OPEN PORT SCANNER TO IDENTIFY OPEN PORTS USING PYTHON

Authors

  • Rohit Marni
  • Udaykiran Reddy Madgul
  • Chandra Teja Koyyala

DOI:

https://doi.org/10.46243/jst.2023.v8.i12.pp17-22

Keywords:

.

Abstract

An Open Port Scanner is a vital tool for identifying open network ports on a target system, which is crucial for network security assessment and troubleshooting. This abstract introduces a Python-based Open Port Scanner designed to help network administrators and security professionals quickly and efficiently identify open ports on a target host. The tool leverages Python's socket library to establish connections with various network services on the target system, and it can be customized to scan specific port ranges or even conduct comprehensive scans on multiple hosts. The Open Port Scanner operates by systematically probing a range of TCP or UDP ports on a target host to determine their open or closed status. It provides real-time feedback on the ports' accessibility, making it a valuable asset for identifying potential vulnerabilities and unauthorized services. The tool also includes features for customizing scan parameters, such as setting timeout values and specifying multiple target hosts. The results of the scan are presented in a user-friendly format, enabling users to easily identify open ports and assess the network's security posture. This Python-based Open Port Scanner serves as a powerful and flexible solution for network administrators and security experts seeking to secure their systems and networks by proactively identifying and addressing potential vulnerabilities. Its opensource nature allows for further customization and integration into existing network security workflows, making it a valuable addition to the toolkit of those responsible for maintaining the integrity of network infrastructure.

Downloads

Published

2023-12-12

How to Cite

Marni , R., Madgul, U. R., & Koyyala, C. T. (2023). OPEN PORT SCANNER TO IDENTIFY OPEN PORTS USING PYTHON. Journal of Science & Technology (JST), 8(12), 17–22. https://doi.org/10.46243/jst.2023.v8.i12.pp17-22