3.6
8 críticas
545.04 KB
Todos
Calificación de contenido
0
Descargas
WindowsSCOPE Live captura de pantalla 1 WindowsSCOPE Live captura de pantalla 2 WindowsSCOPE Live captura de pantalla 3 WindowsSCOPE Live captura de pantalla 4

Calificación y revisión

3.6
8 calificaciones
5
4
3
2
1

WindowsSCOPE Live descripción

System administrators, security researchers, incidence responders, students and teachers, and hobbyists: perform real-time cyber security investigation and memory forensics of Windows computers from your Android device. Monitor your servers, desktops, and other key computing infrastructure's kernel and critical data-structures and security from your phone or tablet without ever having to bring them down. Create profiles for each of the computers you connect to and quickly switch between them. Simply install the WindowsSCOPE Live server agent on the computers to investigate and begin monitoring them in real-time from your phone for cyber threats.

Once suspicious activity is identified you may also want to download WindowsSCOPE Pro 1.0 (15 day trial available) at www.windowsscope.com for an in-depth cyber security analysis and memory forensics. Find advanced persistent threats, botnets, root kits and other malware through detailed analysis including disassembly, interactive graphing, and comparison with Pro. The WindowsSCOPE blog describes several memory forensics and cyber security use cases at www.windowsscope.com (select blog on menu), as well as, shows video tutorials (see a Pro tutorial accessible from this page). WindowsSCOPE Live and Pro work hand-in-hand to analyze Windows machines at its core (kernel, all drivers, processes, virtual memory translation, imports and exports, etc).

Get the server now at www.windowsscope.com/live for live analysis of critical kernel information for cyber security analysis.

FREE CYBER SECURITY FEATURES:

*View Interrupt Descriptor Table (IDT) in real-time to identify hooked system interrupts caused by rootkits, botnets and other malware
*View System Services Descriptor Table (SSDT) in real-time to identify hooked system calls
*View list of open network sockets to identify suspicious network activity, back doors, and cyber attacks
*Create profiles for any number of computers for security analysis
*Quickly switch between profiles to investigate multiple computers on your network analyzing for advanced persistent threats and other cyber security vulnerabilities
↓ Lee mas