You are on page 1of 12

MAHARASHTRA STATE BOARD OF TECHNICAL

EDUCATION – MUMBAI

A
Micro-Project Report On
“Network Packet Sniffer”

Submitted by,
Anurag Sandeep Mhaske [15]

Guided by
Prof. P.M. Takate,
Lecturer,
Department of Information Technology

Academic Year
2023-24

MET’S INSTITUTE OF TECHNOLOGY - POLYTECHNIC


BHUJBAL KNOWLEDGE CITY, ADGAON, NASHIK
MET’s Institute of Technology, Polytechnic
Bhujbal Knowledge City,
Adgaon, Nashik-422 003
Tel.: ( 0253)2303515, 2303267, 2303268 Telefax : ( 0253 )2303305,
Toll-free: 1800 22 0234 Email:principal_iot@bkc.met.edu

CERTIFICATE

This is to Certify that this report,


“Network Packet Sniffer”

Submitted by,

Anurag Sandeep Mhaske [15]

The students of Second year Information Technology Department


In 2023-24
As a part of project work as prescribed by
The Maharashtra State Board of Technical Education, Mumbai
And that I have guided them for the said work from time to time
And I found them satisfactorily progressive.
And that, the said work has been assessed by me and I am satisfied that the
same is up to the standard envisaged for the level of the course.

Prof . P.M.Takate Prof. S.B. Patil Dr. R.S. Narkhede


Project Guide Head of Department Principal
ACKNOWLEDGEMENTS

We take this opportunity to express our deepest sense of gratitude and


sincere thanks to those who have helped us in completing this task.

We express our sincere thanks to our Project Guide Prof. P.M. Takate ,
Information Technology Department, who has given us excellent guidance,
continuous Encouragement for the completion of this work. His kind assistance
and constant inspiration will always help us in our future also.

We are very thankful to Head of Department Prof. S.B. Patil for


encouraging us to undertake this project and he has taken keen interest in
making the project and report absolutely flawless.

We are very thankful to Principal. Dr. R.S. Narkhede, for encouraging


us to undertake this project and he has taken keen interest in making the project
and report absolutely flawless.
Annexure –I A

PART A - Plan
“Network Packet Sniffer”

1.0 Brief Introduction

A packet sniffer also known as a packet analyzer, protocol analyzer or network analyzer is a
piece of hardware or software used to monitor network traffic. Sniffers work by examining
streams of data packets that flow between computers on a network as well as between
networked computers and the larger Internet. These packets are intended for and addressed to
specific machines, but using a packet sniffer in "promiscuous mode" allows IT professionals,
end users or malicious intruders to examine any packet, regardless of destination. It's possible
to configure sniffers in two ways. The first is "unfiltered," meaning they will capture all
packets possible and write them to a local hard drive for later examination. Next is "filtered"
mode, meaning analyzers will only capture packets that contain specific data elements.
Packet sniffers can be used on both wired and wireless networks their efficacy depends on
how much they are able to "see" as a result of network security protocols. On a wired
network, sniffers might have access to the packets of every connected machine or may be
limited by the placement of network switches. On a wireless network, most sniffers can only
scan one channel at a time, but the use of multiple wireless interfaces can expand this
capability.

2.0 Aim of the Micro-Project

This Micro-Project aims at -


1. To understand concept of Network Packet Sniffer.
2. To know JAVA’s significance.
3. To learn various functions and concepts of language JAVA by implementing it.
3.0 Action Plan

S. Details of activity Planned Planned Name of


No. Start date Finish Responsible
date Team Members
1
Discuss with the subject teacher
regarding the concept of “micro- 03/18/202 03/08/202 Anurag Mhaske
3 3
project” which include in the I
scheme.
2
Discuss with the subject teacher
how to write a diary and report of 17/08/202 17/08/202 Anurag Mhaske
micro-project. 3 3

3
Discuss with the subject teacher 30/08/202 30/08/202 Anurag Mhaske
regarding the micro-project topic. 3 3

4
Searching Information Related to 06/09/202 06/09/202 Anurag Mhaske
Grade Generator. 3 3
5
Making Code and Running it 20/09/202 20/09/202 Anurag Mhaske
3 3
6
Project Report Preparation 12/10/202 12/10/202 Anurag Mhaske
3 3

4.0 Resources Required

S. Name of Specifications Qty Remarks


No. Resource/material
1 Computer system Windows 11 , 4gb RAM 1 -
2 Eclipse, VS code - 1 -
3 Internet Various Websites like 1 -
www.javatpoint.in
4 Word 2013 - 1 -

*************
Annexure –II A
PART B
“Network Packet Sniffer”

1.0 Brief Introduction

A packet sniffer also known as a packet analyzer, protocol analyzer or network analyzer is a
piece of hardware or software used to monitor network traffic. Sniffers work by examining
streams of data packets that flow between computers on a network as well as between
networked computers and the larger Internet. These packets are intended for and addressed to
specific machines, but using a packet sniffer in "promiscuous mode" allows IT professionals,
end users or malicious intruders to examine any packet, regardless of destination. It's possible
to configure sniffers in two ways. The first is "unfiltered," meaning they will capture all
packets possible and write them to a local hard drive for later examination. Next is "filtered"
mode, meaning analyzers will only capture packets that contain specific data elements.
Packet sniffers can be used on both wired and wireless networks their efficacy depends on
how much they are able to "see" as a result of network security protocols. On a wired
network, sniffers might have access to the packets of every connected machine or may be
limited by the placement of network switches. On a wireless network, most sniffers can only
scan one channel at a time, but the use of multiple wireless interfaces can expand this
capability.
Prevalence and Risk Factors
Using a sniffer, it's possible to capture almost any information for example, which websites
that a user visits, what is viewed on the site, the contents and destination of any email along
with details about any downloaded files. Protocol analyzers are often used by companies to
keep track of network use by employees and are also a part of many reputable antivirus
software packages. Outward-facing sniffers scan incoming network traffic for specific
elements of malicious code, helping to prevent computer virus infections and limit the spread
of malware.
It's worth noting, however, that these analyzers can also be used for malicious purposes. If a
user is convinced to download malware-laden email attachments or infected files from a
website, it's possible for an unauthorized packet sniffer to be installed on a corporate
network. Once in place, the packet sniffer can record any data transmitted and send it to a
command and control (C&C) server for further analysis. It's then possible for hackers to
attempt packet injection or man-in-the-middle attacks, along with compromising any data that
was not encrypted before being sent.
Proper use of packet sniffers can help clean up network traffic and limit malware infections;
to protect against malicious use, however, intelligent security software is required.

 Source Code

import org.pcap4j.core.PcapHandle;
import org.pcap4j.core.PcapHandle.PacketListener;
import org.pcap4j.core.PcapNetworkInterface;
import org.pcap4j.core.PcapStat;
import org.pcap4j.packet.Packet;

public class PacketSniffer {

public static void main(String[] args) throws Exception {


final PcapNetworkInterface device = PcapNetworkInterface.lookupDefaultDevice();
final PcapHandle handle = device.openLive(65536, PcapHandle.promiscuousMode(),
0);

PacketListener listener = new PacketListener() {


@Override
public void receivePacket(Packet packet) {
System.out.println(packet);
}
};

try {
handle.setPacketListener(listener);
handle.loop(0);
} finally {
handle.close();
}
}
}

2.0 Aim of the Micro-Project

This Micro-Project aims at


1. To understand concept of Network Packet Sniffer.
2. To know JAVA’s significance.
3. To learn various functions and concepts of language JAVA by implementing it
3.0 Actual Procedure Followed

S. Details of activity Planned Planned Name of


No. Start date Finish Responsible
date Team Members
1
Discuss with the subject teacher
regarding the concept of “micro- 03/18/202 03/08/202 Anurag Mhaske
3 3
project” which include in the I
scheme.
2
Discuss with the subject teacher
how to write a diary and report of 17/08/202 17/08/202 Anurag Mhaske
micro-project. 3 3

3
Discuss with the subject teacher 30/08/202 30/08/202 Anurag Mhaske
regarding the micro-project topic. 3 3

4
Searching Information Related to 06/09/202 06/09/202 Anurag Mhaske
Grade Generator. 3 3
5
Making Code and Running it 20/09/202 20/09/202 Anurag Mhaske
3 3
6 Anurag Mhaske
Project Report Preparation 12/10/202 12/10/202
3 3

4.0 Actual Resources Used

S. Name of Specifications Qty Remarks


No. Resource/material
1. Computer system Windows 11 , 4gb RAM 1 -
2. Eclipse, VS code - 1 -
3. Internet Various Websites like 1 -
www.javatpoint.in
4. Word 2013 - 1 -
5.0 Output
6.0 Skill Developed / learning out of this Micro-Project
 From This microproject we learnt about concepts we learned about Network Packet
Sniffer. and its proper implementation in a proper manner.
 Also we learnt a lot concepts related to JAVA Programming and what information is
needed for it.
 Learned to prepare a proper format, and more about a computer.
Teacher Evaluation Sheet

Name of Student: Anurag Sandeep Mhaske Enrollment No. : 2107760287


Name of Department : Information Technology (IF) Semester: 5-I
Course Title: Advance Java Programming (AJP) Code: 22517
Title of the Micro-Project : Network Packet Sniffer

Course Outcomes Achieved:


1)Learn to Handle events of AWT and Swings Components

Evaluation as per Suggested Rubric for Assessment of Micro Project

Sr. Characteristic to be assessed Poor Average Good Excellent


No. ( Marks 1 - ( Marks 4 - ( Marks 6 - ( Marks 9- 10
3) 5) 8) )
1 Relevance to the course
2 Literature Survey / Information
Collection
3 Project Proposal
4 Completion of the Target as per
project proposal
5 Analysis of Data and
representation
6 Quality of Prototype/Model

7 Report Preparation
8 Presentation
9 Defense
Micro-Project Evaluation Sheet

Process Assessment Product Assessment Total


Part A - Project Methodology PartB - Project individual Marks
Project (2 marks) Report/Working Presentation/Viva
Proposal Model (4 marks) 10
(2 marks) (2 marks)

Note:
Every course teacher is expected to assign marks for group evolution in first 3
columns & individual evaluation in 4TH columns for each group of students as
per rubrics.

Comments/Suggestions about team work/leadership/inter-personal communication (if


any)
……………………………………………………………………………………………...
……………………………………………………………………………………………..
……………………………………………………………………………………………..
……………………………………………………………………………………………..

Any Other Comment:


……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………

Prof. P.M. Takate – Lecturer in the Department

Signature………………………………………………………………………………………

You might also like