A professional-grade Python security tool developed in Visual Studio Code. This project demonstrates how to use low-level networking libraries to discover active hosts on a local network and audit specific ports for security vulnerabilities.
- ARP Scanning: Broadcasts ARP requests to identify live devices via MAC address.
- TCP Port Discovery: Performs a SYN scan to detect open services (like SSH, HTTP).
- Automatic Logging: Exports all findings into a structured
scan_results.csvfile. - Input Protection: Validates IP addresses using Regex (Regular Expressions) to prevent errors.
This project requires Python 3 and the Scapy library.
-
Clone the project
git clone [https://github.com/obi-ijeomah/network-scanner.git](https://github.com/obi-ijeomah/network-scanner.git)
-
Install Scapy Run the following command in your terminal:
pip install scapy -
Start the scanner Open your terminal (Bash or PowerShell) in the project folder and run the script:
python network_scanner.py
-
Enter a single IP address (e.g., 203.0.113.42).
-
The script will attempt to find the MAC address and scan for common ports.
-
Type quit to exit and save the final report.
-
automated_network_scanner.py: The main Python script.
-
README.md: Documentation and instructions (the file you are reading).
-
.gitignore: Prevents temporary cache files and your private scan results from being uploaded.
-
scan_results.csv (Generated after scan): Contains the final report.
The scanner uses a TCP Three-Way Handshake logic for port scanning. It sends a SYN packet; if the target responds with SYN-ACK, the port is considered open.
This tool is for educational purposes only. Unauthorized scanning of networks is illegal. Always obtain explicit permission before running this tool against any network.