Mini Projects

Mini Project Books on Networks and Security

Network administration Vol 1.0

The network administration mini projects books consists of networking requirements encountered by a network administrator and identifying the appropriate solution for the same. The following projects are included in the book.

Recovering FTP password using appropriate software
Internet bandwidth management solution
Remote network monitoring solution
Internet load balancing solution
Network mapping solution based on IP addresses
Wireless network scanning solution
Detecting IP address of access point.
Network Internet activity Monitoring
Remote PC restart
IP address identifier on the network.
Redundant internet connection solution
Radius server authentication

Sample Content below

Project – Internet load balancing solution

Networking requirement

An enterprise has 3 ADSL internet connections. It is required that all the three internet connections are equally load balanced by users in the organization. It should also be possible to prioritize any specific internet link. Identify an appropriate solution.


On a typical network, when there are three internet connections, the path corresponding to the lowest metric value would be selected. Due to this, an internet bound packet would typically take the link with the lowest metric value. Although the link might be a high speed link, the effective speed which the users achieve would be slow since all internet bound packets would take the specific link. The available three internet connections available for the enterprise are not used effectively in this scenario.

To resolve this issue, the enterprise can buy an internet load balancing appliance and setup on the network. The appliance would perform load balancing on all the links and route internet bound packets accordingly. This would help the enterprise to achieve better performance for internet access for users on the network. When the appliance is setup, all the three internet links are used effectively by the users in the enterprise.

PEPLINK is a vendor which manufactures Internet Load balancing appliance. The appliance has multiple WAN interfaces which can be used for connecting different internet links. The details of the product can be found in the below link.

Pages in Book – 20

Price – $9.99

Buy the book from Amazon

Network Security attacks Vol 1.0

The network security attacks mini projects book demonstrates the working of the following networking attacks.

1. DDOS based TCP Syn flood attack.
2. ICMP address mask attack.
3. TCP Scan attack.
4. IP Spoofing attack.

The attacks are crafted using various tools like hping, scapy, nmap and verified with the use of wireshark in a network lab. The procedure to setup the lab, scripts and codes required for simulating the attack, guidelines and components to setup the tools and the lab is included in the book.

Total pages in book – 13

Price – $15

How to Buy

Click on the Add to Cart Button to Buy and Download with Paypal account or with credit card on PayPal website

Add to Cart

The Ebook would be downloaded automatically and you would also receive a copy of the ebook in the email used for payment.

Network Security Mini Projects Vol 1.o

The network security Mini project book contains 7 project requirements in network security and proposes appropriate solutions to achieve the requirement. The following are the list of projects in the Ebook.

Router access control using IP based filters.
Detecting rogue DHCP servers through network scanning
Cam flood vulnerability testing
Detecting eavesdropping vulnerability on servers using scanning techniques
Detecting TCP pattern based attacks on Servers using traffic analyzers
Testing Networks for ACL Implementation
Perimeter router service detection


Sample Below

Project – Detecting rogue DHCP servers through network scanning


On a LAN network, a mechanism has to be identified for detecting unauthorized DHCP servers using appropriate network scanning techniques


NMAP tool can be used to scan the network for identifying IP addresses on the network which has UDP port number 67 for DHCP servers. After the IP addresses are identified, the administrator would be able to analyze the rogue server. Rogue dhcp servers are setup on the network by attackers to create disruption of services. As the network administrator would be aware of the IP address of the DHCP server on the network, any other IP address associated with UDP port 67 would be identified as a rogue DHCP server.

The following screenshot shows the command which can be used for scanning the network for udp port 67. The output of the command returns the dhcp servers on the network. In this network, there is only one valid dhcp server, which is status of the port 67 is shown as open.

The screenshot of the scan is shown in the Ebook.

Buy with PayPal or from Amazon


Ebook Price – $9

Click on the Add to Cart button to buy with credit card or Paypal account on Paypal website

Add to Cart

The Ebook would be downloaded automatically and you would receive the copy of the ebook in the email used for payment.


Buy from Amazon