SlideShare a Scribd company logo
NODE FINDING AND PORT SCANNING UTILITY
FOR ANDROID
VA RUN VA R SHNEY 9910103491
PRABHAT GOYAL 9910103582
Node Finder
Contents
1. Problem Statement
2. Introduction : What is NodeFinder
3. Node Finding Steps
4. ICMP ECHO Diagram
5. ARP Operation Diagram
6. Port Scanning Steps
7. TCP Connect()
8. Port Open
9. Port Closed
10. Implementation Screenshots
11. Future Work
Problem Statement
 One of the very first steps in any network reconnaissance mission is to reduce a
(sometimes huge) set of IP ranges into a list of active or interesting hosts. Scanning
every port of every single IP address is slow and usually unnecessary. Of course what
makes a host interesting depends greatly on the scan purposes.
 Network administrators may only be interested in hosts running a certain service, while
security auditors may care about every single device with an IP address. An
administrator may be comfortable using just an ICMP ping to locate hosts on his
internal network, while an external penetration tester may use a diverse set of dozens of
probes in an attempt to evade firewall restrictions.
Introduction : What is Node Finder ?
 Node Finder automatically detects the type of network and uses the most appropriate
technique to find about your devices. All devices are identified, with network
addresses, name and manufacturer. You may customize them with your own labels, and
have a complete picture in no time.
 Node Finder also provides a feature of Port Scanning which can be used administrators
and home users to verify security policies of their networks and by attackers to identify
the running services on a host with the view to compromise it.
 Node Finder also gives the user the option to save and export the current results in an
XML file on the device’s file system which can be used by other applications for
further analysis.
 Other options like updating Network Interface Card Manufacturer list, Vibrate on scan
Complete, and controlling rate of finding nodes is also provided to the user.
Node Finding Steps
The method that is being used, does not need to have root privileges.
Here is how it works:
1. Calculate the sub network range
2. Iterate throughout IP and query them
3. First it sends an ICMP ping or Echo on TCP/7 (with InetAddress.isReachable())
4. If it does not work, it tries to connect () on well-known open TCP ports such as: 135,
139, 22, 111, 80 5. If none of the above is successful, the host is not discovered
ICMP ECHO
Address Resolution Protocol Operation
Port Scanning Steps
 Port scan is event driven, using Java's Selector and Socket Channel.
 There is a fake time out by registering the time in milliseconds at socket's creation and
checking this value regularly.
 The port scan method, as discovery, uses full TCP connection check.
 A maximum of 127 Sockets are opened at a time, so this is not always accurate, but
quite fast.
 A port is considered open when TCP connect() is fully successful, closed when no
service is listening on the other end, or filtered when the time out is reached.
TCP Connect()
 TCP connect( ) port scanning is the most simple type of probe to launch. There is no
stealth whatsoever involved in this form of scanning because a full TCP/IP connection
is established with TCP port one of the target host, then incrementally through ports
two, three, four, and so on.
 TCP/IP's reliability as a protocol, vanilla port scanning is a very accurate way to
determine which TCP services are accessible on a given target host. Various TCP
packets and their flags, as they are sent and received by the attacker and the host he is
scanning.
Port Open
• The attacker first sends a SYN probe packet to the port he wishes to test. Upon
receiving a packet from the port with the SYN and ACK flags set, he knows that the
port is open. The attacker completes the three-way handshake by sending an ACK
packet back.
Port Closed
 If, however, the target port is closed, the attacker receives an RST/ACK packet directly
back
 As before, the attacker sends a SYN probe packet, but the target server responds with
an RST/ACK. Standard connect( ) scanning in this way is a reliable way to identify
accessible TCP network services. The downside is that the scanning type is extremely
simple and hence easily identified and logged.
Implementation Screenshots
Node finder presentation
Node finder presentation
Future Work
There is a broad scope of improvement and work which could be done in direction make it
better. Few of them are as stated below:
 Save all scans in a database, open previous scans, export previous scans, etc.
 Settings: prevent phone from sleeping
 NMAP build script
 Add new information such as Hops
 Support of other protocols: UDP, SCTP
 Send custom packets (shell codes, exploits)
 Nat Traversal
 Proxy (auto) support
Node finder presentation

More Related Content

PDF
Ch 5: Port Scanning
Sam Bowne
 
PPTX
Network Layer Part 6
Tutun Juhana
 
PDF
Dcn (transmission control protocol) ppt
Vijay Kumar
 
PPT
Port Scanning
amiable_indian
 
PPTX
ICMP
Naveed Channa
 
PPTX
Ip and icmp
Programmer
 
PPT
(Icmp) internet control message protocol version 4
Gouasmia Zakaria
 
Ch 5: Port Scanning
Sam Bowne
 
Network Layer Part 6
Tutun Juhana
 
Dcn (transmission control protocol) ppt
Vijay Kumar
 
Port Scanning
amiable_indian
 
Ip and icmp
Programmer
 
(Icmp) internet control message protocol version 4
Gouasmia Zakaria
 

What's hot (20)

PPTX
ICMPV4
rajshreemuthiah
 
PPT
Icmp V4 And Icmp V6
Ram Dutt Shukla
 
PPTX
05 coms 525 tcpip - icmp
Palanivel Kuppusamy
 
PPT
Module 3 Scanning
leminhvuong
 
PPTX
ICMP
Ruhollah Arabi
 
PPT
Ch09
tejindershami
 
PPT
Arp spoofing
Luthfi Widyanto
 
PPT
Internet control message protocol
asimnawaz54
 
PPTX
Address resolution protocol (ARP)
NetProtocol Xpert
 
PPT
New Creators
guestf7a1f18
 
PPT
Features of tcp (part 2) .68
myrajendra
 
PPTX
Chap2. ipv4-arp-icmp
東原 李
 
PPTX
Computer networks protocols
Mustafa Qamar-ud-Din
 
TXT
Mc qs socket programming
Umair Aslam
 
PPT
Address resolution protocol
asimnawaz54
 
DOCX
Final networks lab manual
Jaya Prasanna
 
PDF
Arp Cache Poisoning
Subhash Kumar Singh
 
Icmp V4 And Icmp V6
Ram Dutt Shukla
 
05 coms 525 tcpip - icmp
Palanivel Kuppusamy
 
Module 3 Scanning
leminhvuong
 
Arp spoofing
Luthfi Widyanto
 
Internet control message protocol
asimnawaz54
 
Address resolution protocol (ARP)
NetProtocol Xpert
 
New Creators
guestf7a1f18
 
Features of tcp (part 2) .68
myrajendra
 
Chap2. ipv4-arp-icmp
東原 李
 
Computer networks protocols
Mustafa Qamar-ud-Din
 
Mc qs socket programming
Umair Aslam
 
Address resolution protocol
asimnawaz54
 
Final networks lab manual
Jaya Prasanna
 
Arp Cache Poisoning
Subhash Kumar Singh
 
Ad

Similar to Node finder presentation (20)

DOC
Itep
Sofia Palawan
 
PPT
01204427-scanner.ppt
VarunBehere1
 
PDF
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Olli-Pekka Niemi
 
PDF
A Survey on different Port Scanning Methods and the Tools used to perform the...
Naomi Hansen
 
PDF
Network Scanning refers to the set of procedures adopted for identifying a ne...
MarkoKustro
 
PPTX
Sccccccccccccccccccccccannig Network.pptx
rsi3pfe
 
PPT
5. icmp
Swati Arora
 
PPTX
Scanning and Enumeration in Cyber Security.pptx
MahdiHasanSowrav
 
ODP
Group Apres
ramya5a
 
ODP
C Cpres
ramya5a
 
ODP
C Cpres
ramya5a
 
ODP
C Cpres
ramya5a
 
PPTX
Packet sniffers
Kunal Thakur
 
PDF
Ceh v5 module 03 scanning
Vi Tính Hoàng Nam
 
PPT
Week 10 - Packet Sssdssssssssniffers.ppt
fzbshf
 
DOCX
Contents namp
shwetha mk
 
DOCX
Contents namp
shwetha mk
 
01204427-scanner.ppt
VarunBehere1
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Olli-Pekka Niemi
 
A Survey on different Port Scanning Methods and the Tools used to perform the...
Naomi Hansen
 
Network Scanning refers to the set of procedures adopted for identifying a ne...
MarkoKustro
 
Sccccccccccccccccccccccannig Network.pptx
rsi3pfe
 
5. icmp
Swati Arora
 
Scanning and Enumeration in Cyber Security.pptx
MahdiHasanSowrav
 
Group Apres
ramya5a
 
C Cpres
ramya5a
 
C Cpres
ramya5a
 
C Cpres
ramya5a
 
Packet sniffers
Kunal Thakur
 
Ceh v5 module 03 scanning
Vi Tính Hoàng Nam
 
Week 10 - Packet Sssdssssssssniffers.ppt
fzbshf
 
Contents namp
shwetha mk
 
Contents namp
shwetha mk
 
Ad

Recently uploaded (20)

PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PDF
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
PDF
JUAL EFIX C5 IMU GNSS GEODETIC PERFECT BASE OR ROVER
Budi Minds
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PDF
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
PPTX
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PPTX
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PPT
Ppt for engineering students application on field effect
lakshmi.ec
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PPT
SCOPE_~1- technology of green house and poyhouse
bala464780
 
PDF
Software Testing Tools - names and explanation
shruti533256
 
PDF
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
JUAL EFIX C5 IMU GNSS GEODETIC PERFECT BASE OR ROVER
Budi Minds
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
Inventory management chapter in automation and robotics.
atisht0104
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
Ppt for engineering students application on field effect
lakshmi.ec
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
SCOPE_~1- technology of green house and poyhouse
bala464780
 
Software Testing Tools - names and explanation
shruti533256
 
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 

Node finder presentation

  • 1. NODE FINDING AND PORT SCANNING UTILITY FOR ANDROID VA RUN VA R SHNEY 9910103491 PRABHAT GOYAL 9910103582 Node Finder
  • 2. Contents 1. Problem Statement 2. Introduction : What is NodeFinder 3. Node Finding Steps 4. ICMP ECHO Diagram 5. ARP Operation Diagram 6. Port Scanning Steps 7. TCP Connect() 8. Port Open 9. Port Closed 10. Implementation Screenshots 11. Future Work
  • 3. Problem Statement  One of the very first steps in any network reconnaissance mission is to reduce a (sometimes huge) set of IP ranges into a list of active or interesting hosts. Scanning every port of every single IP address is slow and usually unnecessary. Of course what makes a host interesting depends greatly on the scan purposes.  Network administrators may only be interested in hosts running a certain service, while security auditors may care about every single device with an IP address. An administrator may be comfortable using just an ICMP ping to locate hosts on his internal network, while an external penetration tester may use a diverse set of dozens of probes in an attempt to evade firewall restrictions.
  • 4. Introduction : What is Node Finder ?  Node Finder automatically detects the type of network and uses the most appropriate technique to find about your devices. All devices are identified, with network addresses, name and manufacturer. You may customize them with your own labels, and have a complete picture in no time.  Node Finder also provides a feature of Port Scanning which can be used administrators and home users to verify security policies of their networks and by attackers to identify the running services on a host with the view to compromise it.  Node Finder also gives the user the option to save and export the current results in an XML file on the device’s file system which can be used by other applications for further analysis.  Other options like updating Network Interface Card Manufacturer list, Vibrate on scan Complete, and controlling rate of finding nodes is also provided to the user.
  • 5. Node Finding Steps The method that is being used, does not need to have root privileges. Here is how it works: 1. Calculate the sub network range 2. Iterate throughout IP and query them 3. First it sends an ICMP ping or Echo on TCP/7 (with InetAddress.isReachable()) 4. If it does not work, it tries to connect () on well-known open TCP ports such as: 135, 139, 22, 111, 80 5. If none of the above is successful, the host is not discovered
  • 8. Port Scanning Steps  Port scan is event driven, using Java's Selector and Socket Channel.  There is a fake time out by registering the time in milliseconds at socket's creation and checking this value regularly.  The port scan method, as discovery, uses full TCP connection check.  A maximum of 127 Sockets are opened at a time, so this is not always accurate, but quite fast.  A port is considered open when TCP connect() is fully successful, closed when no service is listening on the other end, or filtered when the time out is reached.
  • 9. TCP Connect()  TCP connect( ) port scanning is the most simple type of probe to launch. There is no stealth whatsoever involved in this form of scanning because a full TCP/IP connection is established with TCP port one of the target host, then incrementally through ports two, three, four, and so on.  TCP/IP's reliability as a protocol, vanilla port scanning is a very accurate way to determine which TCP services are accessible on a given target host. Various TCP packets and their flags, as they are sent and received by the attacker and the host he is scanning.
  • 10. Port Open • The attacker first sends a SYN probe packet to the port he wishes to test. Upon receiving a packet from the port with the SYN and ACK flags set, he knows that the port is open. The attacker completes the three-way handshake by sending an ACK packet back.
  • 11. Port Closed  If, however, the target port is closed, the attacker receives an RST/ACK packet directly back  As before, the attacker sends a SYN probe packet, but the target server responds with an RST/ACK. Standard connect( ) scanning in this way is a reliable way to identify accessible TCP network services. The downside is that the scanning type is extremely simple and hence easily identified and logged.
  • 15. Future Work There is a broad scope of improvement and work which could be done in direction make it better. Few of them are as stated below:  Save all scans in a database, open previous scans, export previous scans, etc.  Settings: prevent phone from sleeping  NMAP build script  Add new information such as Hops  Support of other protocols: UDP, SCTP  Send custom packets (shell codes, exploits)  Nat Traversal  Proxy (auto) support