|
Infiltrator - Network Security Scanning and Auditing
Infiltrator is an easy to use, intuitive network security scanner that can quickly audit your network
computers for vulnerabilities, exploits, and information enumerations. Infiltrator can reveal and catalog
a plethora of information on scanned computers - such as installed software, shares, users, drives, hotfixes,
NetBios and SNMP information, open ports and much more!
Infiltrator can audit each computer's password and security policies, alerting you when changes should be made
to increase security. All results can be generated into a sleek, easy to read report by the report generator.
Software Information |
System Requirements |
Version: | 3.0 |
- Windows 8/7/XP/Vista
- 3MB disk space
- Pentium II CPU
- 128 MB RAM
|
File Size: | 1.32 MB |
License: | Free to try, $69.95 to buy |
Screenshot: | View Screenshot |
Rating: | |
Key Features of Infiltrator :
- Information Gathering
Infiltrator can enumerate users, file shares, drives, open ports, registry keys,
installed software and hotfixes, snmp and Netbios tables, Password Polices, and much more from each computer scanned.
- NetBios and SNMP Tables
- Ping Information
- Web Server Information
- Registry Startup Keys
- Installed Software and Hotfixes
- File and Printer Shares
- Password Policies
- Users and Groups
- Jobs and Sessions
- Local Security Authority
|
- Computer System Information
- Open TCP and UDP Ports
|
- Security Auditing and Analysis
Infiltrator can audit each scanned computer for improper registry settings, suspicious open ports,
vulnerable services, scripting exploits, weak password policies, and improper user configurations.
- Insecure Registry Settings
- Possible Trojan and Worm Infections
- Suspicious Open Ports
- Exploitable Services Running
- Exploitable CGI and Scripts Installed
- Improper User Account Configurations
- Insecure Password Policies
|
|
- Generate Sleek Scan Reports
Infiltrator can generate brief or complete reports (customizable)
detailing the results of all scans - helping you get an overview of
your network's security as well as individual computer security levels.
- Many Useful Network Utilities
Infiltrator comes with many built in network utilities - from whois lookups and ping sweeps,
to brute force cracking tools and email tracing - that help you manage your network and security with greater ease.
More Screenshots - Click each image to enlarge! |
|
|
|
RELATED ANTISPY SOFTWARE DOWNLOADS
- WinTasks 5 Professional
is the perfect complement to your firewall and anti-virus software and defend malicious software.
You can rely on WinTasks to quickly improve your computer's security and speed.
- Look 'Trojan' Stop
is used to scan and remove trojan horses, viruses, and spyware from your PC.
- BitDefender 8 Professional Plus
integrates antivirus, firewall and antispam modules into one comprehensive security package.
- PC DoorGuard
scans emal messages and any media on your PC for backdoors and trojan horses.
- Desktop Armor
catches many of the changes a virus, worm, or trojan program will make
to your computer and lets you immediately fix them back!
- McAfee VirusScan
ensures your PC is protected from viruses, worms, Trojans, spyware, web dialers, and other malicious threats.
- Panda Titanium Antivirus 2006
detects and eliminates spyware and other annoying programs that install themselves on your computer.
- Panda Platinum Internet Security 2006
offers the most effective protection against viruses, spyware, hackers, phishing, spam and other Internet threats.
- Anti Trojan Elite
is a trojan/keylogger remover that can find out and stop trojan horse in time.
- Geek Superhero
watches dozens of important settings on your computer and warns you
if any program has changed them and lets you immediately fix them back!
|
|