Hi Andy

i'm intesrested by the tool you use to operate scan.
do you use nessus (http://www.tenable.com/sc-report-templates/heartbleed-report)?
or some awesome scripts (

https://gist.github.com/sh1n0b1/10100394

  ) ?

best regards

Gildas


2014-04-10 20:31 GMT+02:00 Andy Smith <andy@bitfolk.com>:
Hi,

We're going to do some scans of our IPv4 space to look for services
vulnerable to the OpenSSL "heartbleed" vulnerability, so we can open
tickets with customers about it¹.

I am warning you in case you have firewalls / IDS mechanisms that
may panic on seeing someone try to make use of it.

The scans will come from 173.255.227.192 and 88.198.54.123 and will
not cause any damage.

Cheers,
Andy

¹ ("Reasonable effort" courtesy free service, no contact doesn't
  mean we are certifying you as safe, conditions apply, your
  causality is at risk if you misappropriate entropy, etc. etc.)

--
http://bitfolk.com/ -- No-nonsense VPS hosting

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEAREDAAYFAlNG444ACgkQIJm2TL8VSQsznwCff4VF7BV2992hno3Q0c2bTcad
lloAn35Qn0X4wtX6SYSiF2e+StGIwBGa
=2Gau
-----END PGP SIGNATURE-----

_______________________________________________
announce mailing list
announce@lists.bitfolk.com
https://lists.bitfolk.com/mailman/listinfo/announce

_______________________________________________
users mailing list
users@lists.bitfolk.com
https://lists.bitfolk.com/mailman/listinfo/users