			Narrow Security Scanner 2000pre10-unx
===============================================================================

	1.0 About NSS
	1.1 Function's in NSS 2000pre10-unx/win
	1.2 Disclaimer

	2.0 How to use NSS?
	2.1 Tools needed to run NSS
	2.2 How to use Subdomain Generator?
	2.3 NSS Bugs

	3.0 Mirror Sites
	3.1 How to contect the author?
	3.2 Recommended web sites
	3.3 Greetings

===============================================================================

1.0 - About Narrow Security Scanner
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Narrow Security Scanner scans for the latest remote vulnerabilities (367)!
It was programmed on the language Perl.
 This script should work on all systems
that supports Perl 5.x. This script was tested on systems like:
Red Hat (4.2, 5.0, 
6.0), FreeBSD 3.0, OpenBSD 2.5, Slackware 4.0 and SusE 6.1.
NSS was programmed for personal use and for admins to check their system(s) for
remote holes.

NSS 2000pre10-unx is for Unix users.
NSS 2000pre10-win is for Windows users.

Help me to make NSS better. Sending comments, suggestions, X-day information
or anything else would really help. Send all to "nss@privacyx.com". Thx!

1.1 - Function's in NSS 2000pre10-unx/win
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
NSS 2000pre10-unx:
Add-ons:  Subdomain Generator & Portscanner
Plugins:  CGI, DDoS, Finger, FTPd, HTTPd, IMAPd, MAIL, Named, POP2, POP3,
	  Rootshell, RPC & SSH.
Comments: All works under Unix machines. There is a bug in Perl 5.005_03
	  (i386-linux, other?) that makes Perl to core dump.
	  
NSS 2000pre10-win:
Add-ons:  None (yup)
Plugins:  CGI, DDoS, Finger, FTPd, HTTPd, IMAPd, MAIL, POP2, POP3, Rootshell,
	  RPC & SSH.
Comments: Timeout function doesn't work because ActivePerl doesn't support
	  the alarm function.

1.2 - Disclaimer
~~~~~~~~~~~~~~~~
The author "Narrow" is not responsible for any damage you do or problems you
get using this script. The script is 100%
 Virus/Trojan FREE! You can use/copy
this script unless this disclaimer stay! This script is freeware. Please, no
code ripping. Contact the author "Narrow" before you rip anything from NSS.

	    !!!THIS SCRIPT IS FOR EDUCATIONAL USE ONLY!!!


2.0 - How to use NSS?
~~~~~~~~~~~~~~~~~~~~~
It's very easy to use NSS. To run it just type "(perl) ./nss" in the directory.
NSS usage: (perl) ./nss -h <host file> -s <host> [-l <log file>
 -m <email addr>]

<host file>  - It is a file with hosts to scan. An example host file is attached
	       with the script.
<host>	     - Scan a single host.
<log file >  - File where the results are stored.
<email addr> - The results will be sent to <email addr>

OS Detection is a bit slow, but it works :) It will try to detect the OS using
www.netcraft.com, so if the web server isn't running on remote server it woun't
detect the os. Before using NSS you need to configure it. Configuration file is
"nss.conf".

2.1 - Tools needed to run NSS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Tools needed: Perl 5.x, rpcinfo and bind-utils (dig).

2.2 - How to use Subdomain Generator?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subdomain Generator usage: (perl) ./generate <host> <log file>

<host>     - Enter your host here, like: host.com (no www before it!)
<log file> - File where all subdomains will be recorded.

2.3 - Narrow Security Scanner Bugs
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1) If you are logged as root try: "./nss -h /etc/passwd -l blah.log
"
2) Hangs on firewalled ports


3.0 - Mirror Sites
~~~~~~~~~~~~~~~~~~
IF ANYONE KNOW ANY OTHER MIRROR'S PLEASE CONTACT ME @ nss@privacyx.com

1. http://www.wiretrip.net/rfp/
2. http://packetstorm.securify.com

3.1 - How to contact the author? 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
E-Mail: nss@privacyx.com
WWW...: http://www.legion2000.cc/
IRC...: Nickname "Narr0w" (EfNet, sometimes Undernet)

3.2 - Recommended web sites
~~~~~~~~~~~~~~~~~~~~~~~~~~~
1. http://www.securityfocus.com/
2. http://packetstorm.securify.com/
3. http://www.freshmeat.net/
4. http://www.linux.com/
5. http://www.redhat.com/support/ (For Red Hat Users)
6. http://www.cert.org/

3.3 - Greetings
~~~~~~~~~~~~~~~
Legion2000, b0f, rain forest puppy, c0nd0r, gov-boi, BeezwaX,
Security Focus (Bugtraq) and all my friend's :)