Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Vipin's Final year report - Project on networking tools, Study Guides, Projects, Research of Computer Networks

project on networking tools......<br />JUJUSOFT(A SYSTEM, SECURITY &amp; NETWORKING TOOL)<br />       REPORT SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE DEGREE OF  <br />    B.TECH IN INFORMATION TECHNOLOGY UNDER THE SUPERVISION OF<br />“MR. UPENDRA BISHT”            <br />DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN UTTARAKHAND- 248001 MAY    2012<br />

Typology: Study Guides, Projects, Research

2011/2012

Uploaded on 06/12/2012

vipin
vipin 🇮🇳

1

(1)

1 document

1 / 51

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
JUJUSOFT
(A SYSTEM, SECURITY & NETWORKING TOOL)
REPORT SUBMITTED IN PARTIAL FULFILLMENT OF THE
REQUIREMENT FOR THE DEGREE OF
B.TECH
IN
INFORMATION TECHNOLOGY
UNDER THE SUPERVISION OF
“MR. UPENDRA BISHT”
BY
ASHWIN SEMWAL
VIPIN RAWAT
TO
HEAD OF THE DEPARTMENT
[INFORMATION TECHNOLOGY]
DEV BHOOMI INSTITUTE OF TECHNOLOGY
DEHRADUN UTTARAKHAND-248001
MAY 2012
DECLARATION
This is to certify that Thesis/Report entitled “JujuSoft (A System,
Security & Networking tool)” which is submitted by me in partial
fulfillment of the requirement for the award of degree B.Tech in
Information Technology to Dev Bhoomi Institute of Technology
Dehradun, UTU Dehradun Uttarakhand comprises only my original work
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33

Partial preview of the text

Download Vipin's Final year report - Project on networking tools and more Study Guides, Projects, Research Computer Networks in PDF only on Docsity!

JUJUSOFT

(A SYSTEM, SECURITY & NETWORKING TOOL)

REPORT SUBMITTED IN PARTIAL FULFILLMENT OF THE

REQUIREMENT FOR THE DEGREE OF

B.TECH

IN

INFORMATION TECHNOLOGY

UNDER THE SUPERVISION OF

“MR. UPENDRA BISHT”

BY

ASHWIN SEMWAL

VIPIN RAWAT

TO

HEAD OF THE DEPARTMENT

[INFORMATION TECHNOLOGY]

DEV BHOOMI INSTITUTE OF TECHNOLOGY

DEHRADUN UTTARAKHAND-

MAY 2012

DECLARATION

This is to certify that Thesis/Report entitled “ JujuSoft (A System, Security & Networking tool) ” which is submitted by me in partial fulfillment of the requirement for the award of degree B.Tech in Information Technology to Dev Bhoomi Institute of Technology Dehradun, UTU Dehradun Uttarakhand comprises only my original work

and due acknowledgement has been made in the text to all other material used.

Date: Name of Student

Ashwin Semwal

Vipin Rawat

APPROVED BY Mr. Pankaj Chaudhary

Dean Academics Dev Bhoomi Institute of Technology Dehradun

CERTIFICATE

This is to certify that thesis/Report entitled “ Jujusoft (A System, Security & Networking tool) ” which is submitted by Ashwin Semwal and Vipin Rawat in partial fulfillment of the requirement for the award of degree B.Tech in Information Technology to Dev Bhoomi Institute of

At this level of understanding it is often difficult to understand to wide spectrum of knowledge without proper knowledge and guidance. Hence, we would like to pay sincere gratitude to Honorable Chairman who created a healthy and Technical Environment for the successful completion of the project.

In our particulars we would like to thank our colleagues and guide Mr. Upendra Bisht for their round the clock enthusiastic support and suggestions which made this project possible.

We also extend our sincere gratitude to Mr. Pankaj Chaudhary for inspiration, encouragement and for the impetus obtained throughout the course of our project.

Ashwin Semwal Vipin Rawat

ABSTRACT

JujuSoft is a software tool consisting Port Scanner, Packet Analyzer, Command Prompt window and other application in a same interface using dot.net windows form application. These applications are run simultaneously in a single form. Applications are briefly discussed below.

PORT SCANNER: A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it. A port scan or port scan is “An attack that sends client requests to a range of server port addresses on a host, with the goal of finding an active port and exploiting a known vulnerability of that service." PACKET SNIFFER: A packet analyzer (also known as a network analyzer, protocol analyzer, or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network.

COMMAND WINDOW: Command Prompt (executable name cmd.exe) is the Microsoft-supplied command-line interpreter on OS/2, Windows CE and on Windows NT-based operating systems (including Windows 2000, XP, Vista, 7, Server 2003 and Server 2008). It is the analog of COMMAND.COM in MS-DOS and Windows 9x (where it is called MS- DOS Prompt) systems, or of the Unix shells used on Unix-like systems.

LIST OF CONTENTS

Certificate

Acknowledgement

Abstract

  1. Introduction 1.1 Background
  1. System Design Phase 4.1 Design of Input 4.2 Design of Output 4.3 Design of files 4.4 UML Diagrams for the project 4.4.1 Class Diagram for the project. 4.4.2 Activity Chart 4.4.3 Use Case model 4.4.4 Gantt Chart
  2. Project Specification & Implementation 5.1 Packet Sniffer 5.1.1 Introduction 5.1.2 Capabilities 5.1.3 Implementation in Project 5.1.4 Working & Applications

5.2 Port Scanner 5.2.1 Introduction 5.2.2 Capabilities 5.2.3 Implementation in Project 5.2.4 Working & Applications 5.3 Command Window 5.3.1 Introduction 5.3.2 Technical Information 5.3.3 Implementation in project 5.3.4 Working & Application

  1. Snapshots of Project

6.1 Packet Sniffer 6.2 Port Scanner 6.3 Command Window 6.4 Overall Project in Running State

  1. Scope & Further Enhancement of the Project

7.1 Scope as System Tool 7.2 Scope as Networking Tool 7.3 Scope as Security Tool 7.4 Further enhancement of the Project

  1. Bibliography

1. INTRODUCTION

JujuSoft is a software utility tool kit developed in .Net Framework (version 4.0) for the LAN network Analysis. It provides

this project work we work to integrate three different tools into a single platform so that network admin have to open a single GUI to get the same knowledge about its network status.

1.2 Defining the problem

The network engineers and admins undergo many problem using different tools for different operations for managing their network. The main problem that a network admin face with respect to accessing the software tools available are defined below.

  • No tool available till now provides multiple functionalities.
  • Cumbersome to manage different applications for different operations.
  • (^) Problem face due to slow calculation of available port scanners.
  • No user friendly GUI for command line interface.

These problems are faced by the network users who are responsible for the security and system management processes in a LAN network environment. For integrating different Network applications into a common platform we are building this software project.

This software tool is made in .Net framework which can be seen as Security, System and a Networking Tool at the same time. The software

project contains three modules namely Port scanner, Port Sniffer and a little command line tool which makes work a lot easier and at the same time it is scalable and reliable as based on the object oriented approach. The Project tools are briefly described in the next section.

1.3 Packet Sniffer

A packet sniffer is a device or program that allows eavesdropping

on traffic traveling between networked computers. The packet sniffer will capture data that is addressed to other machines, saving it for later analysis.

All information that travels across a network is sent in "packets." For example, when an email is sent from one computer to another, it is first broken up into smaller segments. Each segment has the destination address attached, the source address, and other information such as the number of packets and reassembly order. Once they arrive at the destination, the packet's headers and footers are stripped away, and the packets reconstituted.

In the example of the simplest network where computers share an Ethernet wire, all packets that travel between the various computers are seen by every computer on the network. A hub broadcasts every packet to every machine or node on the network, and then a filter in each computer discards packets not addressed to it. A packet sniffer disables this filter to capture and analyze some or all packets traveling through the Ethernet wire, depending on the sniffer's configuration. This is referred to as

requests across a broad range of ports from a single host. To get around this the intruder can do the port scan in strobe or stealth mode.

By setting different TCP flags or sending different types of TCP packets the port scan can generate different results or locate open ports in different ways. A SYN scan will tell the port scanners which ports are listening and which are not depending on the type of response generated. A FIN scan will generate a response from closed ports- but ports that are open and listening will not send a response, so the port scanner will be able to determine which ports are open and which are not.

1.5 Command Window

Command Prompt (Executable name cmd.exe) is the Microsoft supplied command-line interpreter on OS/2, Windows CE and on Windows NT-based operating systems (including Windows 2000, XP, Vista, 7, Server 2003 and Server 2008). It is the analog of COMMAND.COM in MS-DOS and Windows 9x (where it is called MS- DOS Prompt) systems, or of the UNIX shells used on Unix-like systems Unlike COMMAND.COM, which is a DOS program, cmd.exe is a native program for the platform. This allows it to take advantage of features available to native programs on the platform that are otherwise unavailable to DOS programs.

For example, since cmd.exe is a native text-mode application on OS/2, it can use real pipes in command pipelines, allowing both sides of the pipeline to run concurrently. As a result, it is possible to redirect the standard error in cmd.exe, unlike COMMAND.COM. (COMMAND.COM uses temporary files, and runs the two sides serially, one after the other.)

In reality, cmd.exe is a Windows program that acts as a DOS-like command line interpreter.

  1. SYSTEM ANALYSIS

No matter how well designed or well coded, a poorly analyzed and specified software application will not only disappoint the users but also bring grief to the developer...

2. System Analysis

  1. Economic Feasibility
  2. Operational Feasibility

2.1.2 Technical Feasibility

The project is within the state of art, software and hardware technology that will be used is already in industry market and is being used in software development by the industry. Software will be developed using one of the currently used visual languages. Hardware requirement is those of a desktop latest available processor will used. Storage capacity is medium. Memory requirement is low. Extra library used during is project is easy to install.

2.1.3 Economic Feasibility

Proposed software is an in house project used as application software. The organization has its own copy of own original, legal, acquired language package. The organization has the resources needed to run the software. The work is a part of research work and free training that is conducted at the institute. Therefore it is feasible for the organization to develop the software.

2.1.4 Operational Feasibility

The operations that are to be applied to the input data can be easily converted into functions. The project is using object oriented language to develop the modules which is operationally feasible. After system analysis we find that the software is operationally feasible.

2.1.5 Behavioral Feasibility

The application requires no special technical guidance and all the views and Tool Tips available in the application are self-explanatory. The users are well guided with warning and failure messages for all the actions taken. However Application Contains a Help menu And Reading Manual which makes works a lot easier for user.

2.2 User Requirements and Process Models

2.2.1 User Requirement Specifications

User requirement specifications is taken and documented in SRS document which is then signed by the user and the development authorities. This document contains all requirement of the user from the project and every phase in the development has to be connected directly

mentioned serious problems, engineers have come up with various process models. Although, there is no “ideal” software process, following either a standard or custom made model is very important for better project management and the production of quality software.

2.2.2.1 Process Model for the project or Developing Methodology

We followed a combination of two standard and very flexible models; spiral model and incremental model. The essence of these models was that the specification was developed in conjunction with the software. Spiral model was used as the main process and an explicit risk management was performed at the beginning of each spiral.

Each loop in this process consists of four distinct phases. Setting objectives, discovering the possible risks and identifying the constraints were the activities of the first phase. In the second phase, risks were managed so that the impact of risks was reduced. In the third phase, based on the incremental model the increment was built or a relevant document was produced. In the final stage each iteration status and the progress of the software were reviewed and the project was moved to the next iteration.

2.3 Requirement Engineering

This section describes what services are required from the system and the constraints under which the system operates and is developed. This phase of the project is very crucial simply because a small change or an error in this stage invariably leads to considerable amount of rework and may cause serious problems in the subsequent system design and implementation phases.

2.3.1 Software and Hardware Requirements

This project is a window-based application developed using following technologies: Development tools:

  • Microsoft .Net Framework 4.
  • (^) Vb.Net