Security audit software for Windows system. Check the registry parameters, files and directory permissions, events policy, group policy and much more...
Check the integrity of the files or directory path in base on Secure Hash Algorithm 2 (SHA-2).
Usage: bellator [-Template] [-GroupUser] [-GroupMachine] [-FTP(-User|-Pass)] [-Shared(-Resource)] [-Extend] [-NoMessage(-Detail)] [-Hotfix] [-MakeHash(-FileHash|-Directory|ListFile)] [-CompareHash] [-SecureMode(-Public|-FileTemplate)] [-KeyGen] [-Decrypt(-Private)] [-help|-?]. |
-Template: | Policy INF file | -GroupUser: | Local Computer Policy relative to user configuration | -GroupMachine: | Local Computer Policy relative to machine configuration | -FTP: | IP Address of the FTP Server. To send reports by means of FTP Service | -User: FTP Service user. User must have write permission on folder | -Pass: FTP Service password | -Shared: | IP Address of the Server (Resource Shared). Active Directory option, because does not need login in the Domain Controller | -Resource: Shared folder in the Server (Active Directory). User must have write permission on folder | -Extend: | Extend name of the file. Add time to the name of the report (ex. server_10112010_140530.txt) | -NoMessage: | Execute the program without interaction with the user. Not appear messages | -Detail: Permit get the report with more detail (ex. Allresult_server_10112010.txt) | -Hotfix: | List of the Hostfix. Check if have installed the hotfix in according with the list | -Hash: | Choice the cryptographic hash functions SHA1 (1), SHA224 (224), SHA256 (256), SHA384 (384) or SHA-512 (512)-MakeHash: Create a cryptographic hash functions SHA1 (1), SHA224 (224), SHA256 (256) -default option-, SHA384 (384) or SHA-512 (512) | -FileHash: List of the files | -Directory: Indicate the directory to generate the HASH of the all files -include files locate in the subfolders- (ex. C:/WINDOWS) | -ListFile: Generate a file list of the directory choiced | -CompareHash: | Compare the Hash value of a list of the files | -SecureMode: | Secure Mode. Encrypt the report and generate the HASH key of the inputs (templates) | -Public: Public Key to encrypt the report | -KeyGen: | Generate the key pair (Public and Private Key) to encrypt the report in Secure Mode | -Decrypt: | Decrypt the report generated in the Secure Mode | -Private: Private Key to decrypt the report | -babelFormat: | Generate a Babel XML report | -ArcSight: | Generate a ArcSight format report | -?: | Show the Help |
If you want to make hashes of a directory (f.e: C:\Windows) or in base on the list of files: | bellatorIntegrity.exe –makeHash 256 –d c:/one_directory –d c:/other_directory | bellatorIntegrity.exe –makeHash 256 –f c:/my_list_of_files.txt | If you want to compare in according to the file made befor: | bellatorIntegrity.exe –compareHash ficheroDeHashes.txt |
rramosg@bellator.com.es