You are on page 1of 25

This

System Application Scanner is intended to design and implement Application scanner that can help the system administrator to check their network vulnerability. One way to implement this project is by observing the ports on your system.

Finds

out open ports for a particular computer that exists in a network (for a range of ports or a single port). Finds out the open ports for a particular computer that exists in network either locally or remotely by using IP Address. Facilitates to save the record of all scans in a file if required.

Almost

every computer in an organization is connected with the other in one way or the other. All business organizations, educational institutions etc use Computer Networks to connect to each other. In such conditions effective Network Scanning is necessary to keep the network alive. For this, Network Management plays an important role.

CONTEXT

LEVEL

NETWORK ADMINISTRATO R

SYSTEM APPLICATION SCANNER

NETWORK

LEVEL-0
NETWORK ADMINISTRATOR

SYSTEM APPLICATION SCANNER

USER INTERFA CE portdefs

PORT SCANNE R

REPORT S

logfile

LEVEL 1-ADMIN-UI:

Admin

User Interface

Main Form

LEVEL 2-ADMIN-UI-MAIN FORM:

NETWORK ADMINISTRATOR MAIN FRAME

START SCAN

STOP SCAN

NETWORK

RESULTS

LEVEL 1-SSS-ADMIN-PORT SCAN :


Admin
Port scan
Specify Host name IP addrs

Protoc ol Type

Subnet IP Addres
IP address

IP address

Specif y Scan Type


Type Type

Start Scan

LEVEL 2-ADMIN-PORT SCAN-SCAN TYPE :


Admin

Subn et Scan

Scan Type

Proto col Type

Scan for patricul ar app

TCP
Single Port Rang e of Ports

UDP

Start Scan

LEVEL 1-SSS-ADMIN-REPORTS :

ADMIN

PORT STATUS

REPO RTS
IP ADDRESS, PORT NO NETWORK PORT STATUS

DISP LAY REPO RTS

SYSTEM APPLICATION SCANNER ADMIN

specify host name IP address

specify subnet IP address

Subnet scan for Particular application single port

scan type multi port

Protocol Type

TCP

network administrator UDP start scan

stop scan

network results

Main Form

specify IP address

Subnet IP address

Subnet Scan

Subnet Scan for Particular application

scan type

single port

multi port

Protocol Type

start scan

stop scan

result

network

IP address

Specify Subnet IP address

scan the subnet

Scan for Particular application

type of scan port number

port range

select Protocol type

start scanning the port/ports interacts with the network scans and obtains port status

stop scanning the port

stop scan

NewState

Main form

Subnet IP Address

IP address

Scan type

Protocol Type

Scan for Particular app

Single

Multiport

TCP

UDP

Scan

Result

Stop scan

The most common host-based tool for checking for open ports on Windows or UNIX systems is the netstat command. But running this command means actually waking or remotely accessing each and every server; and you miss other host systems that might be listening on improper ports

Design

structure is very simple Problem of being hacked i.e. security of the network Not all services are provided Lack of scalability Speed of the Application and Maintenance

A port scanner constantly scans the network. It finds the ports that are open and idle and closes them. Thus cutting down the way for the unauthenticated users into our network. Port scanner has become a very important tool in any corporate network helps in providing security to our network.

Graphical

User Interface Module The Interface through which the user communicates with the system. Port Scanner Module This module is used to Scan the port for Unauthorised Access. Reporting Module This module Reports the port which is being

Software Requirements Operating System : Windows 9x/NT/2000/XP Front End : java Testing tools : WinRunner,Load Runner,Testing Director Technologies to be used:J2SE, Swings

1. Processor : Intel 486 or higher 2. Clock speed : 166 MHz speed or higher 3. RAM : 16 MB or higher 4. Monitor : 800 * 600 or greater resolution display 5. Hard Disk Drive : 20 MB free hard disk space 6. Network : Client-Server Network 7. Protocol : TCP/IP Recommended Hardware requirements: 1. Processor : A Pentium based PC 2. Clock speed : 200 MHz speed or higher 3. RAM : 32 MB or higher 4. Monitor : Super VGA 5. Hard Disk Drive : 1 GB free hard disk space 6. Network : Client-Server Network 7. Protocol : TCP/IP

8.1 Project conclusion: It is a good way to learn about your network. You can use it to learn about your network, too. You can also learn what the Crackers are learning about your network. Port scanning provide an excellent way in which you can audit your networks security policies and as a first pass towards assessing your networks potential exposures. A port scanner is an important tool in the security managers toolkit. It has like all of the best security tools today, both offensive and defensive capabilities, but there is no reason not to use it yourself. 8.2 Scope and Future Enhancement: Almost every computer in an organization is connected with the other in one way or the other. All business organizations, educational institutions etc use Computer Networks to connect to each other. In such conditions effective Network Scanning is necessary to keep the network alive. For this, Network Management plays an important role.

JAVA

Technologies: JAVA Complete Reference Java Script Programming by Yehuda Shiran JAVA Security by Scotl oaks J2EE Professional by Shadab Siddiqui JAVA server pages by Larne Pekowsley JAVA Server pages by Nick Todd

You might also like