Top Secret Software
Home
Product Info
Downloads
Buy Now
Support
RELATED PRODUCTS
1
Net Aware
Top Secret Software Marketplace

Home > Software > Network UtilitiesInfiltrator

Infiltrator
Infiltrator is an easy to use, intuitive network security scanner that can quickly audit your network computers for vulnerabilities, exploits, and information enumerations. Infiltrator can reveal and catalog a plethora of information on scanned computers - such as installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more! Infiltrator can audit each computer's password and security policies, alerting you when changes should be made to increase security. All results can be generated into sleek, easy to read report by the report generator.

FEATURES

Information Gathering and Scanning
Infiltrator uses the very same scanning techniques that hackers and intruders would use to infiltrate your network and computers. In this fashion, you can see 'what a hacker sees' before they have a chance by scanning each computer on your network one IP at a time. Infiltrator scans target computers and attempts to enumerate as much information as possible. Infiltrator allows you to enter IP addresses, computer names, domains, website hosts, and IP ranges for easy scanning. Information that is enumerated includes, but is not limited to:

  • NetBios and SNMP Tables
  • Ping Information
  • Web Server Information
  • Registry Startup Keys
  • Installed Software and Hotfixes
  • File and Printer Shares
  • Password Policies
  • Users and Groups
  • Jobs and Sessions
  • Local Security Authority
  • Computer System Information
  • Open TCP and UDP Ports

Security Auditing and Analysis
Infiltrator can audit each scanned computer and alert you of the following events using its own updatable, built-in auditing database:

  • Insecure Registry Settings
  • Possible Trojan and Worm Infections
  • Suspicious Open Ports
  • Exploitable Services Running Exploitable CGI and Scripts Installed
  • Improper User Account Configurations
  • Insecure Password Policies
Generate Sleek Scan Reports
Infiltrator can generate brief or complete reports based on your scan results. Brief reports allow for scan results of one target, while complete results can encompass an entire network's scan results into one organized, easy to present and follow report. Complete reports include descriptions and analysis of all results and conclude with evaluations of each computer's security levels. Reports are fully customizable (via html templates) and are easily presented in web or print format.

Many Useful Network Utilities Infiltrator comes with many built in network utilities, creating a robust suite of networking solutions suitable for any users. Utilities included:

  • Footprinting Tools
  • WhoIs Client
  • Raw HTML Viewer
  • Netstat
  • Finger
  • Scanning Tools
  • Port Scanner
  • Ping Sweep
  • Traceroute
  • Enumeration Tools
  • Shares Scanner
  • Users Scanner
  • Network Enumerator
  • SNMP Enumerator
  • EMail Tools
  • SMTP Client
  • EXPN and VRFY Checkers
  • Email Tracer
  • Gaining Access Tools
  • Share Brute Force Cracker
  • SNMP Brute Force Cracker
  • FTP Brute Force Cracker
  • Password Revealer

ORDER NOW FOR $49.95

CONSULTANT VERSION $295.00
unlimited usage

BOX/LOGO

REQUIREMENTS

Title:

Infiltrator
Languages:
English
Format:
Download or CD
Demo:
N/A
Required:
Any Windows
Web Site:
N/A
Money Back:
N/A
Rating: 
BUY NOW

ORDER NOW $49.95

1 License

CONSULTANT VERSION $295.00

Unlimited License

 
 
Back To Top | Policies | Contact Us
Copyright © 2008 InfoBureau.net Co. All Rights Reserved.