Infiltrator Network Security Scanner can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations.
It comes with a built-in database of known vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included.
Infiltrator can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more.
It can also audit password and security policies, perform HTTP/CGI server auditing, registry auditing In addition, Infiltrator also comes with 19 network utilities for footprinting, scanning, enumerating and gaining access to machines (ping sweep, whois lookups, email tracing, share scanning and more).
You can run Infiltrator Network Security Scanner from the commandline, if you want to use functions like external schedules or automated scan.
· 128 MB RAM
· 3 MB disk space
· Nag screen
· Report generation function is disabled
Users are advised to pay attention while installing this ad-supported application:
· Offers to change the homepage for web browsers installed in the system
· Offers to change the default search engine for web browsers installed in the system
· Offers to download or install software or components (such as browser toolbars) that the program does not require to fully function