Professional Documents
Culture Documents
System Application Scanner is intended to design and implement Application scanner that can help the system administrator to check their network vulnerability. One way to implement this project is by observing the ports on your system.
Finds
out open ports for a particular computer that exists in a network (for a range of ports or a single port). Finds out the open ports for a particular computer that exists in network either locally or remotely by using IP Address. Facilitates to save the record of all scans in a file if required.
Almost
every computer in an organization is connected with the other in one way or the other. All business organizations, educational institutions etc use Computer Networks to connect to each other. In such conditions effective Network Scanning is necessary to keep the network alive. For this, Network Management plays an important role.
CONTEXT
LEVEL
NETWORK ADMINISTRATO R
NETWORK
LEVEL-0
NETWORK ADMINISTRATOR
PORT SCANNE R
REPORT S
logfile
LEVEL 1-ADMIN-UI:
Admin
User Interface
Main Form
START SCAN
STOP SCAN
NETWORK
RESULTS
Protoc ol Type
Subnet IP Addres
IP address
IP address
Start Scan
Subn et Scan
Scan Type
TCP
Single Port Rang e of Ports
UDP
Start Scan
LEVEL 1-SSS-ADMIN-REPORTS :
ADMIN
PORT STATUS
REPO RTS
IP ADDRESS, PORT NO NETWORK PORT STATUS
Protocol Type
TCP
stop scan
network results
Main Form
specify IP address
Subnet IP address
Subnet Scan
scan type
single port
multi port
Protocol Type
start scan
stop scan
result
network
IP address
port range
start scanning the port/ports interacts with the network scans and obtains port status
stop scan
NewState
Main form
Subnet IP Address
IP address
Scan type
Protocol Type
Single
Multiport
TCP
UDP
Scan
Result
Stop scan
The most common host-based tool for checking for open ports on Windows or UNIX systems is the netstat command. But running this command means actually waking or remotely accessing each and every server; and you miss other host systems that might be listening on improper ports
Design
structure is very simple Problem of being hacked i.e. security of the network Not all services are provided Lack of scalability Speed of the Application and Maintenance
A port scanner constantly scans the network. It finds the ports that are open and idle and closes them. Thus cutting down the way for the unauthenticated users into our network. Port scanner has become a very important tool in any corporate network helps in providing security to our network.
Graphical
User Interface Module The Interface through which the user communicates with the system. Port Scanner Module This module is used to Scan the port for Unauthorised Access. Reporting Module This module Reports the port which is being
Software Requirements Operating System : Windows 9x/NT/2000/XP Front End : java Testing tools : WinRunner,Load Runner,Testing Director Technologies to be used:J2SE, Swings
1. Processor : Intel 486 or higher 2. Clock speed : 166 MHz speed or higher 3. RAM : 16 MB or higher 4. Monitor : 800 * 600 or greater resolution display 5. Hard Disk Drive : 20 MB free hard disk space 6. Network : Client-Server Network 7. Protocol : TCP/IP Recommended Hardware requirements: 1. Processor : A Pentium based PC 2. Clock speed : 200 MHz speed or higher 3. RAM : 32 MB or higher 4. Monitor : Super VGA 5. Hard Disk Drive : 1 GB free hard disk space 6. Network : Client-Server Network 7. Protocol : TCP/IP
8.1 Project conclusion: It is a good way to learn about your network. You can use it to learn about your network, too. You can also learn what the Crackers are learning about your network. Port scanning provide an excellent way in which you can audit your networks security policies and as a first pass towards assessing your networks potential exposures. A port scanner is an important tool in the security managers toolkit. It has like all of the best security tools today, both offensive and defensive capabilities, but there is no reason not to use it yourself. 8.2 Scope and Future Enhancement: Almost every computer in an organization is connected with the other in one way or the other. All business organizations, educational institutions etc use Computer Networks to connect to each other. In such conditions effective Network Scanning is necessary to keep the network alive. For this, Network Management plays an important role.
JAVA
Technologies: JAVA Complete Reference Java Script Programming by Yehuda Shiran JAVA Security by Scotl oaks J2EE Professional by Shadab Siddiqui JAVA server pages by Larne Pekowsley JAVA Server pages by Nick Todd