Performs stealth port scans, registry auditing, and HTTP/CGI server checks to simulate potential hacker attack methods. Reporting and Exporting
Checks for known security holes, exploits, and information enumerations across network computers.
Evaluates the strength of network passwords and security policies.
Reports typically include details on vulnerabilities found, misconfigurations, and general network inventory results.
Enumerates installed software, shared folders, user accounts, open ports, and NetBIOS/SNMP information.
Nsauditor simplifies the documentation of security findings by generating structured audit reports:
Collects hardware and software data from network computers without requiring server-side installations.