











































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
project on networking tools......<br />JUJUSOFT(A SYSTEM, SECURITY & NETWORKING TOOL)<br /> REPORT SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE DEGREE OF <br /> B.TECH IN INFORMATION TECHNOLOGY UNDER THE SUPERVISION OF<br />“MR. UPENDRA BISHT” <br />DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN UTTARAKHAND- 248001 MAY 2012<br />
Typology: Study Guides, Projects, Research
1 / 51
This page cannot be seen from the preview
Don't miss anything!
This is to certify that Thesis/Report entitled “ JujuSoft (A System, Security & Networking tool) ” which is submitted by me in partial fulfillment of the requirement for the award of degree B.Tech in Information Technology to Dev Bhoomi Institute of Technology Dehradun, UTU Dehradun Uttarakhand comprises only my original work
and due acknowledgement has been made in the text to all other material used.
Date: Name of Student
Ashwin Semwal
Vipin Rawat
APPROVED BY Mr. Pankaj Chaudhary
Dean Academics Dev Bhoomi Institute of Technology Dehradun
This is to certify that thesis/Report entitled “ Jujusoft (A System, Security & Networking tool) ” which is submitted by Ashwin Semwal and Vipin Rawat in partial fulfillment of the requirement for the award of degree B.Tech in Information Technology to Dev Bhoomi Institute of
At this level of understanding it is often difficult to understand to wide spectrum of knowledge without proper knowledge and guidance. Hence, we would like to pay sincere gratitude to Honorable Chairman who created a healthy and Technical Environment for the successful completion of the project.
In our particulars we would like to thank our colleagues and guide Mr. Upendra Bisht for their round the clock enthusiastic support and suggestions which made this project possible.
We also extend our sincere gratitude to Mr. Pankaj Chaudhary for inspiration, encouragement and for the impetus obtained throughout the course of our project.
Ashwin Semwal Vipin Rawat
JujuSoft is a software tool consisting Port Scanner, Packet Analyzer, Command Prompt window and other application in a same interface using dot.net windows form application. These applications are run simultaneously in a single form. Applications are briefly discussed below.
PORT SCANNER: A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it. A port scan or port scan is “An attack that sends client requests to a range of server port addresses on a host, with the goal of finding an active port and exploiting a known vulnerability of that service." PACKET SNIFFER: A packet analyzer (also known as a network analyzer, protocol analyzer, or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network.
COMMAND WINDOW: Command Prompt (executable name cmd.exe) is the Microsoft-supplied command-line interpreter on OS/2, Windows CE and on Windows NT-based operating systems (including Windows 2000, XP, Vista, 7, Server 2003 and Server 2008). It is the analog of COMMAND.COM in MS-DOS and Windows 9x (where it is called MS- DOS Prompt) systems, or of the Unix shells used on Unix-like systems.
LIST OF CONTENTS
Certificate
Acknowledgement
Abstract
5.2 Port Scanner 5.2.1 Introduction 5.2.2 Capabilities 5.2.3 Implementation in Project 5.2.4 Working & Applications 5.3 Command Window 5.3.1 Introduction 5.3.2 Technical Information 5.3.3 Implementation in project 5.3.4 Working & Application
6.1 Packet Sniffer 6.2 Port Scanner 6.3 Command Window 6.4 Overall Project in Running State
7.1 Scope as System Tool 7.2 Scope as Networking Tool 7.3 Scope as Security Tool 7.4 Further enhancement of the Project
JujuSoft is a software utility tool kit developed in .Net Framework (version 4.0) for the LAN network Analysis. It provides
this project work we work to integrate three different tools into a single platform so that network admin have to open a single GUI to get the same knowledge about its network status.
1.2 Defining the problem
The network engineers and admins undergo many problem using different tools for different operations for managing their network. The main problem that a network admin face with respect to accessing the software tools available are defined below.
These problems are faced by the network users who are responsible for the security and system management processes in a LAN network environment. For integrating different Network applications into a common platform we are building this software project.
This software tool is made in .Net framework which can be seen as Security, System and a Networking Tool at the same time. The software
project contains three modules namely Port scanner, Port Sniffer and a little command line tool which makes work a lot easier and at the same time it is scalable and reliable as based on the object oriented approach. The Project tools are briefly described in the next section.
1.3 Packet Sniffer
A packet sniffer is a device or program that allows eavesdropping
on traffic traveling between networked computers. The packet sniffer will capture data that is addressed to other machines, saving it for later analysis.
All information that travels across a network is sent in "packets." For example, when an email is sent from one computer to another, it is first broken up into smaller segments. Each segment has the destination address attached, the source address, and other information such as the number of packets and reassembly order. Once they arrive at the destination, the packet's headers and footers are stripped away, and the packets reconstituted.
In the example of the simplest network where computers share an Ethernet wire, all packets that travel between the various computers are seen by every computer on the network. A hub broadcasts every packet to every machine or node on the network, and then a filter in each computer discards packets not addressed to it. A packet sniffer disables this filter to capture and analyze some or all packets traveling through the Ethernet wire, depending on the sniffer's configuration. This is referred to as
requests across a broad range of ports from a single host. To get around this the intruder can do the port scan in strobe or stealth mode.
By setting different TCP flags or sending different types of TCP packets the port scan can generate different results or locate open ports in different ways. A SYN scan will tell the port scanners which ports are listening and which are not depending on the type of response generated. A FIN scan will generate a response from closed ports- but ports that are open and listening will not send a response, so the port scanner will be able to determine which ports are open and which are not.
1.5 Command Window
Command Prompt (Executable name cmd.exe) is the Microsoft supplied command-line interpreter on OS/2, Windows CE and on Windows NT-based operating systems (including Windows 2000, XP, Vista, 7, Server 2003 and Server 2008). It is the analog of COMMAND.COM in MS-DOS and Windows 9x (where it is called MS- DOS Prompt) systems, or of the UNIX shells used on Unix-like systems Unlike COMMAND.COM, which is a DOS program, cmd.exe is a native program for the platform. This allows it to take advantage of features available to native programs on the platform that are otherwise unavailable to DOS programs.
For example, since cmd.exe is a native text-mode application on OS/2, it can use real pipes in command pipelines, allowing both sides of the pipeline to run concurrently. As a result, it is possible to redirect the standard error in cmd.exe, unlike COMMAND.COM. (COMMAND.COM uses temporary files, and runs the two sides serially, one after the other.)
In reality, cmd.exe is a Windows program that acts as a DOS-like command line interpreter.
No matter how well designed or well coded, a poorly analyzed and specified software application will not only disappoint the users but also bring grief to the developer...
2.1.2 Technical Feasibility
The project is within the state of art, software and hardware technology that will be used is already in industry market and is being used in software development by the industry. Software will be developed using one of the currently used visual languages. Hardware requirement is those of a desktop latest available processor will used. Storage capacity is medium. Memory requirement is low. Extra library used during is project is easy to install.
2.1.3 Economic Feasibility
Proposed software is an in house project used as application software. The organization has its own copy of own original, legal, acquired language package. The organization has the resources needed to run the software. The work is a part of research work and free training that is conducted at the institute. Therefore it is feasible for the organization to develop the software.
2.1.4 Operational Feasibility
The operations that are to be applied to the input data can be easily converted into functions. The project is using object oriented language to develop the modules which is operationally feasible. After system analysis we find that the software is operationally feasible.
2.1.5 Behavioral Feasibility
The application requires no special technical guidance and all the views and Tool Tips available in the application are self-explanatory. The users are well guided with warning and failure messages for all the actions taken. However Application Contains a Help menu And Reading Manual which makes works a lot easier for user.
2.2.1 User Requirement Specifications
User requirement specifications is taken and documented in SRS document which is then signed by the user and the development authorities. This document contains all requirement of the user from the project and every phase in the development has to be connected directly
mentioned serious problems, engineers have come up with various process models. Although, there is no “ideal” software process, following either a standard or custom made model is very important for better project management and the production of quality software.
2.2.2.1 Process Model for the project or Developing Methodology
We followed a combination of two standard and very flexible models; spiral model and incremental model. The essence of these models was that the specification was developed in conjunction with the software. Spiral model was used as the main process and an explicit risk management was performed at the beginning of each spiral.
Each loop in this process consists of four distinct phases. Setting objectives, discovering the possible risks and identifying the constraints were the activities of the first phase. In the second phase, risks were managed so that the impact of risks was reduced. In the third phase, based on the incremental model the increment was built or a relevant document was produced. In the final stage each iteration status and the progress of the software were reviewed and the project was moved to the next iteration.
2.3 Requirement Engineering
This section describes what services are required from the system and the constraints under which the system operates and is developed. This phase of the project is very crucial simply because a small change or an error in this stage invariably leads to considerable amount of rework and may cause serious problems in the subsequent system design and implementation phases.
2.3.1 Software and Hardware Requirements
This project is a window-based application developed using following technologies: Development tools: