Infiltrator is an easy to use, intuitive network security scanner that can quickly audit your network computers for vulnerabilities, exploits, and information enumerations. Infiltrator can reveal and catalog a plethora of information on scanned computers such as installed software, shares, users, drives, hotfixes, open ports and much more!

Internet Monitoring Spy Software

Infiltrator 3.0 - Network Security Scanning Software

Network Security Scanning Software

Infiltrator is an easy to use, intuitive network security scanner that can quickly audit your network computers for vulnerabilities, exploits, and information enumerations. Infiltrator can reveal and catalog a plethora of information on scanned computers - such as installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more! Infiltrator can audit each computer's password and security policies, alerting you when changes should be made to increase security. All results can be generated into sleek, easy to read report by the report generator.

Infiltrator also comes with 18 powerful network utilities for footprinting, scanning, enumerating and gaining access to machines. Included utilities are ping sweep, whois lookups, email tracing, brute force cracking tools, share scanning, network enumerating, and many more.

Key Features

Information Gathering
Infiltrator can enumerate users, file shares, drives, open ports, registry keys, installed software and hotfixes, snmp and Netbios tables, Password Polices, and much more from each computer scanned.

View all Scanning Features...



Powerful Information Enumerations


Security Auditing and Analysis
Infiltrator can audit each scanned computer for improper registry settings, suspicious open ports, vulnerable services, scripting exploits, weak password policies, and improper user configurations.

View all Auditing Features...



Security and Policy Auditing


Generate Sleek Scan Reports
Infiltrator can generate brief or complete reports (customizable) detailing the results of all scans - helping you get an overview of your network's security as well as individual computer security levels.

View all Reporting Features...



Sleek and Customizable Reports


Many Useful Network Utilities
Infiltrator comes with many built in network utilities - from whois lookups and ping sweeps, to brute force cracking tools and email tracing - that help you manage your network and security with greater ease.

View all Included Utilities...



18 Network Security Utilities

Infiltrator is powered by an extremely easy to use interface allowing quick access to all of its powerful and unique features. Read on to view Infiltrator's exciting features.

Information Gathering and Scanning

Infiltrator uses the very same scanning techniques that hackers and intruders would use to infiltrate your network and computers. In this fashion, you can see 'what a hacker sees' before they have a chance by scanning each computer on your network one IP at a time. Infiltrator scans target computers and attempts to enumerate as much information as possible. Infiltrator allows you to enter IP addresses, computer names, domains, website hosts, and IP ranges for easy scanning. Information that is enumerated includes, but is not limited to:

NetBios and SNMP Tables
Ping Information
Web Server Information
Registry Startup Keys
Installed Software and Hotfixes
File and Printer Shares

Password Policies
Users and Groups
Jobs and Sessions
Local Security Authority
Computer System Information
Open TCP and UDP Ports


Infiltrator in Action - Screenshots:
 Infiltrator Scan Results
 Scanning Configurations
 Scanning Wizard
 Open Ports
 Shares Manager
 Scan Favorites
 Scan History Viewer
 Multiple Scanning Types

Security Auditing and Analysis

Infiltrator can audit each scanned computer and alert you of the following events using its own updatable, built-in auditing database:

Insecure Registry Settings
Possible Trojan and Worm Infections
Suspicious Open Ports
Exploitable Services Running
Exploitable CGI and Scripts Installed
Improper User Account Configurations
Insecure Password Policies


Infiltrator in Action - Screenshots:
 Auditing Results/Analysis
 Alerts Manager
 Auditing Configurations

 

Generate Sleek Scan Reports

Infiltrator can generate brief or complete reports based on your scan results. Brief reports allow for scan results of one target, while complete results can encompass an entire network's scan results into one organized, easy to present and follow report. Complete reports include descriptions and analysis of all results and conclude with evaluations of each computer's security levels. Reports are fully customizable (via html templates) and are easily presented in web or print format.

Infiltrator in Action - Screenshots:
 View a Sample Report
 Report Generator
 Report Generator Step 2
 Report Configurations
 Report Template Editor

 

Many Useful Network Utilities

Infiltrator comes with many built in network utilities, creating a robust suite of networking solutions suitable for any users. Utilities included:

Footprinting Tools
WhoIs Client
Raw HTML Viewer
Netstat
Finger

Scanning Tools
Port Scanner
Ping Sweep
Traceroute


Enumeration Tools
Shares Scanner
Users Scanner
Network Enumerator
SNMP Enumerator

EMail Tools
SMTP Client
EXPN and VRFY Checkers
Email Tracer

Gaining Access Tools
Share Brute Force Cracker
SNMP Brute Force Cracker
FTP Brute Force Cracker
Password Revealer


Infiltrator in Action - Screenshots:
 Whois Client
 Network Enumerator
 Email Tracer
 Ping Sweep
 Share Brute Force Cracker
 Netstat



User-Friendly, Intuitive Interface

Infiltrator boasts a user interface unmatched by any other network security software. Infiltrator's easy to use, intuitive interface allows you to get started immediately with no having to 'learn the software'. Here are some key features of Infiltrator's powerful interface:

Intuitive Navigation and Action Icons
Easy Access Menu System
Powerful Wizards for Getting Started
Updatable Alerts Database
Multiple Ways to Scan Targets (computer name, ip, range, domain)



Infiltrator in Action - Screenshots:
 Infiltrator's Main Interface
 Scanning Wizard
 Report Generator
 View a Sample Report
 Quick Configurations
 Multiple Scanning Types
 Scanning Configurations
 Shares Manager

 

Price: $49.95
Instant Download!
Order Now! Secure Online Ordering

Ordering is 100% safe via our authorized cleverbridge.com secure server.

Infiltrator FAQs Order SentryPC Now

Main Page: Internet Monitoring Software
Realtime-Spy: Remote PC Monitoring Software
SpyAgent: PC Monitoring Surveillance Software
Realtime-Spy Plus: Remote Computer Monitoring Software
NetVizor: Corporate Network Monitoring Software
SentryPC: Secure Filtering, Monitoring, and Access Control
SpyAnywhere: Home Surveillance Software
SpyAnywhere + SpyAgent Combo: Remote PC Monitoring Solution
Top NetVizor Discount - Best NetVizor Coupon
Legal Policies - Testimonials

Copyright (C) 2002 - 2022 How To Spy Internet Monitoring Software - All Rights Reserved