This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
University of Novi Sad , Novi Sad , Serbia
Preschool Teacher Training and Business Informatics College of Applied Studies "Sirmium" , Sremska Mitrovica , Serbia
Technical faculty “Mihajlo Pupin”, University of Novi Sad , Novi Sad , Serbia
In this paper we examine and compare several custom-made implementations of a network and port scanner that are written in Python programming language as a part of a Information systems security course teaching material. Network scanning tools play an important role in network information gathering, which is the first step in penetration testing. First version of network and port scanner comes in two sub versions: for Windows and Linux operating systems, and a slightly modified version to address specifics of Android devices. Both varieties of first version use ping command to see if a device with a certain IP address will respond to them and then uses TCP sockets to scan range of ports on a device that responded. Second version of network and port scanner uses ARP Protocol to scan a network for connected devices and then uses TCP sockets to scan range of ports on a device that responded to broadcasted package. In the late section of this paper, we emphasize advantages, disadvantages, performances and ease of usage of previously mentioned implementations. We also discuss ethical dilemmas of using such tools from the aspect of security professionals, programmers, common computer users and IT students.
The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.