Infiltrator Network Security Scanner FAQs.

Internet Monitoring Spy Software

Infiltrator 3.0 - Network Security Scanning Software

Return to the Infiltrator product page: Network Security Scanning Software

Infiltrator Frequently Asked Questions

Here you will find common questions about our Infiltrator software.

1. What version of Windows does Infiltrator work with?
2. What types of computers can I scan with Infiltrator?
3. What types of vulnerabilities does Infiltrator detect?
4. Can Infiltrator generate reports for presentations and viewing?
5. Can I scan my network in stealth with Infiltrator?
6. Can Infiltrator perform brute force attacks?
7. Sometimes the UDP scan returns all false-positives?
8. When I scan my own computer locally, then remotely, I get different results?
9. How can I use Infiltrator to get an accurate depiction of my computer's security?


1. What version of Windows does Infiltrator work with?

Infiltrator will work with Windows 2000 and XP.

Top of Page


2. What types of computers can I scan with Infiltrator?

Infiltrator can scan any computer, regardless of what operating system is running on it. However, Infiltrator's information enumeration scanning (i.e.: file shares, users, etc.) is geared towards Windows computers, or computers running Samba.

Top of Page


3. What types of vulnerabilities does Infiltrator detect?

Infiltrator detects and alerts you of the following vulnerabilities:

Top of Page


4. Can Infiltrator generate reports for presentations and viewing?

Yes, Infiltrator has a powerful built in report generator for generating simple, or complex reports.

Top of Page


5. Can I scan my network in stealth with Infiltrator?

No, Infiltrator is not a quiet scanner - it creates an easily followed trail while it is scanning, as it is a tool designed for network administrators and computer owners. It should now be used as hacking tool - however Infiltrator allows you to quickly audit your network using the same techniques a hacker would.

Top of Page


6. Can Infiltrator perform brute force attacks?

Yes, Infiltrator has built in cracking facilities to crack SNMP accounts, file shares, and FTP accounts.

Top of Page


7. Sometimes the UDP scan returns all false-positives?

Depending on your connection speed and latency at the time of the scan, the UDP scan may return false positives on many or all of the ports it checks. This can be remedied by setting a higher timeout in the Advanced settings of Infiltrator, or by waiting a minute and re-scanning.

Top of Page


8. When I scan my own computer locally, then remotely, I get different results?

This is to be expected. When scanning a computer locally (i.e.: you are scanning the computer you are using to do the scan), you are already running with administrator privileges (unless you are using a guest account) and all the scans will typically succeed and reveal information about your computer. A remote scan should not reveal too much, or any information about your computer - as this is what an outside potential attacker could use against you.

Top of Page


9. How can I use Infiltrator to get an accurate depiction of my computer's security?

To get an extremely accurate depiction of your computer's security you should perform 3 total scans:

1. A local scan of the computer you are testing - to see what information a physical user of your machine could obtain.
2. A scan of your computer from another computer on your network - to see what information other network users can obtain from your computer.
3. An external scan of your computer from outside of your network - to see what information a totally remote, outside user can obtain from your computer.

Top of Page

Return to the Infiltrator product page: Network Security Scanning Software

Price: $49.95
Instant Download!
Order Now! Secure Online Ordering

Ordering is 100% safe via our authorized cleverbridge.com secure server.

Infiltrator Product Details Order SentryPC Now

Main Page: Internet Monitoring Software
Realtime-Spy: Remote PC Monitoring Software
SpyAgent: PC Monitoring Surveillance Software
Realtime-Spy Plus: Remote Computer Monitoring Software
NetVizor: Corporate Network Monitoring Software
SentryPC: Secure Filtering, Monitoring, and Access Control
SpyAnywhere: Home Surveillance Software
SpyAnywhere + SpyAgent Combo: Remote PC Monitoring Solution
Top NetVizor Discount - Best NetVizor Coupon
Legal Policies - Testimonials

Copyright (C) 2002 - 2022 How To Spy Internet Monitoring Software - All Rights Reserved