|
|
|
Main >
Utilities
>
Network
> Infiltrator Network Security Scanner |
|
Infiltrator
is an easy to use, intuitive network security scanner that can
quickly audit your network computers for vulnerabilities,
exploits, and information enumerations.
Infiltrator can reveal and catalog
a plethora of information on scanned computers - such as installed
software, shares, users, drives, hotfixes, NetBios and SNMP
information, open ports and much more!
Infiltrator can audit each
computer's password and security policies, alerting you when
changes should be made to increase security. All results can be
generated into sleek, easy to read report by the report generator.
Infiltrator also includes a bundle of network security utilities,
such as cracking tools, ping and trace sweeps,network enumerator,
whois lookups, and more.
|
|
Buy Now |
|
Key features
of Infiltrator Network Security Scanner:
-
Infiltrator can enumerate
users, file shares, drives, open ports, registry keys, installed
software and hotfixes, snmp and Netbios tables, Password Polices, and
much more from your computer.
-
Infiltrator can audit your
computer for improper registry settings and trojan installations,
suspicious open ports, vulnerable services, scripting exploits, weak
password policies, and improper user configurations.
-
Powered by easily accessed
wizards, Infiltrator can scan, audit, and secure your PC in no time.
-
Infiltrator comes with
many built in network utilities - from whois lookups and ping sweeps,
to brute force cracking tools and email tracing - that help you manage
your computer and security with greater ease.
System
Requirements:
Infiltrator Network Security Scannerscreenshot:

|
|
|