How to set up smartphones and PCs. Informational portal
  • home
  • Iron
  • A program for diagnosing or testing a network. Free network testing utilities - use them before hackers

A program for diagnosing or testing a network. Free network testing utilities - use them before hackers

Our programs for system administrators will help to keep abreast of everything that is happening in the computer park and the enterprise network, to respond in time to equipment failures and malfunctions in software, minimize costs and downtime. This page contains programs for monitoring the network, servers and hosts, for PC inventory, accounting installed programs and licenses, creating reports on the "hardware" of computers, for accounting for network traffic, for researching network topology and creating graphic diagrams local area networks.

The network administrator can also be useful programs for searching files in local networks and auditing user access to file shares servers over the network. All these programs will help the sysadmin improve the performance of network devices and servers and ensure the proper level of security in the enterprise network.

10-Strike programs are included in the unified register of Russian computer programs of the Ministry of Telecom and Mass Communications and can participate in state purchases.

Network administrator programs, network utilities

Software for inventory and accounting of installed software and hardware on computers in local networks. "Computer Inventory" allows system administrators to keep track of computers in the enterprise network, view configurations remote computers and lists of installed programs over the network, track configuration and software changes. The program contains a powerful report generator. For example, you can create reports on availability certain programs on computers and their number... At planning upgrades can create a report containing computers with insufficient disk or RAM... Windows XP / 2003 / Vista / 2008/7 / 8.1 / 2012/10/2016 are supported.


- a program for monitoring servers and computers on the network allowing you to visually observe the current state of your network at any given time. LANState monitors hosts on the network, monitors connections to network resources, monitors traffic, and signals various events. LANState contains many functions useful for network administrators: broadcasting messages, shutting down remote computers, scanning hosts and ports, receiving various information from remote computers (access to the registry, event log, etc.). Windows XP / 2003 / Vista / 2008/7 / 8.1 / 2012/10/2016 are supported.


- software for monitoring servers and other network devices, monitors the health of the network and notifies the administrator about problems. Find out in time about the failure (disconnection, running out of server disk space, service stoppage, etc.) and fix the problem with minimal loss of time. The program signals problems with sound, screen messages, by e-mail, can run external programs and services, and restart computers and services. Windows XP / 2003 / Vista / 2008/7 / 8.1 / 2012/10/2016 are supported.


- a program for finding files on computers on a local network(via NetBios and FTP protocols). Enter the phrase or file masks and find necessary information... When viewing search results, found files can be immediately opened, saved to disk, or generated a report. The search uses multi-threaded technology, which significantly speeds up the work. You can set filters by file size and modification date. Windows XP / 2003 / Vista / 2008/7 / 8.1 / 2012/10/2016 are supported.


- monitoring program network connections users on the network to shared folder and files, allows you to find out in time about the connections to the computer of network users. The program beeps, displays notifications on the screen, and keeps a detailed log of connections, which records information about who and when connected to network folders computer, what files it opened, etc. Windows XP / 2003 / Vista / 2008/7 / 8.1 / 2012/10/2016 are supported.


3.0 FREE!

- scanner of local networks, IP addresses and hosts... This free program allows you to scan local area network and discover active hosts, computers and servers. It supports scanning of IP ranges and many protocols for discovering network devices (ICMP ping, search for open TCP ports, NetBios, SNMP, UPnP, ...). If you have administrator rights with Windows computers can be considered a lot useful information... Windows XP / 2003 / Vista / 2008/7 / 8.1 / 2012/10/2016 are supported.

Networking kits for sysadmins

System Administrator Kits allow you to save money when buying several of our network programs or all at once. Get three programs for the price of two etc. For example, when buying Complete set of administrator programs in the option " to organize"(no limit on the number of jobs), consisting of our seven programs for network administrators, you can save up to 85,000 rubles or 30%!

Other utilities

- CD cataloger (CD, DVD)... With it, you will quickly find required files on CD and DVD discs your collection. SearchMyDiscs helps organize CD collections and DVD discs allowing you to find desired disk in a few seconds. If you are tired of looking for the right disk every time, this program is for you! Windows XP / 2003 / Vista / 2008/7 / 8.1 / 2012/10/2016 are supported.


- Apache web server raw log file analyzer... Creates various reports and histograms. The program has many settings and filters that will allow you to get exact information about your site, downloaded files, and who comes to you and where. Windows XP / 2003 / Vista / 2008/7 / 8.1 / 2012/10/2016 are supported.

Payment and delivery

When ordering programs legal entities payment by bank transfer is accepted. Invoices are issued in in electronic format, the contract is concluded. Electronic delivery: the distribution kit is downloaded from our website, registration keys will be sent after payment by e-mail. After payment, the original contract and documents for accounting are sent to the buyer by mail.

Issue an invoice (specify required programs and types of licenses, their details and the name of the director for the contract)

All our programs are also presented in the Softkey and AllSoft online stores (follow the "buy" links from our website).


Our clients: small and medium business, state and budgetary institutions, hospitals, schools, colleges and institutes, banks, oil industry, telecoms.


Distribution size: 11.2 MB
Spreading: shareware NetInfo - set of 15 network utilities united in a single interface. Among them are Рing and Trace, which are full analogs of Windows system utilities, but more convenient to use due to the comfortable launch of the corresponding processes. Other utilities include Whois (retrieves information about a domain or IP address from WHOIS databases), Lookup (searches for a domain name by IP address and vice versa) and Finger (displays information about users connected to a specific server). As well as utilities Daytime (shows the local time of day for the specified remote host), Time (synchronizes system time on a computer with remote server providing information about the exact time), Services (checks the availability of network services), E-mail (checks addresses Email for existence), etc. There is no Russian-language localization of the program, and the demo version of the program is operational for 30 days and is almost fully functional (the tools on the "Web Center" tab do not work). Price commercial version depends on the type of license - Home license is calculated for $ 39.99 for home users. The NetInfo window consists of 15 tabs, each for its own utility, but they can be activated differently - by choosing the appropriate command from the "Tools" menu.

To check if the server of interest is "alive", just go to the "Ping" tab, enter the URL in the "Host" field and click on the "Start" button. The report will display the same information that can be seen in the command window after launch system utility Ping - that is, all sent by the specified address requests, as well as the values ​​of the RTT and TTL parameters.

Starting a trace is not fundamentally different - you need to open the "Trace" tab, enter the URL in the "Host" field and click on the "Start" button. The results will show total number transitions and displays a list of all nodes through which the packets passed, indicating the average transit time.

Using the Lookup utility, you can easily find out the domain name by its IP address, or perform a reverse lookup.

Equally easy to get detailed information about the domain or IP-address by activating the "Whois" tab. Developer: AutoNOC
Distribution size: 607 kb
Spreading: free Trace3D - convenient utility for visual display of the path of movement of packages. The program can be downloaded and used completely free of charge (there is no Russian-language localization). To trace, just enter the IP address or hostname and click the "Go" button. The trace results are displayed in a table and 3D graphics, on which different colors the minimum, maximum and average packet transit times are shown. The table lists the names of intermediate hosts and the travel times of packets on each leg of the path. When viewed, the graph can be rotated, moved and scaled. It is easy to visually determine on which part of the network there are difficulties with the passage of packets.

Visual Trace Route 0.8

Developer: IT Lights Software (the utility is no longer supported by the developer, but it can be found on software portals, for example) Distribution size: 595 kb
Spreading: free Visual Trace Route - simple utility for visual tracing. The program can be downloaded and used completely free of charge (there is no Russian-language localization). There are no difficulties in visual tracing in Visual Trace Route. You need to enter the IP address or hostname in the provided field and click on the "Start" button. The results will be presented in the form of a table. It displays the number of hops, IP addresses and names of all intermediate nodes, the average travel time of packets (in numerical and graphically), as well as TTL data at each stage of the path.

HyperTrace 2.03

Developer: AnalogX
Distribution size: 347 kb
Spreading: free HyperTrace is a simple visual tracing utility. The program can be downloaded and used completely free of charge (there is no Russian-language localization). The tracing is organized very simply here - you just need to enter the IP address or hostname in the field provided for this and click on the "Trace" button. The results are presented in the form of a table with a display in it of the IP address, host name, as well as TTL and Loss data for each stage of the path. By default, the percentage of lost packets is not indicated, so you will have to activate the corresponding function in the settings (the "Config" button). To be honest, the Loss data raised doubts among us, since the program for any server, if one was available, consistently indicated 0%, while other utilities were not so loyal.

⇡ Conclusion

We have tried to review several well-known diagnostic utilities, as well as online services... We honestly admit that not all features were considered for such multifunctional solutions as VisualRoute, 3d Traceroute and NetInfo, but only those that may be of interest to the average user. The list of these programs contains both free and paid solutions. Free utilities(but not free editions commercial products) from built in Windows utilities Tracert differ only in more convenient use, but no additional information they do not provide (see table). It's a different matter - paid programs, which not only replace the built-in Windows programs Ping and Tracert, but also turn out to be much more informative than them. Plus, commercial diagnostic utilities provide clarity of testing processes, since they are displayed in one or another graphical form. Especially from all these points of view, the VisualRoute utility stands out.

table... Functionality of utilities for network diagnostics

Programs / Features Checking the availability of a remote host (Ping) Visual tracing of packets (Tracert) Displaying trace results Retrieving data from WHOIS services
VisualRoute(VisualRoute Personal - $ 49.95; VisualRoute Lite - free) +
(by IP address or hostname; Personal version only)
+
Graph, World Map, Table (IP Address, Hostname, Network, Geography, Loss, RTT), general analysis(world map and table only in Personal version) +
(only in the Personal version)
3D Traceroute(3d Traceroute Pro - 23.95 €; 3d Traceroute Freeware - free) +
(by IP address or hostname)
+
(by IP address or hostname)
World map (only in Pro version), table (IP address, hostname, Loss, RTT) +
(in the Freeware version only from one WHOIS service)
NetInfo($ 39.99) +
(by IP address or hostname)
+
(by IP address or hostname)
List (IP address, hostname (not all), RTT) +
Trace3D(is free) - +
(by IP address or hostname)
Table (hostname, RTT), graph -
Visual trace route(is free) - +
(by IP address or hostname)
Table (IP address, hostname, RTT) -
HyperTrace(is free) - +
(by IP address or hostname)
Table (IP Address, Hostname, Loss, RTT) -
Free network testing software - try them before hackers.

There are thousands of applications on the Internet, both free and commercial, which are used by professionals who need to evaluate the network security system. Seven excellent free software ok () to inspect the security of the network. They all help to decide.

The network security inspection process is a four-step process: binding, data collection, penetration, and assessment. At the stage of data collection, a search for network
aggregates using real-time scanning using TCP protocols or Internet Control Message Protocol (ICMP). During the assessment and binding stages, the specific hardware unit on which the application or service is used is identified and potentially vulnerable nodes are examined. At the stage of penetration, vulnerabilities are used for special access to the system with further expansion of rights on this unit or on the domain or throughout the network.

1. Nmap

The Network Mapper (Nmap) program has been in operation for several years and is constantly updated by the author. Nmap - desired program for a specialist in network security, the value of which is impossible to comprehend. Nmap can be used in different ways at different stages of real-time scan acquisition to
detect systems active on a given network. Nmap also has a trick for discovering ACLs (Access Control List) of firewall or router rules through acknowledgment flag verification (ACK) and other methods. Nmap can also be used to scan ports, list services and their version numbers, and prepare distinctive data about operating system... Nmap is a great tool for in-depth inspection and verification of totals automated program scan. Nmap was originally created for UNIX, but in last years was written and in Windows platform... Nmap is open source software.

2. N-Stealth

The assessment stage is one of the most difficult steps inspection of violations but important for the security system. It's easy to recognize active services and the systems that run on them, but find out the level of vulnerability of a particular service? For this there is an effective program for Web services - N-Stealth Security Scanner. The company distributes paid version with more functionality than free, but free version also suitable for simple analysis... For example, N-Stealth searches for vulnerable scripts Hypertext Preprocessor (PHP) and Common Gateway Interface (CGI), SQL Server, common cross-site scripting and other vulnerabilities in popular web servers.

3. Fpipe

Imitate intruder attack - One of the most difficult security procedures that it would be useful to perform on the network, looking for methods to bypass one or more security barriers. Port forwarding or relaying is an example of such a workaround in the analysis or penetration stages, and Fpipe will do a great job of this. To inspect ACLs for firewall rules, router, and other security devices, you can sometimes refer to a specific service that is running on a port, while tunneling traffic or redirecting to the correct TCP port over a different TCP port. For example, there is a router between subnets, which allows only HTTP traffic to pass through TCP port 80. Therefore, you need to establish a connection with an aggregate that works with Telnet (TCP port 23) on a different subnet. If you managed to get into another system on the same subnet where the unit using Telnet is located, then using the Fpipe port relay, you can implement a UDP or TCP “stream” that can encapsulate traffic for TCP port 23 into packets that will pass through like packets on TCP port 80. These packets will go through a router that allows traffic for TCP port 80, and in doing so will be able to enter the affected aggregate, which is already running Fpipe. This port relay "Nullifies" outer wrapper of the packets and forwards the pure TCP port 23 traffic to a specific passenger. There is a similar utility called Secure Shell (SSH) for port forwarding and forwarding.

4. Enum

This is a program for cooking yourself different information O Windows system... Starts from command line with the management console and shows a ton of great information about the Win32 aggregate using the NetBIOS service, which in turn works with TCP port 139. The Enum can display a list of users, system information, passwords, resources, and LSA (Local Security Authority) policy information. With the help of the Enum program, you can implement simple dictionary attacks by brute force on personal local accounts.

Many administrators are familiar with many of the Sysinternals resources and tools. The PsTools complex is also useful for security analysis. The complex name comes from (process listing), a command line program for UNIX. PsTools is a collection of tools that fill the gaps in regular list command line methods and the Windows Resource Kit. PsTools is extremely useful for security analysis and deployment to both remote and local installations. Using a loophole, it is very simple and easy to use PsTools to control the system from a distance and increase the attack range to increase your level of rights. Thanks to this program, a user with local administrative access can run utilities at a distance on another system. In addition to analyzing the degree of security, the PsTools complex is very useful and simple for remote execution of other administrative tasks from the command line (perhaps this was the main task of the developers).

Netcat is known as a mechanism for opening loopholes for an attacker to enter a system (infiltration stage), but little is known about its capabilities as a tool for assessing and binding, as well as performing other operations that make up the standard scheme of network security analysis. It was created for UNIX and only then was it written in Windows. Netcat is an add-on to the UNIX cat command with which you can stream data internals to and from the monitor to view, merge, or modify data. Using the Netcat program, you can write and read information from standard PC I / O aggregates over a TCP / IP network. As a result, the user works with the list of TCP / IP protocols and writes / reads information via UDP and TCP ports. Distinctive feature Netcat has the use of header interception (FTP, SMTP and Telnet), data and file automation, port scanning, binding services to ports at a distance, and many other procedures. Most often, the program is used to connect to a TCP port in order to extract any data from it.

John the Ripper, simple effective remedy for guessing passwords, created on many platforms, the principle of which is the famous UNIX-utility Crack. With John, you can view the capabilities and characteristics of your system to optimize performance. John makes clearly more attempts per second than other password guessing utilities, including L0phtCrack. Also, John not only shows the hashed Windows passwords(NTLM and NT LAN Manager, LAN Manager), but without unnecessary additional settings breaks any passwords that have DES or Ciphertext hashing formats, Blowfish, MD5 or Andrew File System(AFS). John using a dictionary file shows himself as irreplaceable utility for cracking audits and passwords (necessary for every organization, regardless of the degree of security of its policy).

Hello everybody! At work, they decided to raise the router, but before transferring people to it, they decided to test its reliability, and today I was looking for best programs for network testing

In general, I began to perform the test using pings. It is clear that they can be done using and setting the -t parameter, but there are no graphs in it and it is not very convenient to keep logs. Therefore, now I will show what I chose from free normal programs.

Colasoft Ping Tool

This program was not the first one I found, but I liked it the most. I set a nice and understandable graph and specified the packet size in the settings. Here's what happened:

1. Choose required parameters in the Options tab 2. Enter the address that will be pinged and press start ping 3. Next, if necessary, set up the schedule 4. In the left column we see how many packets were transmitted, how many were sent 5. Select all pings and save if necessary.

This program is also quite interesting, it can build a graph, ping and trace the route! But because of the schedule, I didn't like it so much.

Here, almost everything is the same, we enter the address that we will ping and press ping. But here you can also do tracing. In general, the program is also pretty good.

This program is more suitable for short-term pinging and a program with less capabilities.

Here we enter the address, how long it will take to ping and the size of the packets, press start and observe the graph.

I found this program purely by accident, it is designed to test the best server on tanks, but I slightly altered it to fit my needs and the program began to check the reliability of the network 🙂

Here we just press start. It pings Yandex and Google, then shows their values ​​and says which server works better. In the parameters, you can set the number of packages.

This is how you can check the reliability of the network or your network device... Of course, it is better to disable the firewall before checking. For better testing, next step you also need to connect your computer to the network and try to at least copy the files over the network and run the ping program. I think with these free programs for network testing, you can bring out the best network hardware or provider 🙂

Top related articles