
Automatic Port Scanner
Author(s) -
Moona Olakara Mohammed
Publication year - 2020
Publication title -
international journal of innovative science and research technology
Language(s) - English
Resource type - Journals
ISSN - 2456-2165
DOI - 10.38124/ijisrt20sep503
Subject(s) - computer security , computer science , vulnerability (computing) , identification (biology) , asset (computer security) , port (circuit theory) , scanner , computer network , network security , programmer , operating system , engineering , artificial intelligence , botany , electrical engineering , biology
In a computer network, an attack is an attempt to destroy or steal unauthorized information or make use of information as an asset. One of the attacks is a reconnaissance attack considered as the first step of a computer attack. This type of attack is mostly done by a black hat, an expert in the programmer, by scanning the internal network devices and gather vulnerability information. In this paper, shows the identification of open ports and services through the network and available IP on the network are possible to attack.