Skip to content

Network Security Tools Writing, Hacking, and Modifying Security Tools

Best in textbook rentals since 2012!

ISBN-10: 0596007949

ISBN-13: 9780596007942

Edition: 2005

Authors: Nitesh Dhanjani, Justin Clarke

List price: $34.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle. Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. "Network Security Tools shows experienced administrators how…    
Customers also bought

Book details

List price: $34.95
Copyright year: 2005
Publisher: O'Reilly Media, Incorporated
Publication date: 4/14/2005
Binding: Paperback
Pages: 344
Size: 7.00" wide x 9.25" long x 1.00" tall
Weight: 1.210
Language: English

Preface
Modifying and Hacking Security Tools
Writing Plug-ins for Nessus
The Nessus Architecture
Installing Nessus
Using Nessus
The NASL Interpreter
Hello World
Datatypes and Variables
Operators
if...else
Loops
Functions
Predefined Global Variables
Important NASL Functions
Nessus Plug-ins
Developing Dissectors and Plug-ins for the Ettercap Network Sniffer
Installing and Using Ettercap
Writing an Ettercap Dissector
Writing an Ettercap Plug-in
Extending Hydra and Nmap
Extending Hydra
Adding Service Signatures to Nmap
Writing Plug-ins for the Nikto Vulnerability Scanner
Installing Nikto
Using Nikto
Nikto Under the Hood
Existing Nikto Plug-ins
Adding Custom Entries to the Plug-in Databases
Using LibWhisker
Writing an NTLM Plug-in for Brute-Force Testing
Writing a Standalone Plug-in to Attack Lotus Domino
Writing Modules for the Metasploit Framework
Introduction to MSF
Overview of Stack Buffer Overflows
Writing Exploits for MSF
Writing a Module for the MnoGoSearch Overflow
Writing an Operating System Fingerprinting Module for MSF
Extending Code Analysis to the Webroot
Attacking Web Applications at the Source
Toolkit 101
PMD
Extending PMD
Writing Network Security Tools
Fun with Linux Kernel Modules
Hello World
Intercepting System Calls
Hiding Processes
Hiding from netstat
Developing Web Assessment Tools and Scripts
Web Application Environment
Designing the Scanner
Building the Log Parser
Building the Scanner
Using the Scanner
Complete Source Code
Automated Exploit Tools
SQL Injection Exploits
The Exploit Scanner
Using the Scanner
Writing Network Sniffers
Introduction to libpcap
Getting Started with libpcap
libpcap and 802.11 Wireless Networks
libpcap and Perl
libpcap Library Reference
Writing Packet-Injection Tools
Introduction to libnet
Getting Started with libnet
Advanced libnet Functions
Combining libnet and libpcap
Introducing AirJack
Index