Infiltrator's Features


Infiltrator is powered by an extremely easy to use interface allowing quick access to all of its powerful and unique features. Read on to view Infiltrator's exciting features.

Information Gathering and Scanning

Infiltrator uses the very same scanning techniques that hackers and intruders would use to infiltrate your network and computers. In this fashion, you can see 'what a hacker sees' before they have a chance by scanning your computer in seconds. Infiltrator scans your computer and attempts to enumerate as much information as possible. Information that is enumerated includes, but is not limited to:

NetBios and SNMP Tables
Ping Information
Web Server Information
Registry Startup Keys
Installed Software and Hotfixes
File and Printer Shares

Password Policies
Users and Groups
Jobs and Sessions
Local Security Authority
Computer System Information
Open TCP and UDP Ports

Infiltrator in Action - Screenshots:
 Infiltrator Scan Results
 Scanning Configurations
 Shares Manager
 Open Ports

Security Auditing and Analysis

Infiltrator can audit your scanned computer and alert you of the following events using its own updatable, built-in auditing database:

Insecure Registry Settings
Possible Trojan and Worm Infections
Suspicious Open Ports
Exploitable Services Running
Improper User Account Configurations
Insecure Password Policies

Infiltrator in Action - Screenshots:
 Auditing Results/Analysis  Auditing Configurations

Generate Sleek Scan Reports

Infiltrator can generate brief or complete reports based on your scan results. Brief reports present a short report on what was found on your computer. Complete reports include descriptions and analysis of all results and conclude with evaluations of your computer's security levels.

Infiltrator in Action - Screenshots:
 View a Sample Report

 Report Generator

Many Useful Network Utilities

Infiltrator comes with many built in network utilities, creating a robust suite of networking solutions suitable for any users. Utilities included:

Footprinting Tools
WhoIs Client
Raw HTML Viewer

Scanning Tools
Port Scanner
Ping Sweep

Enumeration Tools
Shares Scanner
Users Scanner

EMail Tools
SMTP Client
EXPN and VRFY Checkers
Email Tracer

Gaining Access Tools
Share Brute Force Cracker
FTP Brute Force Cracker
Password Revealer

Infiltrator in Action - Screenshots:
 Whois Client
 Email Tracer
 Ping Sweep
 Share Brute Force Cracker

User-Friendly, Intuitive Interface

Infiltrator boasts a user interface unmatched by any other network security software. Infiltrator's easy to use, intuitive interface allows you to get started immediately with no having to 'learn the software'. Here are some key features of Infiltrator's powerful interface:

Intuitive Navigation and Action Icons
Easy Access Menu System
Powerful Wizards for Getting Started
Updatable Alerts Database

Infiltrator in Action - Screenshots:
 Infiltrator's Main Interface
 Scanning Wizard
 View a Sample Report
 Quick Configurations
 Scanning Configurations
 Shares Manager
Purchase Infiltrator today to scan, audit, and protect your computer immediately!

Free Trial

Why Infiltration Systems?

Disk Space:

Windows 2000/XP/Vista/7/8
3 MB

  2003-2015 Infiltration Systems. All Rights Reserved.    
Spy Software | Employee Monitoring Software