Netobile: Network Vulnerability Scanner


Authors : Deekshith V. K; Karthika Chandran; Nidhisree P. V; Rashma T. V

Volume/Issue : Volume 8 - 2023, Issue 4 - April

Google Scholar : https://bit.ly/3TmGbDi

Scribd : https://bit.ly/3pDapaf

DOI : https://doi.org/10.5281/zenodo.7927531

Network scanning and vulnerability testing rely on processes and tools to scan your network and its devices for vulnerabilities. It helps improve an organization’s security policy by identifying vulnerabilities and ensures that the security measures taken actually provide the protection an organization expects and needs. Administrators should perform regular vulnerability scans to find network vulnerabilities that allow exploits to compromise or destroy data or devices. Different network scanning implementations and tools have different capabilities and different types of results. The heterogeneity of these results usually makes subsequent analysis difficult. In this paper, we consider two basic open-source scanners as NMAP. We show how to integrate these two scanners into a well-structured GUI to provide reliable information. Based on the obstacles of NMAP, another tool was developed that combines the strengths of both devices and overcomes some of their shortcomings. A network scanner developed for this paper scans the network to identify active hosts, remote hosts’ operating systems, and programs installed on those hosts. You can find open ports, list services running on a host, and identify active hosts. Further vulnerability scanning is conducted by comparing the information gathered from the network scan to a database of vulnerability signatures to create a group of suspected vulnerabilities that exist on the network. In addition to performing network scans and vulnerability assessments, the new tool also added an automated scanning mechanism to test whether a device has been compromised. This paper examines the capabilities of the new tool. That is, various formats are used to display network maps, vulnerabilities, and configuration errors. Furthermore, a simple methodology is characterized by shortening the output period of weakness.

Keywords : Nmap, UI, IP, CPE, DHCP, OpenVAS, GUI, NVD, API, HTTP, CEE

CALL FOR PAPERS


Paper Submission Last Date
30 - April - 2024

Paper Review Notification
In 1-2 Days

Paper Publishing
In 2-3 Days

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe