Infiltrator Discounts

Infiltrator DiscountsInfiltrator

Infiltrator is an easy to use, intuitive network security scanner that can quickly scan and audit your network computers for vulnerabilities, exploits, and information enumerations. Monitoring Network software with Infiltrator is easy. You can reveal and catalog a plethora of information on scanned computers - such as installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more! Infiltrator can audit each computer's password and security policies, alerting you when changes should be made to increase security. All results can be generated into a sleek, easy to read report by the report generator.

Information Gathering and Scanning
Infiltrator uses the very same scanning techniques that hackers and intruders would use to infiltrate your network and computers. In this fashion, you can see 'what a hacker sees' before they have a chance by scanning each computer on your network one IP at a time. Infiltrator scans target computers and attempts to enumerate as much information as possible. Infiltrator allows you to enter IP addresses, computer names, domains, website hosts, and IP ranges for easy scanning. Information that is enumerated includes, but is not limited to:

  • NetBios and SNMP Tables
  • Ping Information
  • Web Server Information
  • Registry Startup Keys
  • Installed Software and Hotfixes
  • File and Printer Shares
  • Password Policies
  • Users and Groups
  • Jobs and Sessions
  • Local Security Authority
  • Computer System Information
  • Open TCP and UDP Ports

Security Auditing and Analysis
Infiltrator can audit each scanned computer and alert you of the following events using its own updatable, built-in auditing database:

  • Insecure Registry Settings
  • Possible Trojan and Worm Infections
  • Suspicious Open Ports
  • Exploitable Services Running Exploitable CGI and Scripts Installed
  • Improper User Account Configurations
  • Insecure Password Policies
Generate Sleek Scan Reports
Infiltrator can generate brief or complete reports based on your scan results. Brief reports allow for scan results of one target, while complete results can encompass an entire network's scan results into one organized, easy to present and follow report. Complete reports include descriptions and analysis of all results and conclude with evaluations of each computer's security levels. Reports are fully customizable (via html templates) and are easily presented in web or print format.

Many Useful Network Utilities Infiltrator comes with many built in network utilities, creating a robust suite of networking solutions suitable for any users. Utilities included:

  • Footprinting Tools
  • WhoIs Client
  • Raw HTML Viewer
  • Netstat
  • Finger
  • Scanning Tools
  • Port Scanner
  • Ping Sweep
  • Traceroute
  • Enumeration Tools
  • Shares Scanner
  • Users Scanner
  • Network Enumerator
  • SNMP Enumerator
  • EMail Tools
  • SMTP Client
  • EXPN and VRFY Checkers
  • Email Tracer
  • Gaining Access Tools
  • Share Brute Force Cracker
  • SNMP Brute Force Cracker
  • FTP Brute Force Cracker
  • Password Revealer

Spytech Infiltrator Discount

Infiltrator Discounts

Get your Discount on Infiltrator Today!

Normally $49.95
Use Coupon Code SPY-9J5Y-TECH to receive your discount!

Buy Now!