Authors :
Deekshith V. K; Karthika Chandran; Nidhisree P. V; Rashma T. V
Volume/Issue :
Volume 8 - 2023, Issue 4 - April
Google Scholar :
https://bit.ly/3TmGbDi
Scribd :
https://bit.ly/3pDapaf
DOI :
https://doi.org/10.5281/zenodo.7927531
Abstract :
Network scanning and vulnerability testing
rely on processes and tools to scan your network and its
devices for vulnerabilities. It helps improve an
organization’s security policy by identifying
vulnerabilities and ensures that the security measures
taken actually provide the protection an organization
expects and needs. Administrators should perform
regular vulnerability scans to find network
vulnerabilities that allow exploits to compromise or
destroy data or devices. Different network scanning
implementations and tools have different capabilities
and different types of results. The heterogeneity of these
results usually makes subsequent analysis difficult. In
this paper, we consider two basic open-source scanners
as NMAP. We show how to integrate these two scanners
into a well-structured GUI to provide reliable
information. Based on the obstacles of NMAP, another
tool was developed that combines the strengths of both
devices and overcomes some of their shortcomings. A
network scanner developed for this paper scans the
network to identify active hosts, remote hosts’ operating
systems, and programs installed on those hosts. You can
find open ports, list services running on a host, and
identify active hosts. Further vulnerability scanning is
conducted by comparing the information gathered from
the network scan to a database of vulnerability
signatures to create a group of suspected vulnerabilities
that exist on the network. In addition to performing
network scans and vulnerability assessments, the new
tool also added an automated scanning mechanism to
test whether a device has been compromised. This paper
examines the capabilities of the new tool. That is, various
formats are used to display network maps,
vulnerabilities, and configuration errors. Furthermore, a
simple methodology is characterized by shortening the
output period of weakness.
Keywords :
Nmap, UI, IP, CPE, DHCP, OpenVAS, GUI, NVD, API, HTTP, CEE
Network scanning and vulnerability testing
rely on processes and tools to scan your network and its
devices for vulnerabilities. It helps improve an
organization’s security policy by identifying
vulnerabilities and ensures that the security measures
taken actually provide the protection an organization
expects and needs. Administrators should perform
regular vulnerability scans to find network
vulnerabilities that allow exploits to compromise or
destroy data or devices. Different network scanning
implementations and tools have different capabilities
and different types of results. The heterogeneity of these
results usually makes subsequent analysis difficult. In
this paper, we consider two basic open-source scanners
as NMAP. We show how to integrate these two scanners
into a well-structured GUI to provide reliable
information. Based on the obstacles of NMAP, another
tool was developed that combines the strengths of both
devices and overcomes some of their shortcomings. A
network scanner developed for this paper scans the
network to identify active hosts, remote hosts’ operating
systems, and programs installed on those hosts. You can
find open ports, list services running on a host, and
identify active hosts. Further vulnerability scanning is
conducted by comparing the information gathered from
the network scan to a database of vulnerability
signatures to create a group of suspected vulnerabilities
that exist on the network. In addition to performing
network scans and vulnerability assessments, the new
tool also added an automated scanning mechanism to
test whether a device has been compromised. This paper
examines the capabilities of the new tool. That is, various
formats are used to display network maps,
vulnerabilities, and configuration errors. Furthermore, a
simple methodology is characterized by shortening the
output period of weakness.
Keywords :
Nmap, UI, IP, CPE, DHCP, OpenVAS, GUI, NVD, API, HTTP, CEE