pt. I. Nessus tools -- Ch. 1. The inner workings of NASL (Nessus attack scripting language) -- Ch. 2. Debugging NASLs -- Ch. 3. Extensions and custom tests -- Ch. 4. Understanding the extended capabilities of the Nessus environment -- Ch. 5. Analyzing GetFileVersion and MySQL passwordless test -- Ch. 6. Automating the creation of NASLs -- pt. II. Snort tools -- Ch. 7. The inner workings of Snort -- Ch. 8. Snort rules -- Ch. 9. Plugins and preprocessors -- Ch. 10. Modifying Snort -- pt. III. Ethereal tools -- Ch. 11. Capture file formats -- Ch. 12. Protocol dissectors -- Ch. 13. Reporting from Ethereal -- App. A. Host integrity monitoring using Osiris and Samhain.
0
SUMMARY OR ABSTRACT
Text of Note
Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts.