z-logo
open-access-imgOpen Access
Automatic Port Scanner
Author(s) -
Moona Olakara Mohammed
Publication year - 2020
Publication title -
international journal of innovative science and research technology
Language(s) - English
Resource type - Journals
ISSN - 2456-2165
DOI - 10.38124/ijisrt20sep503
Subject(s) - computer security , computer science , vulnerability (computing) , identification (biology) , asset (computer security) , port (circuit theory) , scanner , computer network , network security , programmer , operating system , engineering , artificial intelligence , botany , electrical engineering , biology
In a computer network, an attack is an attempt to destroy or steal unauthorized information or make use of information as an asset. One of the attacks is a reconnaissance attack considered as the first step of a computer attack. This type of attack is mostly done by a black hat, an expert in the programmer, by scanning the internal network devices and gather vulnerability information. In this paper, shows the identification of open ports and services through the network and available IP on the network are possible to attack.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here