We continue our review of the best network security scanners available as we have reached the #15 tool. We will present five more software that were created to scan and reveal network intrusions or weak points. Today you will find informations about Paros proxy, NetStumbler, Dsniff, GFI LANguard and THC Amap.
A lot of the vulnerability scanners that we have analyzed on our website will be very useful for any user that is concerned with issues like network safety, port security and would like to surf the internet without headaches.
#15 Paros proxy (Web vulnerability proxy)
This software is written for people that want to check the security of their web applications. It comes with a free license as it is written in Java. Paros proxy supports proxy authentication, basic and NTLM , individual server authentication; it also comes with a new scanner with configurable options, multiple hosts/threads and generated alerts.
The download page is located here.
#16 NetStumbler (The Windows tool for wireless detection)
This windows tool is provided freely and with no warranty and it help you detect wireless local area networks (WLAN`s) and it uses the 802.11b, 802.11a and 802.11g protocols. This scanner will verify that your network is set up the way you want, it will find poor coverage WLAN locations, detect interferences caused by other networks and unauthorized access points. For the moment there is no support for Windows Vista and Windows 7 but on the developers`s page there`s a mention that support for these OS will come soon.
You will also find a version for Windows CE that will allow you to detect wlan`s from your portable device. You can download it here.
#16 Dsniff (Network auditing and penetration tool)
As mentioned above dsniff is a compilation of network tools designed for auditing and penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI.
You can download this tool here.
An easy to setup scanner that will handle what it knows best: scan the network and ports to detect, asses and corect any security vulnerabilities found. For example, a network administrator often has to deal with vulnerability issues, network auditing or patch management using several products. GFI Languard acts as your personal consultant that will show you the entire “picture” of the network you are scanning, providing risk analysis and help in order to maintain a secure and fast running network. It is specialised in:
- patch management
- network and software auditing
- change management
- vulnerability management
- risk analysis and compliance
- asset inventory
#18 THC Amap (The fingerprinting scanner)
The Amap tool is great for determining what application is listening on a chosen port. It also identifies non-ascii applications by sending trigger packets and then looking up the responses in a given list of response strings.
You can freely download the THC tool from here.