Network security-auditor


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Network security-auditor

  1. 1. HOME PURCHASE PRODUCTS CONTACT US SUPPORT RESELLERS Nsauditor Network Security Auditor Network security is not just a set of locked doors and passwords. A truly secure environment is an ever changing entity which requires constant care and monitoring. How Secure Is Your Network? Audit and Test Your Network Security with Nsauditor! Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite includes more than 45 network tools and utilities for network auditing, scanning, network connections monitoring and more. Nsauditor is Network Security and Vulnerability Scanner that gives you the pow er to scan, detect and correct any potential security risk on your network. Nsauditor allow s monitoring network computers for possible vulnerabilities, checking enterprise netw ork for all potential methods that a hacker might use to attack it and create a report of potential problems that w ere found. Nsauditor helps netw ork administrators to identify security holes and flaw s in their netw orked systems. The program also includes firew all system, real-time network monitoring, packet filtering and analyzing. Nsauditor significantly reduces the total cost of netw ork management in enterprise environments by enabling IT personnel and systems administrators gather a w ide range of information from all the computers in the netw ork w ithout installing server-side applications on these computers and create a report of potential problems that w ere found. A network monitor tool provides some insight into services running locally, w ith options to dig dow n into each connection and analyze the remote system, terminate connections, block unw anted netw ork connections w ith incrusted firew all system and view data on the associated process. Overall, this is a very complete package for a surprisingly low price $69.00 ( VIEW COMPARISON CHART ) Nsauditor 1 User License ( 69.00$ ) Order Now! Top Reasons why Nsauditor is right for you: 1. No Limitations W ith Nsauditor 1 user license you can scan all computers in your company w ithout limits. Recent version: 2.4.1 2. Ease of Use Nsauditor is the easiest to use toolkit on the market. Full version for only $69.00 3. Quality We deliver highest quality and stable programs.W indow s 7/2000/XP/2003/Vista 4. Support We grant you unlimited 24 / 7 support. Youll get all future versions for free. Your softw are license is yours to use FOREVER. No monthly, Free to Try 15 Days yearly charges, you pay just a one-time purchase price! 5. Scalability We keep our softw are cost on comfortable level $69.00 6. Affordability We offer attractive discount prices for Multi-User Licenses BUY NOW | DOWNLOAD | NETWORK AUDITING DEMO | AWARDS Nsauditor Network Security Auditor Screencast PURCHASE BUY NOW MULTI-USER LICENSE PRODUCTS NSAUDITOR PRODUCT KEY EXPLORER BACKUP KEY RECOVERY SPOTAUDITOR PASSWORD RECOVER BLUEAUDITOR SHAREALARMPRO REMSHUTDOW NETSHAREWATCHER NETWORKSLEUTH FOLLOW US 9 EMAIL SUBSCRIPTION Enter your Email to be Notified of Softw are Updates: converted by
  2. 2. Related product: Network Software Inventory - Software License Tracking Solution! Get Updates Nsasoft Network Software Inventory is softw are license tracking solution. The softw are scans netw ork and displays complete softw are information! Nsasoft Netw ork Softw are Inventory is a POPULAR ARTICLES pow erful netw ork inventory softw are for home, office and enterprise netw orks. The softw are scans all computers on a netw ork and generates complete reports about computers softw are. It is Network Security & Vulnerability integrated IT Help Desk, Asset management & Softw are license management solution. Netw ork Network Security Software Softw are Inventory helps technicians to understand the problems w ith the softw are license Wireless Network Security compliance and the use of unauthorised softw are in the organization. Nsasoft Netw ork Softw are Inventory allow s to get a complete picture of Purchased Vs installed softw are for managing the Network Security Auditing softw are licenses. Associate the minor versions and allocate softw are licenses for all your Network Access Control "Managed Softw are" in the netw ork. Company Security Policy Home Network Security BUY NOW | DOWNLOAD | MORE INFORMATION | | 29.50$ Software Comparison Network Monitoring Computer Network Related product: Network Inventory Hardware Software Inventory - Scans network and displays complete hardware & software information Network Auditing Network Security Nsasoft Hardware Software Inventory is a pow erful netw ork inventory softw are for home, office Network Scanner and enterprise netw orks. The softw are scans all computers on a netw ork and generates complete Internet Security reports about computers hardw are and softw are. This information is added to the centralized database and then users can generate reports about each or all of the PCs on a netw ork. The Network Attack program is agent free and requires no softw are installed on remote machines. Nsasoft Hardw are Encryption Softw are Inventory - Scans netw ork and displays complete hardw are and softw are information! Firewall The softw are can export reports to Tab Delimited Txt File (.txt), Excel Workbook (.xls), CSV Comma Data Recovery Delimited (.csv), Web Page (.html) or XML Data (.xml) file, SQLLite3 Database. Highly recommended Ethical Hacking for budget-conscious companies looking for a feature rich netw ork inventory tool. WebSite Security Antivirus Software BUY NOW | DOWNLOAD | MORE INFORMATION | | 69.00$ Computer Security Information Security Cloud Computing Related product: Intrusion Detection NBMonitor Network Bandwidth Monitor - Network Monitoring Password Recovery Product Key Recovery Need to track your Internet bandwidth usage? Software License Compliance NBMonitor Network Bandwidth Monitor can Really Help Y ou to do it! As a number of ISP’s are now disconnecting customers for using “too much” bandw idth, know ing VOLUME LICENSING exactly how much you’ve dow nloaded or uploaded in a given month can be very helpful. NBMonitor tracks your Internet bandw idth (upload and dow nloads) usage, monitors all your Internet, it show s Join our Volume Licensing all the active connections you have to the Internet at any given moment and also the volume of Program and achieve substantial traffic flow ing through them. NBMonitor displays real-time details about your netw ork connections savings on purchases of 5 or more and netw ork adapters bandw idth usage. Unlike others, it show s process names initiated netw ork Softw are licenses. connections and allow s you to set filters to capture only the traffic you are interested in. VOLUME LICENSING » BUY NOW | DOWNLOAD | MORE INFORMATION | | 17.50$ TESTIMONIALS "Very broad collection of netw ork a udit tools. We think this is one of Related product: the best integrated netw ork multi- BlueAuditor - BlueAuditor Monitors Mobile Devices in Wireless Network tools w e have looked at." BlueAuditor - Scan and Monitors mobile devices in a w ireless netw ork! BlueAuditor is a w ireless SC MAGAZINE personal area netw ork auditor and easy-to-use program for detecting and monitoring mobile devices in a w ireless netw ork. It can discover and track any mobile device w ithin a distance MORE TESTIMONIALS » betw een 1 and 100 meters and display key information about each device being detected as w ell as the services device provided. W ith the grow ing popularity of w ireless technology, BlueAuditor w ill enable netw ork administrators to effectively audit their w ireless netw orks against security AWARDS vulnerabilities associated w ith the use of mobile devices. BlueAuditor enables the user to save the data of the detected mobile devices in an .xml file and supports the most Microsoft drivers available on the market. All the mentioned features are provided w ith a user friendly graphical interface BUY NOW | DOWNLOAD | MORE INFORMATION | | 19.50$ Nsauditor Key FeaturesAUDITOR MORE AWARDS »Netw ork Auditor is a tool to discover the netw ork services and to check them for discovering w ell know n securityvulnerabilities. This tool creates an audit report in HTML and XML formats. SUPPORT Free 24 / 7 SupportNETWORK MONITORNetw ork Monitor show s detailed listings of all TCP and UDP endpoints, including the ow ning process name and Free Lifetime Upgradesdetails, remote address and state of TCP connections, as w ell as the host dns name, country , netw ork class, VISIT OUR SITEappropriate service name and service description. EMAIL US HERENETBIOS AUDITORNetBios Auditor is a tool to discover NetBios names. NetBios names are the names of the Services and Machines.NetBIOS Scanner is a pow erful and fast tool for exploring netw orks , scanning a netw ork w ithin a given range of IP CUSTOMERSaddresses and for listing computers w hich offer NetBIOS resource sharing service as w ell as their name tables and Nsasoft products may be found inNetBIOS connections. After the NetBios audit process is over you w ill get general information about the remote businesses all over the w orld,computer including IP Address, Machine , Workgroup, Sharing, Ethernet Address, Adapter Producer. Also you w ill including international companies,get information about w orkstation users, groups, machines. For each selected option ( Users, Users Log, Machines, non profit & government agencies,Groups ) the appropriate fields w ill be show n. The w orkstation info w ill be available too. For each selected option ( educational organizations.NB Names, Services, Programs, Info, Hotfixes, Run, URLs) the appropriate fields w ill be show n. You w ill also get the MORE CUSTOMERS »information about Account Policies ( including Policy and Security Setting ) and Shared Resources. The informationabout Shared Resources depends on the selected option ( Shares, Hidden Shares, Connection , Brow ser HelperObjects ).MS SQL SERVER AUDITORThis tool allow s to perform an audit on a machine running MS SQL server. converted by
  3. 3. SNMP AUDITORSNMP auditor is a tool that allow s to w alk through all SNMP MIBs of your nodes and to audit SNMP communitynames using values stored in xml database.PACKET FILTERPacket Filter provides a real-time netw ork PACKET FILTERING a nd analyzing. PACKET SNIFFER filters the packet by all IP,ICMP, TCP, UDP, NETBIOS-SSN packet header fields.PACKET EDITORPacket Editor is a tool to decode IP, ICMP, TCP, UDP, NETBIOS-SSN packets.SUN RPC AUDITORAudit Sun RPC uses ONCRPC (Sun RPC) protocols to access the port mapper daemon/service that typically runs onport 111 of UNIX or Linux machines. This tool includes a port mapper to dump w here a list of all running registereddaemons are show n.MS RPC AUDITORAudit MS RPC, is a Microsoft implementation of DCE RPC. The auditor dump is a list of named pipes that are used byW indow s RPC services as endpoints. The interface identifier associated w ith each named pipe represents theservice typically accessed w hen a given named pipe is used.PORT SCANNERPort Scanner is a fast TCP / UDP SCANNER, a tool that detects if certain TCP / UDP ports are open and acceptsconnections. TCP scanners are usually used to check if the remote computer runs services (e.g. Telnet or FTP). Themain function of the port scanner consists in sending messages to the user-defined port list .The type of receivedresponse indicates w hether the ports are opened. Port Scanner has the follow ing scan modes: connect scan, SYNstealth, FIN stealth, Ping sw eep, UDP scan, NULL scan, XMAS tree, IP protocol scan, ACK scan.WEB PROXY SCANNERCGI probes are sent against w eb servers. This tool provides an ability to turn them off and if the user is running anaudit from a proxy server, he/she can configure the scanner to run CGI probes through that proxy.ADWARE SCANNERAdw are Scanner searches the registry and gives you a quick look at the Adw are, malw are and spyw are installed onyour computer or in the range of netw ork computers.REMOTE SYSTEM OS DETECTORNsauditor does OS detection and automatically creates OS fingerprints w hich are not included in database .LM / NTLM SPIDERLM / NTLM Spider is a passw ord audit and recovery tool. Passw ords are sources of security vulnerabilitiesin different machines. This tool allow s to identify and access passw ord vulnerabilities.DNS LOOKUPDNS lookup converts IP addresses to hostnames and vice versa and obtains aliases. DNS lookup performsadvanced DNS queries, such as MX or CNAME. The full query list contains A, NS, MD, MF, CNAME, SOA, MB, MG, MR,NULL, W KS, PTR, HINFO, MINFO,MX,TXT,AXFR,MAILB,MAILA,*. DNS Lookup supports checking if the host is in a Real-time Black list for spammers "RBL ".EMAIL VALIDATEThe Email Validate Tool is a client utility for checking the validity of an email account.ENUMERATE COMPUTERSEnumerate computers is a tool to enumerate computers in a domain. Depending on enumeration parameters thetool can enumerate all computers , SQL servers , primary and backup domain controllers, etc.PINGPing is a tool that provides an opportunity to verify that the specified IP address exists. This tool is used to ensurethat a host you are trying to reach is accessible. Ping also can be used w ith the reachable host to see how long ittakes to get the response back. Also you can get information about the operating system of remote host .TRACE ROUTETrace Route is a tool that traces the route (the specific gatew ay computers at each hop) from a client machine tothe remote host by reporting all router IP addresses betw een them. It also calculates and displays the durationthat each hop takes. Trace Route is a handy tool for both understanding w here problems exist in the Internetnetw ork and for getting a detailed sense of the Internet itself.FINGERFinger is a tool for discovering user information by using w ell know n finger service. Using Finger tool makes possibleto get "Abuse Address" of remote host. For example to get the abuse address of you should in the finger input section. As a result you w ill receive ( in the finger response section.WHOISThis tool w ill lookup information on a domain, IP address, or a name. You can select a specific W hoIs Server, or youcan use the Default option for the default server.TRAFFIC EMULATORNetw ork Traffic Emulator generates IP / ICMP / TCP / UDP / HTTP traffic to STRESS TEST SERVERS, ROUTERS ANDFIREWALLS under heavy netw ork load. It is a very simple and fast program w hich can SIMULATE CLIENT ACTIVITY.SIP - SESSION INITIATION PROTOCOL UDP TRAFFIC GENERATOR - FLOODERSIP UDP traffic generator / flooder generates SIP traffic to stress test voice over IP systems, SIP programs andimplementations under heavy netw ork load. You can randomize source port, include or exclude SDP, change numberof packets to send, change SIP and SDP message templates to send various types of SIP messages INVITE, ACK,CANCEL, OPTIONS, REGISTER, BYE . converted by
  4. 4. HTTP TRAFFIC GENERATORHttp Traffic Generator is a tool that generates an http traffic to the specified URL .REMOTE SHUTDOWNRemote Shutdow n allow s remotely shutdow n or restart netw ork computers.TCP/UDP CLIENT/SERVERThis is a useful tool for testing some services, firew all and intrusion detection systems. This tool also can be usedfor debugging the program and configuring other netw ork tools.PORT REDIRECTORThis is a useful tool for testing some services, firew all and intrusion detection systems. This tool also can be usedfor debugging the program and configuring other netw ork tools.LOCAL IP, TCP, UDP and ICMP STATISTICSThis tools show s the IP, TCP, UDP and ICMP statistics. Analyzing this statistics allow s the detectionof different kinds of netw ork treatments as w ell as port scanning probes and netw ork attacks.WEB LOG ANALYZERWeb Log Analyzer parses the default file access.log w hich is w ritten by Apache Web-server, converts it to XMLdocument and analyzes the output XML file.IP ROUTING, NET TABLEIP Tables provides the tool to retrieve an information related to interface-to-IP address mapping table, IP routingtable, IP-to-physical address mapping table. This tool show s the details about each IP address in the table. Theeach part of the table contains information about IP address including address, interface index, subnet mask,broadcast address, reasm size.LOCAL ADDRESSING INFORMATION TABLEThis tool show s the available netw ork interfaces and their IP addresses, Netw ork Mask, Broadcast addresses, PPP,Multicast and Loopback modes.LOCAL NET TO MEDIA INFORMATION TABLEThis tool show s the available netw ork adapters and their MAC address, Subnet mask, Gatew ays, DNS servers,W INS servers, DHCP, interface names ,etc.IP / ASN COUNTRYIP / ASN is a tool to determine w hich country an IP address or autonomous system number is assignedto . This tool supports tw o w ays of finding the country; searching by IP address or autonomous system number.PROCESS MONITORProcess Monitor is a tool to display the list of the processes currently running on computer and to showthe program name, the unique process ID, the full path of program executable file, the name of the filemanufacturer, and the name of modules and kernel objects used by the selected proces s.MAC / VENDOR LOOKUPThis tool allow s you to get information about adapter manufacturer. The only thing you need is to fill the full MACaddress ( ex. 00:80:48:2A:83:41 ) or only the first part of MAC address ( ex. 00:80:48 ).REPORT VIEWERReport tool allow s to view all netw ork security audit reports generated in XML or HTML format and open selectedreport in an internal report view er.DHCP ExplorerDhcpExplorer allow s you to discover DHCP servers on your local subnet or LAN and discovers DHCP serverconfiguration parameters.Post SubmitPost Submit allow s to POST submit your data, URL or other information. The program includes simple database thatallow s you to submit your w eb site to the Internets biggest search engines - directories and request domain w hoisinformation. The program allow s to add, edit and save your data to XML document and load it from XML file.NetTaskExecThis tool schedules programs and commands to run on local or netw ork computers. You must have administrativeprivile ge s on the netw ork computer and schedule service must be running in order to execute a command orcomputer program.Remote Windows Service ControlServices are critical system components. Running in the background, they are w idely used in the operating systemto control hardw are, monitor applications and support all system level functions. This tool controls the status ofyour netw ork services and allow s to start or stop remotely.Network Hotfix ScannerNetw ork Hotfix Scanner is a advanced hotfix check utility that scans netw ork computers for missing hotfixes andpatches, and helps you dow nload and install them. Netw ork Hotfix Scanner gives you a quick look at the hotfixesand patches installed or missed on any remote computer in your corporate netw ork, it tells you by colored iconsspecific security bulletin rating ( critical, important, moderate ), title, description and bulletin URL.Remote Network StatisticsRemote Netw ork Statistics displays remote netw ork computer IP, ICMP, TCP, UDP and Server statistics.NetProcMon - Network Process MonitorThis tool allow s to monitor and kill processes on local or netw ork computers .Removable Storage ExplorerPortable Storage Explorer displays remote netw ork computer USB devices, removable storage, CD-Rom and DVDdrive information and state, drive type, serial number, revision, device name, last cleaned time, device vendor andmore...Intrusion Detection System based on security Events analyzerNsauditor have incrusted intrusion detection system based on Security Event Log analyzing. converted by
  5. 5. Security Event Log MonitorSecurity Event Log Monitor monitors the security event logs of W indow s NT/2000/XP servers or w orkstations andnotifies of the possible intrusions/attacks by using E-mail, Net Send, Speech Recognition method or by playing userselected voice file.Internet Explorer cache manager - IE CacheExplorerIeCacheExplorer displays the details of all cookies that Internet Explorer stores on your computer, reads allinformation from the history file on your computer and displays the list of all URLs that you have visited. It alsoallow s you to clear history, delete cookies and temporary internet files, saves the results in the file or copies toclipboard and opens the appropriate URL.Firewall ControlsPersonal firew all provides home users and small-business ow ners w ith the highest level of protection. It stopsknow n and unknow n Internet threats and blocks unw anted connections. HOME PURCHASE PRODUCTS CONTACT US SUPPORT RESELLERS COPYRIGHT © NSASOFT LLC 6/27/2012 05:36:13 PM converted by