Professional Documents
Culture Documents
Submitted by:
Ravi kumar
Amitesh kumar
Vaibhav Gomber
Amit Giri
Acknowledgement
Introduction
Software Requirement
Python
Linux
Google Earth
AWT libraries for http
Hardware Requirement
One Computer/Laptop with internet
Software Features:
Port scanning
Honey pot
Hackdoor Detection
Detects ip for websites
ip location on geo locator
Sniffing
Spoofing
Port scanning
The act of systematically scanning a computer's
ports. Since a port is a place where information
goes into and out of a computer, port scanning
identifies open doors to a computer. Port scanning
has legitimate uses in
managing networks, but
port scanning also can be
malicious in
nature if someone is looking for a
weakened access point to break into your
computer.
Port scanning
Honeypot
In computer terminology, a honeypot is a trap set to
detect, deflect, or, in some manner, counteract
attempts at unauthorized use of information
systems. Generally, a honeypot consists of a
computer, data, or a network
site that appears to
be part of a network, but is actually isolated and
monitored, and which seems to contain
information or a resource of value to attackers.
This is
similar to the police baiting a criminal and
then
conducting undercover surveillance.
Honeypot
Backdoor Detection
Backdoors is a term describing unauthorized access to your
computer system. Usually a backdoor lies in the
program code and is created by a programmer. Backdoors
in your
computer may be accessed by attackers
without your
knowledge or consent. Backdoors are
considered to be real
security threats.
Sniffing
A packet sniffer is a utility that has been used since the original
release of Ethernet. Packet sniffing allows individuals to capture data
as it is transmitted over a network. Packet sniffer programs are
commonly used by network professionals to help diagnose network
issues and are also used by
malicious users to capture
unencrypted data like passwords and usernames in network traffic.
Once this information is captured, the user can then gain access to
the system or network.
If you want to keep information confidential or are concerned about
packet sniffing, it is advised that you work on encrypted protocols
and encrypt all sensitive data, such as e-mails, being sent over the
Internet or network. A great encryption program is PGP, users who
are using Telnet should consider using SSH instead.
Sniffing Diagram
Spoofing
Spoofing Diagram
Future Orientation:
We would like to provide tkinter library to
this software to make it a GUI based
software and to make it portable so that it
can be available on different operating
systems.