Nsauditor is an advanced network security scanner for auditing and monitoring network computers for possible vulnerabilities. The software checks network computers using all potential methods that a hacker might use to attack it.
Nsauditor Network Security Auditor is a free to try software. You can free download and try it for an evaluation period.
Network Security Auditing and Monitoring.
Nsauditor Network Security Auditor is an advanced network security scanner for auditing and monitoring network computers for possible vulnerabilities. The software checks network computers using all potential methods that a hacker might use to attack it. Nsauditor is a complete networking utilities package for network auditing, scanning, monitoring and more. Nsauditor discovers network services and checks them for vulnerabilities. The software retrieves all TCP and UDP endpoints and shows their associated processes. Nsauditor discovers NetBios names, allows to audit MS SQL servers, scan remote computers for common Adware traces and more. The program also includes real-time network packet filtering and analyzing, remote network performance and network status monitoring, web proxy scanning, password auditing features. Nsauditor has intrusion detection system and firewall system to stop internet threats and block unwanted network connections. Nsauditor includes over 45 network tools for IP address lookup, network scanning, sniffing, enumerating and gaining access to machines, DNS and WHOIS lookups, e-mail validation and HTTP traffic generator. Overall, this is a very complete package for a surprisingly low price. The product contains a built-in database of known network security vulnerabilities, which allows you to select the items for scanning and add custom entries. Nsauditor can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios, RPC, SQL and SNMP information, open ports. It can also audit password and security policies as well as make a variety of network attack probes, such as stealth port scans, HTTP / CGI server auditing, registry auditing. Reports can be generated in HTML and XML format.
|| 02 m 45 s
|| 01 m 23 s
|| 42 s
|| 17 s
|| 09 s