking attacks. An attacker could overlay invisible frames to trick users into clicking actions on the Novatech site (form submissions, login actions).
Fix: Add X-Frame-Options: DENY or SAMEORIGIN to Apache config.
High
Missing X-Content-Type-Options Header
Without nosniff, browsers may MIME-sniff responses and execute uploaded files as scripts, enabling stored XSS through file upload features.
Fix: Add X-Content-Type-Options: nosniff to Apache config.
High
Excessive Subdomain Exposure (84+ Subdomains)
Certificate Transparency logs reveal 84+ subdomains including sensitive infrastructure: forti.novatech.net (FortiGate firewall), dbc-unifi.novatech.net (UniFi controller), cpanel.novatech.net, rds.novatech.net (Remote Desktop), test.novatech.net, old.novatech.net. These names reveal internal architecture to attackers.
Fix: Use wildcard certificates instead of individual subdomain certs. Restrict DNS for internal services to private resolvers. Decommission unused subdomains (test, old).
High
SPF Record Near Lookup Limit
The SPF record contains 10+ include: directives (Outlook, Salesforce, HubSpot, SendGrid, Mailgun, ConnectWise, UltiPro, plus 8 IP addresses). SPF has a hard 10-lookup limit -- exceeding it causes SPF validation failures, meaning spoofed emails may pass through.
Fix: Audit active sending services, remove unused includes, consolidate IP addresses using CIDR ranges, or use an SPF flattening service.
Medium
DMARC Policy Set to Quarantine (Not Reject)
DMARC is configured with p=quarantine at 100% enforcement. While better than none, spoofed emails are quarantined rather than rejected outright, meaning some may still reach recipients' spam folders.
Fix: After monitoring DMARC reports for a period, upgrade to p=reject to fully block spoofed emails.
Medium
Missing Referrer-Policy Header
Without a Referrer-Policy, the full URL (including query parameters) is sent as a referrer to external sites. This can leak sensitive data in URL parameters to third-party analytics and CDNs.
Fix: Add Referrer-Policy: strict-origin-when-cross-origin to Apache config.
Medium
Missing Permissions-Policy Header
No Permissions-Policy is set, meaning embedded iframes and third-party scripts can access browser APIs (camera, microphone, geolocation, payment) without restriction.
Fix: Add Permissions-Policy: camera=(), microphone=(), geolocation=(), payment=() to restrict unused APIs.
Medium
Malformed robots.txt Entry
The robots.txt contains Disallow: /portal.novatech.net/ which treats a subdomain as a path. This has no effect (crawlers will still index portal.novatech.net) and reveals the existence of an internal portal to anyone reading robots.txt.
Fix: Remove the malformed entry. Add a separate robots.txt on portal.novatech.net if crawl blocking is needed.
Medium
SSL Certificate Expires in ~7 Weeks
The Let's Encrypt certificate (CN=www.novatech.net) expires May 4, 2026. Let's Encrypt certs auto-renew, but if the renewal process fails, the site will show security warnings.
Fix: Verify auto-renewal is configured and test with certbot renew --dry-run. Set up monitoring for cert expiration.
Info
No IPv6 (AAAA) Record
The domain has no AAAA record. While not a vulnerability, IPv6 support is increasingly expected and its absence may impact future compatibility.
Info
No security.txt File
No /.well-known/security.txt file exists. This RFC 9116 standard file provides security researchers a way to report vulnerabilities responsibly.
Fix: Create a security.txt with contact info, preferred languages, and encryption key at /.well-known/security.txt.
Info
Server Version Not Disclosed
The server returns only Server: Apache without version information. This is a positive finding -- version disclosure helps attackers identify known vulnerabilities.

Positive Findings

ControlStatusDetails
ModSecurity WAFActiveBlocks suspicious requests (406 response with signature detection). Rate-limiting observed after burst scanning.
TLS ConfigurationStrongTLSv1.3 with AES-256-GCM-SHA384 cipher suite. No weak protocols detected.
HTTP to HTTPS RedirectEnabled301 redirect from HTTP to HTTPS is properly configured.
Server Version HidingYesApache version number is not disclosed in headers.
.htaccess ProtectionYesReturns 403 Forbidden (direct Apache block, not WAF).
DMARC EnforcementActivep=quarantine at 100% with reporting to sdmarc.net.
SPF RecordPresentComprehensive SPF with -all (hard fail). Covers all known sending services.

Technology Stack

LayerTechnology
Web ServerApache (version hidden)
CMSWordPress
WAFModSecurity
SSLLet's Encrypt (TLSv1.3)
CDN / OptimizationNitroPack (cdn-ljfbp.nitrocdn.com)
SEOYoast SEO
FormsGravity Forms
Knowledge BaseEcho Knowledge Base (epkb)
AnalyticsGoogle Tag Manager
Email SecurityProofpoint PPE (MX)
CRMSalesforce / Pardot
MarketingHubSpot
DNS RegistrarGoDaddy (domaincontrol.com)
FirewallFortiGate (forti.novatech.net)
NetworkingUniFi (dbc-unifi.novatech.net)

Subdomain Enumeration (84 discovered)

Source: Certificate Transparency logs (crt.sh). Highlighted entries indicate potentially sensitive infrastructure.

atl.novatech.net auto.novatech.net autodiscover.novatech.net automatesbox.novatech.net blog.novatech.net books.novatech.net connect.novatech.net consolidatedcopier.novatech.net consolidatedcopiers.novatech.net cpanel.novatech.net dbc-unifi.novatech.net email.novatech.net forti.novatech.net fs.novatech.net go.novatech.net hamptonroads.novatech.net hub.novatech.net hybrid.novatech.net ithelp.novatech.net itsupport.novatech.net kopiernet.novatech.net link.novatech.net mail.novatech.net manage.novatech.net managed-it.novatech.net managed-office.novatech.net mb.novatech.net ndrive.novatech.net new.novatech.net novactrl.novatech.net novatixgo.novatech.net nsight.novatech.net old.novatech.net outpost.novatech.net pbi.novatech.net portal.novatech.net rds.novatech.net scorecard.novatech.net sense.novatech.net sfdc.novatech.net sheltonbusinessmachines.novatech.net shop.novatech.net signatures.novatech.net smart.novatech.net support.novatech.net test.novatech.net threads.novatech.net unitedlaser.novatech.net webmail.novatech.net wr.novatech.net www.novatech.net

DNS Configuration

RecordValue
A144.208.68.255
AAAANone (no IPv6)
NSns61.domaincontrol.com, ns62.domaincontrol.com
MXmx1-us1.ppe-hosted.com, mx2-us1.ppe-hosted.com (priority 5)
SPFv=spf1 with includes for: Proofpoint, Outlook, Salesforce, HubSpot, SendGrid, Mailgun, ConnectWise, UltiPro + 8 IP addresses. Hard fail (-all).
DMARCv=DMARC1; p=quarantine; pct=100; fo=1 with RUA/RUF reporting to sdmarc.net

Priority Remediation Roadmap

Immediate (This Week)

#ActionImpact
1Add HSTS header to Apache configPrevents protocol downgrade attacks
2Add X-Frame-Options: DENYPrevents clickjacking
3Add X-Content-Type-Options: nosniffPrevents MIME-sniffing attacks
4Add Referrer-Policy: strict-origin-when-cross-originPrevents URL parameter leakage

Short-Term (30 Days)

#ActionImpact
5Implement Content-Security-Policy (start in report-only mode)XSS mitigation layer
6Audit and consolidate SPF record (reduce lookup count)Prevents email delivery failures
7Fix malformed robots.txt entry for portal.novatech.netReduces information disclosure
8Add Permissions-Policy headerRestricts browser API access

Medium-Term (60-90 Days)

#ActionImpact
9Switch to wildcard SSL certs to reduce CT log exposureHides subdomain names from public logs
10Decommission unused subdomains (test, old)Reduces attack surface
11Upgrade DMARC from quarantine to rejectFull email spoofing protection
12Add security.txt fileResponsible disclosure channel
13Verify SSL auto-renewal processPrevents certificate expiration outage
14Restrict DNS for internal services to private resolversHides infrastructure details

Disclaimer

This assessment was performed from an external, unauthenticated perspective using publicly available information and standard reconnaissance techniques. It does not constitute a full penetration test. No exploitation of vulnerabilities was attempted. Findings are based on data available at the time of assessment and may change as the target environment evolves. This report is confidential and intended solely for the authorized recipient.