 Infiltrator is a network security scanner that can quickly audit your  network computers for possible vulnerabilities, exploits, and  information enumerations. It comes with a built-in database of known  vulnerabilities, that can be updated online and allows you to select the  items to scan for or to add custom entries to be included. Infiltrator  can reveal and catalog a variety of information, including  installed  software, shares, users, drives, hotfixes, NetBios and SNMP information,  open ports and much more. It can also audit password and security  policies, perform HTTP/CGI server auditing and registry auditing. In addition, the program includes 18
Infiltrator is a network security scanner that can quickly audit your  network computers for possible vulnerabilities, exploits, and  information enumerations. It comes with a built-in database of known  vulnerabilities, that can be updated online and allows you to select the  items to scan for or to add custom entries to be included. Infiltrator  can reveal and catalog a variety of information, including  installed  software, shares, users, drives, hotfixes, NetBios and SNMP information,  open ports and much more. It can also audit password and security  policies, perform HTTP/CGI server auditing and registry auditing. In addition, the program includes 18network utilities for footprinting, scanning, enumerating and gaining access to machines (ping sweep, whois lookups, email tracing, share scanning and more). Infiltrator can be run from the commandline, allowing for external scheduling and automated scanning
click to download
 
 
 



No comments:
Post a Comment