Home » » Auditor security collection

Auditor security collection

Written By xx on Rabu, 28 Desember 2011 | 21.02

Auditor security collection
Author: 2003-2005 Max Moser
URL: http://www.remote-exploit.org

The Auditor security collection is a Live-System originaly based on Knoppix. Since 2005 its based on Kanotix,
which has major improvements. With no installation whatsoever,
the analysis platform is started directly from the CD-Rom and is fully accessible within minutes. Independent of the hardware in use,
the Auditor security collection offers a standardized working environment,
so that the build-up of know-how and remote support is made easier.
Even during the planning and development stages,
our target was to achieve an excellent user-friendliness combined with an optimal toolset.
Professional open-source programs offer you a complete toolset to analyze your safety,
byte for byte. In order to become quickly proficient within the Auditor security collection,
the menu structure is supported by recognized phases of a security check.
(Foot-printing, analysis, scanning, wireless, brute forcing, cracking).
By this means, you instinctively find the right tool for the appropriate task. In addition to the great amount of tools,
the Auditor security collection contains further background information regarding the standard configuration and passwords,
as well as word lists from many different areas and languages with approx.
64 million entries. Current productivity tools such as web browser,
editors and graphic tools allow you to create or edit texts and pictures for reports,
directly within the Auditor security platform. Many tools were adapted, newly developed or converted from other system platforms,
in order to make as many current auditing tools available as possible on one CD-ROM.
Tools like Wellenreiter and Kismet were equipped with an automatic hardware identification,
thus avoiding irritating and annoying configuration of the wireless cards.
No other commercial or freely available analysis platform offers an equivalent level of usability
with automatic configuration and focus on penetration testing.
Share this article :


Poskan Komentar

Diberdayakan oleh Blogger.





Support : DistroKiller | DistroKiller | DistroKiller
Copyright © 2013. DistroKiller - All Rights NO Reserved
Template by Creating Website
Proudly powered by Blogger