Centurion is a security scanner, it had had many names and will probably be renamed
again, it's BLOODY hard to find a name that haven't been used yet. The page below
tells what the old centurion scanner could do, there is a newer one that i haven't
released. 

The new scanner will feature

	Account & Password auditing (Bruteforce search + Application passwords)
	Network scanning (Port, Services etc)
	Registry Setting.
	A lightweight forensics toolkit may be included.
	A scripting language was under development and i may continue to work on it.
	Vulnerability scanner + user scanner (it's programmable)
	Web/Frontpage checks.
	DoS attack checks.
	Hotfix and SP evaluation.
	Application scanner. (i.e. mail systems & more)
	Ability to peak into hardware
	Backdoor/Trojan checks.
	New GUI.

	Ideas:
	Linux and Netware support as well...?!?!?

	(To decrease false positives it will check Hashes of files instead
	 of dates and it will not react to network servicebanners. Not that
	 it have ever reacted to banners instead of files. Anyway...)


(Below this line is old info.)

Centurion Global Security Scanner.

System requirements

- Operating System Supported Windows NT Workstation 4.0 Windows NT Server 4.0 Service packs 1 to 4 (5 to be added soon) Any language version that supports western numbers and characters. - Year 2000 Compatibility As Y2K compatible as my compilator is (VB6) (* Centurion is not adressing ANY hardware except for that reported by the system so there should be no problems anyway...)

Features

- Denial of service vulnerabilities A comprehensive analysis of the DoS attacks that could occur against your system. - Registry Scan Takes a look on the registry and it's settings that affect security on your computer. - File Scan An check on the binarys that are installed on your system. - Internet Server Services Here, the program takes a peak on your settings and binarys of your Internet Server. - Patch and Servicepack evaluation Centurion reports the status of your system upgrades and fixes. - Account Policy The account policy are checked for settings that could be exploited. - User accounts Individual user accounts will be checked for weaknesses. - Hardware Analysis Analysis of Hardware that affect security in your computer. - Sniffer detector A generic probe for drivers or programs that could compromise your network.

Here is an example of the interface.


Here is an extract of the HTML documentation generated by Centurion


Organisations who have evaluated earlier versions of Centurion (1998-1999)
(All these according to Internic, Ripe, Arin and Apnic and my IIS logs)

	The National Security Agency (Usa)
	The United States Navy (Usa)
	The United States Airforce (Usa)
	The Pentagon / 7th Communications group (Usa)
	IBM (Israel)
	Microsoft (United States)
	Network Security Solutions LTD (United Kingdom)
	March Systems LTD. (United Kingdom)
	Telia Network Operations Center (Sweden)
	The University of Tokyo (Japan)
	SPP (Sweden)
	ABB IT-Partner AB (Sweden)
	Telenor Comma AB (Sweden)

_____________

If you want to contact me regarding this page:






1