How much does it cost?
In the past we offered all Automated Scans for Free, however due to on-going abuse by a very small number of users, access to some of the more intrusive scans has been restricted to full members of the site. Basic Membership is available for a small fee ($19 lifetime membership). The scans are not particularly disruptive to a server, however some of them are noisy and can set off alarms on Intrusion Detection Systems and raise alerts in security log aware organisations.
Why am I a target?
The Internet is a hostile place, anyone, anywhere can connect to your systems. From credit card fraud, identity theft, automated bot-nets and targeted attacks that aim to steal your organisations information there are many and varied threats to anyone operating on the Internet. More detail on the threats faced is available on the About page
Is this sort of scanning illegal?
No (but you should check with your lawyer if you are unsure, different countries have different laws regarding security testing). This is a legitimate security testing service provided for the use by web site or Internet server owners and operators. This service is only to be used by people with permission to have an audit conducted on the nominated host or site.
A note on the hacker / cracker definition
We are fully aware of the debate around the definition of the word hacker, in reality it is an easily recognized word that has come to mean breaking into computers. Clearly the services we provide are to aid in protection against “Blackhat” attackers, crackers and criminals.
I detected an unauthorized scan of my host / site!!
Please use the contact form to provide details. We will work with you to block any offending users, investigate the transaction and conduct an investigation for any illegal activities or misuse.
We do not spam. In fact we even dislike vendor spam, so by using our services you can be assured that we will not sell your address or spam you with daily offers.
Scan results are stored locally in the office, in an encrypted container for analysis in the event of an abuse report. They are kept for at least 6 months.
What is the difference between a Penetration Test and Vulnerability Assessment?
A good question and one that many people get mixed up. Many definitions exist for the terms Vulnerability Assessment and Penetration Testing this is ours.