[ Aleksandar Marković @ 04.05.2001. 16:35 ] @
http://www.vulnerabilities.org/nmapemail.html


Complimentary NMAP security probe


This tool will invoke a copy of the Nmap Port scanner against the IP address you provide below.. It will mail you a copy after it is finished, with a summary of the results of the scan. It's a great way to test your firewall/sentry software, or scan your server for open ports without the pain of installing and updating this great open-source software. Keep in mind after you press the button, it will take a minute to get the results. It's as simple as that. Please don't abuse this script, or we will remove it. We do keep records of who scans what, for security sake.

hostname or ip address:


Enter your email address to receive report:






*** To continue you must agree to hold vulnerabilities.org and the site owners blameless and free of any liability for anything that happens as a result of the security scan. Also, you declare you have legal permission to scan the host. Agree to this by pressing the above button .***
*** The intent of this visibility scan is to give you the external audit perspective of your company's network resources. A network security scan will test your system or server for vulnerabilities that can be used to compromise a system. Examples are improperly configured administrator accounts, anonymous access to system files and directories, and obsolete versions of system software.
*** Under some circumstances the scanning utilized may disable or crash the computer you are coming from, if so, you'll still receive an email detailing why, and hopefully you will fix this!



-----------------------




http://www.vulnerabilities.org/nessusfreehtml.html

Complimentary Nessus security probe in HTML


This tool will invoke a copy of the Nessus Security scanner against the IP address you are coming from (Gateway,host, etc.). It will mail you a copy after it is finished, with a summary of the results of the scan. It's a great way to test your firewall/sentry software, or scan your server for holes without the pain of installing and updating this great open-source software. Keep in mind after you press the button, it will take a minute or two to confirm the start of the scan. Then in about **30-40** minutes (or longer, if you firewall out this servers address!) you will receive an email from our server showing the results. It's as simple as that. Please don't abuse this script, or we will remove it. We do keep records of who scans what, for security sake. You must have an HTML (outlook?) compatible email client to read the output of this file!

Note: Please Please, be sure to "disable" any proxy server settings in your Netscape or Internet Explorer or whatever else Browser you have. Then, exit all copies of the browser, and come back here. If you have a Proxy server setting, obviously, the server will probe the Proxy server. Have fun!


Enter your email address to receive report:





*** To continue you must agree to hold vulnerabilities.org and the site owners blameless and free of any liability for anything that happens as a result of the security scan. You also declare your legal permission to scan the host above.Agree to this by pressing the above button .***
*** The intent of this visibility scan is to give you the external audit perspective of your company's network resources. A network security scan will test your system or server for vulnerabilities that can be used to compromise a system. Examples are improperly configured administrator accounts, anonymous access to system files and directories, and obsolete versions of system software.
*** Under some circumstances the scanning utilized may disable or crash the computer you are coming from, if so, you'll still receive an email detailing why, and hopefully you will fix this!
*** Privacy Policy : The only records kept of your scan are the access_log and the sendmail log. In the event of abuse, we reserve the right to forward information in the form of your IP and Email address.