SlideShare a Scribd company logo
1 of 31
1
STATE INSTITUTE OF ENGINEERING AND TECHNOLOGY
NILOKHERI
Under the guidance of
Dr. Rama Chawla
Assistant professor
Project Presentation
Dept. of Computer Engineering
State Institute Of Engineering and Technology, Nilokheri (Karnal)
(Affiliated to Kurukshetra University, Kurukshetra)
Port Scanning & Vulnerability
Detection using Python
PRESENTATION BY
3
MD ASIF ALI
B-Tech C.S.E (5TH SEM)
Roll No: 87225108
Submitted To :
Dr. Rama Chawla (Assistant
professor)
4
ContentS
 Introduction
 Certificate
 Objective
 Importance of Port scanner
 Port Scanning
 Port Scanning Tools
 Scope
 Methodology
 Flowchart
 Deliverables
 System Specification
 Scanning Function code
 GUI code
 Output
 Conclusion
5
6
Introduction
“
A Port Scanner is a computer
program that is designed to
search for open ports on
computers, servers, or network
devices.
7
Objectives
8
 To develop a basic port scanner using Python programming
language.
 To scan open ports on a particular network host.
 To identify potential security vulnerabilities and report
them.
 To provide a basic user interface for the port scanner tool.
The primary objectives of the project are:
9
Importance of
Port Scanner
10
Since Port Scanner identifies open ports and service
available on a network, it is used by security professionals
to identify any security vulnerabilities on that particular
network. While it is highly essential for network
management, it is unfortunately being used extensively by
cybercriminals as well.
11
Port Scanning
12
A port scan is a common technique hackers use to discover open
doors or weak points in a network. A port scan attack helps
cyber criminals find open ports and figure out whether they are
receiving or sending data. It can also reveal whether active
security devices like firewalls are being used by an organization.
When hackers send a message to a port, the response they
receive determines whether the port is being used and if there
are any potential weaknesses that could be exploited.
13
Port scanning can provide information such as:
 Services that are running
 Users who own services
 Whether anonymous logins are allowed
 Which network services require authentication
14
Port Scanning Tools
 Nmap
 Solarwinds Port Scanner
 Netcat
 Advanced Port Scanner
 NetScan Tools
15
Scope
16
The port scanner project will be designed using Python
programming language, and it will be able to scan open ports on a
particular network host. The tool will provide information on the
status of the ports, including open, closed, and filtered. The
scanner will also be able to identify potential security
vulnerabilities and report them to the user. The tool will have a
user-friendly interface, and a user manual will be provided to
guide users through the process of using the scanner.
17
Methodology
18
This project works as sender and receiver based application.
Firstly, client sends request to the admin or server after that server
accepts request and connection will be established between client
and server. After that the port scanning process starts if the port is
open then file transfer process will be started else connection will
be disconnected. If file is received then acknowledgement is send
by receiver else connection will be disconnected. After the
successful file transfer process, the connection between sender
and receiver is released.
19
flowchart
20
Start
Load GTK GUI File
Parameter
check
Load IP Address
Port Scanning
Output Result
End
Target Not Found
F
Deliverables
21
 Technical
documentation
for the port
scanner tool.
.
 User manual
for the port
scanner tool.
The deliverables for this project include:
 Port scanner
code written in
Python
programming
language.
System
Specification
22
Hardware Requirements
23
System
Pentium IV 2.4Ghz &
above
Hard Disk Drive
>=100MB
RAM
>=2GB
Software Requirements
24
OS
Windows/Linux
Coding
Language
Python
Editor
Visual Stdio
Code
Port Scanner Using Socket
25
Output
26
27
Conclusion
28
The port scanner project aims to develop a basic yet effective tool
for scanning open ports on a network host. It will help users
identify potential security vulnerabilities and make their
networks more secure. The tool will be easy to use and will
provide clear documentation to guide users through the process.
With the implementation of this project, we hope to contribute to
the development of better network security solutions.
29
CREDITS
 Presentation template by Gamma.app.
 Photographs by Unsplash, iStock.
 Content by Veronis.com, Codemint.net.
30
Thanks!
31

More Related Content

Similar to final presentation of md asif ali.pptx

Akash final-year-project report
Akash final-year-project reportAkash final-year-project report
Akash final-year-project reportAkash Rajguru
 
B.Eng-Final Year Project interim-report
B.Eng-Final Year Project interim-reportB.Eng-Final Year Project interim-report
B.Eng-Final Year Project interim-reportAkash Rajguru
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksAsep Sopyan
 
What can an attacker can determine which network services are enabled.docx
What can an attacker can determine which network services are enabled.docxWhat can an attacker can determine which network services are enabled.docx
What can an attacker can determine which network services are enabled.docxtodd471
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection finalAkshay Bansal
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanningleminhvuong
 
Security tools
Security toolsSecurity tools
Security toolsAdri Jovin
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayKaren Oliver
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSHASHANK WANKHADE
 
Remotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal NetworkRemotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal Networkijtsrd
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Boston Institute of Analytics
 
Network Monitoring with Wireshark
Network Monitoring with WiresharkNetwork Monitoring with Wireshark
Network Monitoring with WiresharkSiddharth Coontoor
 

Similar to final presentation of md asif ali.pptx (20)

Port scanning
Port scanningPort scanning
Port scanning
 
Port scanning
Port scanningPort scanning
Port scanning
 
Akash final-year-project report
Akash final-year-project reportAkash final-year-project report
Akash final-year-project report
 
B.Eng-Final Year Project interim-report
B.Eng-Final Year Project interim-reportB.Eng-Final Year Project interim-report
B.Eng-Final Year Project interim-report
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
 
What can an attacker can determine which network services are enabled.docx
What can an attacker can determine which network services are enabled.docxWhat can an attacker can determine which network services are enabled.docx
What can an attacker can determine which network services are enabled.docx
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection final
 
posterPDF
posterPDFposterPDF
posterPDF
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
Security tools
Security toolsSecurity tools
Security tools
 
Vulnerability
VulnerabilityVulnerability
Vulnerability
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
Prasad_Meduri
Prasad_MeduriPrasad_Meduri
Prasad_Meduri
 
Remotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal NetworkRemotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal Network
 
Network scan
Network scanNetwork scan
Network scan
 
Scanning
ScanningScanning
Scanning
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
 
Hacking3e ppt ch06
Hacking3e ppt ch06Hacking3e ppt ch06
Hacking3e ppt ch06
 
Network Monitoring with Wireshark
Network Monitoring with WiresharkNetwork Monitoring with Wireshark
Network Monitoring with Wireshark
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 

Recently uploaded (20)

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 

final presentation of md asif ali.pptx

  • 1. 1 STATE INSTITUTE OF ENGINEERING AND TECHNOLOGY NILOKHERI Under the guidance of Dr. Rama Chawla Assistant professor Project Presentation Dept. of Computer Engineering State Institute Of Engineering and Technology, Nilokheri (Karnal) (Affiliated to Kurukshetra University, Kurukshetra)
  • 2. Port Scanning & Vulnerability Detection using Python
  • 3. PRESENTATION BY 3 MD ASIF ALI B-Tech C.S.E (5TH SEM) Roll No: 87225108 Submitted To : Dr. Rama Chawla (Assistant professor)
  • 4. 4
  • 5. ContentS  Introduction  Certificate  Objective  Importance of Port scanner  Port Scanning  Port Scanning Tools  Scope  Methodology  Flowchart  Deliverables  System Specification  Scanning Function code  GUI code  Output  Conclusion 5
  • 7. “ A Port Scanner is a computer program that is designed to search for open ports on computers, servers, or network devices. 7
  • 9.  To develop a basic port scanner using Python programming language.  To scan open ports on a particular network host.  To identify potential security vulnerabilities and report them.  To provide a basic user interface for the port scanner tool. The primary objectives of the project are: 9
  • 11. Since Port Scanner identifies open ports and service available on a network, it is used by security professionals to identify any security vulnerabilities on that particular network. While it is highly essential for network management, it is unfortunately being used extensively by cybercriminals as well. 11
  • 13. A port scan is a common technique hackers use to discover open doors or weak points in a network. A port scan attack helps cyber criminals find open ports and figure out whether they are receiving or sending data. It can also reveal whether active security devices like firewalls are being used by an organization. When hackers send a message to a port, the response they receive determines whether the port is being used and if there are any potential weaknesses that could be exploited. 13
  • 14. Port scanning can provide information such as:  Services that are running  Users who own services  Whether anonymous logins are allowed  Which network services require authentication 14
  • 15. Port Scanning Tools  Nmap  Solarwinds Port Scanner  Netcat  Advanced Port Scanner  NetScan Tools 15
  • 17. The port scanner project will be designed using Python programming language, and it will be able to scan open ports on a particular network host. The tool will provide information on the status of the ports, including open, closed, and filtered. The scanner will also be able to identify potential security vulnerabilities and report them to the user. The tool will have a user-friendly interface, and a user manual will be provided to guide users through the process of using the scanner. 17
  • 19. This project works as sender and receiver based application. Firstly, client sends request to the admin or server after that server accepts request and connection will be established between client and server. After that the port scanning process starts if the port is open then file transfer process will be started else connection will be disconnected. If file is received then acknowledgement is send by receiver else connection will be disconnected. After the successful file transfer process, the connection between sender and receiver is released. 19
  • 20. flowchart 20 Start Load GTK GUI File Parameter check Load IP Address Port Scanning Output Result End Target Not Found F
  • 21. Deliverables 21  Technical documentation for the port scanner tool. .  User manual for the port scanner tool. The deliverables for this project include:  Port scanner code written in Python programming language.
  • 23. Hardware Requirements 23 System Pentium IV 2.4Ghz & above Hard Disk Drive >=100MB RAM >=2GB
  • 25. Port Scanner Using Socket 25
  • 27. 27
  • 29. The port scanner project aims to develop a basic yet effective tool for scanning open ports on a network host. It will help users identify potential security vulnerabilities and make their networks more secure. The tool will be easy to use and will provide clear documentation to guide users through the process. With the implementation of this project, we hope to contribute to the development of better network security solutions. 29
  • 30. CREDITS  Presentation template by Gamma.app.  Photographs by Unsplash, iStock.  Content by Veronis.com, Codemint.net. 30