Apply the free tools below to find vulnerabilities in your site and to secure it.
You can see if your site leaks sensitive information.
This can be to Google and other search engines
This can be databases, usernames, passwords, confidential documents or other high valueable files.
Often sensitive information is laying without password protection or any kind of restrictions that allows the search engines to quickly index it.
Even when you remove it from your site there will be a cached version on the search engines.
All the Tools here , the NetBIOS Scanner, Port Scanner and Google Hack Database.
Having unprotected shared example on your laptop can be a risk if you enter a network and people can access your open shares without password protection.
The share scanner allows you to scan your local and public IP addresses for open shares and to secure your systems before you loose sensitive data from your computer.
Find out if you have sensitive ports with open data being exposed to the Internet.
That can be a risk that allow remote attackers to attack your ports.
Audit your firewall setup and see if the firewall is doing a correct protection of your site.
You can scan public as well as local IP addresses with the tool.
Use the free tools to find open NetBIOS shares across your network. Use the Port scanner to identify open ports you might have locally and publicly to the internet.
With Google Hack Database you can find out if your site is leaking sensitive information that has been indexed by search engines.
|➤ Related pages|
Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software
SecPoint is specialized to deliver the best IT security solutions and products.