Nift is a user-friendly interface for footprinting techniques and tools that are readily accessible, designed for easy navigation and usage.
One of the key features of Nift is the option to ignore hosts that have already been identified on the network during the pingscanning process. This results in less clutter being found in logs, enabling administrators to focus their efforts on the areas of concern. Another useful feature is the ability to use wingates whenever possible, either provided by the user or automatically discovered on the network.
Nift also includes Spoofed Decoys that are used to throw off AIDS and to verify whether decoy addresses provided are still alive, preventing syn flooding of the host. The software will change the time-to-live (ttl) of the source IP address when decoys are used to ensure that the host does not use packet source accounting and keep the user's IP from being singled out.
Another feature of Nift is the ability to trust banners to determine possible exploits, or test the exploits themselves. While trusting banners may be a safer option, it will result in many false positives.
The latest release of Nift has removed Netcat support and Queso OS Detection. Instead, the software has added a SOCK_STREAM client to enhance banner grabbing and Enumeration, and basic service enumeration code to further fortify network security measures. There are also more data catches and colorized output fixes, as well as a new progress bar.
The logging feature has been disabled until the 1.0 beta release, as the GUI needs to be redesigned to accommodate it. Additionally, the traceroute and ICMP Discovery scan types have been combined, and work has commenced on the Firewall ruleset detection code.
Overall, Nift is a highly effective tool that is essential for system administrators looking to secure their website and network effectively. The software's valuable features make it a reliable choice for any security-focused professional.
Version 0.8: N/A