
Infiltrator Systems Network Security Scanner v3.00.06 Retail | 1.35 Mb
Infiltrator is powered by an extremely easy to use interface allowing quick access to all of its powerful and unique features. Read on to view Infiltrator's exciting features.
Information Gathering and Scanning
Infiltrator uses the very same scanning techniques that hackers and intruders would use to infiltrate your network and computers. In this fashion, you can see 'what a hacker sees' before they have a chance by scanning each computer on your network one IP at a time. Infiltrator scans target computers and attempts to enumerate as much information as possible. Infiltrator allows you to enter IP addresses, computer names, domains, website hosts, and IP ranges for easy scanning. Information that is enumerated includes, but is not limited to:
NetBios and SNMP Tables
Ping Information
Web Server Information
Registry Startup Keys
Installed Software and Hotfixes
File and Printer Shares
Password Policies
Users and Groups
Jobs and Sessions
Local Security Authority
Computer System Information
Open TCP and UDP Ports
Security Auditing and Analysis
Infiltrator can audit each scanned computer and alert you of the following events using its own updatable, built-in auditing database:
Insecure Registry Settings
Possible Trojan and Worm Infections
Suspicious Open Ports
Exploitable Services Running
Exploitable CGI and Scripts Installed
Improper User Account Configurations
Insecure Password Policies
Information Gathering and Scanning
Infiltrator uses the very same scanning techniques that hackers and intruders would use to infiltrate your network and computers. In this fashion, you can see 'what a hacker sees' before they have a chance by scanning each computer on your network one IP at a time. Infiltrator scans target computers and attempts to enumerate as much information as possible. Infiltrator allows you to enter IP addresses, computer names, domains, website hosts, and IP ranges for easy scanning. Information that is enumerated includes, but is not limited to:
NetBios and SNMP Tables
Ping Information
Web Server Information
Registry Startup Keys
Installed Software and Hotfixes
File and Printer Shares
Password Policies
Users and Groups
Jobs and Sessions
Local Security Authority
Computer System Information
Open TCP and UDP Ports
Security Auditing and Analysis
Infiltrator can audit each scanned computer and alert you of the following events using its own updatable, built-in auditing database:
Insecure Registry Settings
Possible Trojan and Worm Infections
Suspicious Open Ports
Exploitable Services Running
Exploitable CGI and Scripts Installed
Improper User Account Configurations
Insecure Password Policies
Depositfiles
Rapidshare
No comments:
Post a Comment