Might want to have a look at this perhaps:

http://seclists.org/nmap-dev/2014/q2/22

On 10/04/2014, at 9:04 am, Mark Goldfinch <mark.goldfinch@modicagroup.com> wrote:

Greetings all,

On 9 April 2014 22:13, Phil Regnauld <regnauld@nsrc.org> wrote:
Python version, for those who don't trust online tests.

Has anyone come across a heartbleed scanning tool which will allow one to scan v4/v6 CIDR netblocks?

Generically I'm thinking the process for resolution is:

1) Analyse
2) Plan
3) Act
4) Verify

In either steps #1 or #4 such a tool would be useful in identifying or verifying the problem is indeed resolved.

I'm not above getting into the code and making one myself, but would prefer to utilise someone else's work if it already exists!

Thanks,
--
Mark Goldfinch
Systems Team Leader, Modica Group
Tel: +64 4 498 6000
      
logo

Trusted Customer Engagement - communicate, connect and transact with your audience via mobile and internet channels

IMPORTANT: The contents of this email and any attachments are confidential. They are intended for the named recipient(s) only. If you have received this email by mistake, please notify the sender immediately and do not disclose the contents to anyone or make copies thereof.
_______________________________________________
NZNOG mailing list
NZNOG@list.waikato.ac.nz
http://list.waikato.ac.nz/mailman/listinfo/nznog