Ethical Hacking

Web Server fingerprinting tool

Project Scope

The scope of the project is to develop a command line program , which would fingerprint a web server based on the information received in response to a HTTP Get request. For this purpose, a HTTP Get request is sent to the server and the response header is analyzed. The codes takes the URL or IP address of the server as input. The code output is shown below.

Webserver fingerprinting tool

Platform : Python

Report Contents

1. Source Code
2. Brief code explanation
3. Code output
4. Brief code explanation.

Pages -3

Price – $15

———————————————————————————————————————-

How to Buy the Report

———————————————————————————————————————

Click on the Add to Cart button and make the payment with a PayPal account or credit card on PayPal website.

Add to Cart

The report would be downloaded immediately after successful payment and you would also receive a copy of the report in your email used for payment.

———————————————————————————————————————-

Python Network Programming Course – Learn to make your own network tools Click to view details

IP Spoofing demonstration

Project Scope

IP spoofing is a type of security attack in which the attacker spoofs the source address in the IP header to a fake IP address. The project aims to demonstrate the concept of IP spoofing by using packet crafting tools like Scapy in a test lab.

Read more »

ARP Spoofing and cache poison attack demonstration

Project Scope

ARP spoofing is a type of security attack in which the attacker spoofs the ARP reply packet sent to a destination with its own mac-address. The project aims to demonstrate the concept of ARP spoofing, where the ARP cache of Windows XP is poisoned with the

Read more »

ICMP Flood attack simulation

Project Scope:

ICMP flooding is a type of security attack in which the attacker sends numerous IMCP packets to victim to exhaust its resources and create a DOS attack. The project aims to demonstrate the concept of ICMP flooding with packet crafting tools like Scapy in a test lab.

Read more »