0% found this document useful (0 votes)
97 views2 pages

SecPoint Penetrator Schematics

Specpoint Penetrator schematics
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views2 pages

SecPoint Penetrator Schematics

Specpoint Penetrator schematics
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

SecPoint® Penetrator™

Vulnerability Scanning Appliance

SECPOINT® PENETRATOR™ SCHEMATICS


Vulnerability Scanning Appliance - Penetration Testing Capabilities

ALL SENSITIVE INFORMATION STORED ON DEVICE


Host info CVS Versions Finger Execution Apple Quicktime Checks
www.secpoint.com Host lookup Telnet Versions Backdoor Checks mDNS Checks
Firewall Checks TCP Stamp Backdoor Execution Checks cslistener Checks
Traceroute ICMP Stamp Backdoor Services APC Service Checks
√ F
ull Privacy, Data Collec-
Identify protocols DNS Checks NNTP Checks HP Checks
tion & Backdoor Free Ike checks Xfer Checks NNTP execution Novell Checks
Backdoor Free Whois Information Time Checks Oracle Checks McAfee Checks
√ L
ethal Attack SQLi, Blind NS Lookup Vhost Checks Ibm DB2 checks Symantec Checks
ICMP Tests DNS Checks Postgresql Checks Flash Checks
SQLi, RCE Crawler Ping Tests HTTP Date checks Mysql Checks Borland Checks
√ 1
2 Scan Profiles, Bind checks Filter Checks Mssql Checks AlphaStor Checks
TCP Portscan Stateless Checks X11 Checks SUN Java Checks
HIPAA,OWASP top 10, UDP Portscan Reverse Traffic Checks IMAP SSl checks Firewall 1 Checks
Prepare for PCI, Firewall OS Checks VoIP Checks IMAP Execution Eudora Checks
Scan, SCADA and more Isolate Ports VPN Checks SSH Checks RSA Checks
Protocol Testing Asp Checks Gopher Checks Citrix Checks
√ A
dvanced Web Crawler - Mail Protocols Sequenche checks Amanda Checks Panda Checks
SQL Injection - XSS - SSL FTP Protocols TCP Sequenche Checks IRC Checks SAP Checks
SSH Protocols Ipid Checks HTTP Web Server Checks TeamSpeak Checks
Vulnerabilities
Telnet Protocols Firewall Tests HTTP Execution Multiple Game Checks
√ B
ugtraq ID / Mitre CVE / HTTP Protocols Rsync RPC Checks World in Conflict
Ubuntu USN / Microsoft / RTSP Protocols POP3 Brute Force NFS Checks Gmotor
SSL Checks POP3 Buffer Overflow Netbios Checks Quake 4
OSVDB IMAP Protocols Attacks Win RPC Checks Dropteam
√ S
chedule scans POP2 Protocols POP3 SSL Netbios Users Prey
POP3 Protocols SNMP Checks Netbios Execution Americas Army
daily,weekly,monthly Version checks SQL Injection Crawler Netbios Service Checks Soldat
√ Prevent Hackers To Access Bind Versions SQL Blind Injection Denial of Service attacks Trend Micro Checks
LCD Versions XSS Injection Crawler System DoS BlackBerry Checks
Your Server Linuxconf Versions XSS Reflected Deamon DoS VNC Checks
√ Vulnerability Scanning RTSP Versions Information Error Crawler Heavy Brute Force Brightmail Checks
Worldclient Versions Execution Crawler Heavy Executio Attacks Chrome Checks
√ Vulnerability Assessment FTP Versions RSAWeb Check Mail DoS Macromedia Checks
NNTP Versions Web Firewall Checks POP3 DoS Juniper Checks
√ 63.000 + Vulnerabilities SSH Versions CGI Web Checks IMAP DoS Counter Strike Checks
√ Launch Real Exploits and Mail Versions Command Execution NNTP DoS Apache Checks
HTTP Versions Web Checks POP2 DoS IIS Checks
Denial of Service Attacks POP2 Versions Information Disclosure Web IDENT DoS BitTorrent Checks
√ Distributed Scanning POP3 Versions Checks Ftp DoS ARCServe Checks
NTTP Versions XSS Web Checks HTTP DoS CA Checks
Capability IMAP Versions SQL Injection Web Checks CGI DoS BrightStor Checks
√ Scan any OS or Network Ebola Versions Web Overflow Attacks RTSP DoS cPanel Checks
Imsp Versions SSL Cert Checks NetSphere Checks Halflife Checks
device Mssql Versions SSL Ports Sopcast Checks AOL Checks
√ Reports Branding Mysql Versions FTP Brute Force Router Checks Watchguard Checks
Gopher Versions FTP Command Execution Apple iPhoto Checks SCO Check
√ Detailed Remedies for Finger Versions FTP Overflow Comdial Checks
Identified Vulnerabilities Amanda Versions FTP Upload Checks Sophos Interface Checks
HTTP Versions FTP SSL Cisco Check
√ Secure Design All Data Mail Execution
Stored on Unit Mail Overflow
Mail SSL
SecPoint® Penetrator™
Vulnerability Scanning Appliance

Specifications SecPoint® Penetrator™ SecPoint® Penetrator™ SecPoint® Penetrator ™ SecPoint® Penetrator™


4-32 IPs 8-64 IPs 128-256 IPs 512-2048 IPs

Height Small Form Factor (SFF) 1U Rackmount 1U Rackmount 1U Rackmount

SFF without packing: 2,5 Kilo


SFFwith packing: 3,5 Kilo 1U without packing 6,5 Kilo 1U without packing 6,5 Kilo 1U without packing 6,5 Kilo
Weight
1U without packing 6,5 Kilo 1U with packing 8,5 Kilo 1U with packing 8,5 Kilo 1U with packing 8,5 Kilo
1U with packing 8,5 Kilo
60W power supply 200W Power supply 200W Power supply 200W Power supply
Power Supply AC/DC 90-264V AC/ DC90-264 V AC/ DC90-264 V AC/ DC90-264 V
Full Range Full range Full range Full range
Operating : 0°C to 40°C Storage: Operating : 0°C to 40°C Storage: Operating : 0°C to 40°C Storage: Operating : 0°C to 40°C
Environment Temperatures
-25°C to 75°C -40°C to 85°C -40°C to 85°C Storage: -40°C to 85°C
Redundant Power Supply - - √ √
Dual processor - - √ √
10/100/1000 10/100/1000 10/100/1000 10/100/1000
Network 10/100/1000 Mbps
Ethernet interfaces Ethernet interfaces Ethernet interfaces Ethernet interfaces
63.000 + Vulnerabilities √ √ √ √
Launch Real Exploits & Denial of Service √ √ √ √
Allowed to Change IP Addresses √ √ √ √

Distributed Security Auditing √ √ √ √

Automatic database and software updates Yes Yes Yes Yes

Features
Security Audit Features Finds Cross Site Scripting, Penetration Testing
√ Vulnerability assessment SQL Injection and Web Errors √
Launch real exploits for Windows, Unix,
√ 63.000 + vulnerabilities √
Automatic web crawling engine identifies Routers, Firewalls and more
√ Unlimited auditing known and unknown files on websites √ Launch real denial of service attacks
√ No software installation √
Finds Cross Site Scripting √
Launch distributed denial of service
√ Advanced audit options √ Finds Cross Site Scripting Reflected via distributed setup
√ Launch real exploits √
Finds SQL Injection
√ Security audit any OS √
Finds Web Errors
√ Automatic web crawl script
Automatic Update
√ Black Hat SEO Scanner √ Automatic daily database updates
√ OS independent interface √ Google Hack DB √ Automatic firmware updates with new
√ SANS top 20
features and functionality
√ Malware Detection
√ Lethal Attack - SQLi - Blind SQLi Multi User Support √ Centralized update point

Supports multiple users to login at the same time √ Automatic alerts when database is expired
√ Individual user accounts with different √ Option to upload updates manually via the
Easy-to-understand Reporting audit options and IP ranges interface

XML PDF and HTML reports √
Individual user security level
√ Reports branding allowed √
Admin and regular users
√ Option for syslog remote logging
Support & Maintenance

One year database subscription included
Scheduled Auditing √ Full support included in price
Distribution Security Auditing √
Automatic scheduled auditing √ Option for instant replacement hardware

Security audit remote locations √
Automatic alert about new identified √
Web-based user interface (https)
from a centralized point security vulnerabilities √
Quick setup wizard
√ Centralized reporting √
Shows new vulnerabilities discovered √
Configuration backup/restore

Centralized data storage and compares them with old records to √
Email alert and logging via syslog

Centralized control show the progress in the security level √
Build-in diagnostic function

Security Audit Configuration

Virtual host auditing Scalable and Upgradeable Security Scanning of:

Audit specific ports √
All units can be upgraded for network √
Wordpress, Drupal, Magento, Shopify, Umraco,


Audit specific web directories growth via a software license Joomla, Webshops

Email notification when an audit is finished √
Investment protection

E-mail: info@secpoint.com VAR/VAD Contact

www.secpoint.com

For more information on Penetrator, please visit


https://www.SecPoint.com/penetrator.html

Copyright © 1998-2021 SecPoint® www.SecPoint.com All rights reserved

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy