Professional Documents
Culture Documents
Software System Security Tool: Submitted By: (RA1552001020070) (RA1552001020083)
Software System Security Tool: Submitted By: (RA1552001020070) (RA1552001020083)
Submitted by:
Ananda RAJ
(RA1552001020070)
Pramodh kiran varma (RA1552001020085)
Sivaram kumar
(RA1552001020083)
Acknowledgement
Working on this project has been a really good and challenging
experience and has been a great source of increasing knowledge
in various subjects. So, it is quite obvious that this had been just on
papers without the guidance of our teachers and mentors.
Introduction
This software is developed for a technical person who wants
to take the system security in his own hands ensuring that his
system gets the best of security and good enough to escape
from hackers and spam attacks to the system.
Software Requirement
Python
Linux
Google Earth
AWT libraries for http
Hardware Requirement
One Computer/Laptop with internet
Software Features
Port scanning
Honey pot
Hackdoor Detection
Detects ip for websites
ip location on geo locator
Sniffing
Spoofing
Port scanning
The act of systematically scanning a computer's ports. Since a port
is a place where information goes into and out of a computer, port
scanning identifies open doors to a computer. Port scanning has
legitimate uses in managing networks, but port scanning also can be
malicious in nature if someone is looking for a weakened access
point to break into your computer.
Port scanning
Honeypot
In computer terminology, a honeypot is a trap set to
detect, deflect, or, in some manner, counteract attempts
at unauthorized use of information systems. Generally, a
honeypot consists of a computer, data, or a network
site that appears to be part of a network, but is actually i
solated and monitored, and which seems to contain
information or a resource of value to attackers. This is
similar to the police baiting a criminal and then
conducting undercover surveillance.
Honeypot
Backdoor Detection
Backdoors is a term describing unauthorized access
to your computer system. Usually a backdoor lies in
the program code and is created by a programmer.
Backdoors in your computer may be accessed by
attackers without your knowledge or consent.
Backdoors are considered to be real security threats.
Sniffing
A packet sniffer is a utility that has been used since the original relea
se of Ethernet. Packet sniffing allows individuals to capture data as it
is transmitted over a network. Packet sniffer programs are commonl
y used by network professionals to help diagnose network issues an
d are also used by
malicious users to capture unencrypted data lik
e passwords and usernames in network traffic. Once this information
is captured, the user can then gain access to the system or network.
If you want to keep information confidential or are concerned about
packet sniffing, it is advised that you work on encrypted protocols
and encrypt all sensitive data, such as e-mails, being sent over the
Internet or network. A great encryption program is PGP, users who
are using Telnet should consider using SSH instead.
Sniffing Diagram
Spoofing
Spoofing Diagram
Future Orientation:
We would like to provide tkinter library to this
software to make it a GUI based software and
to make it portable so that it can be available
on different operating systems.