Nessus, Snort, & Ethereal power tools : customizing open source security applications / Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison.
Material type:
TextSeries: Jay Beale's open source security seriesPublication details: Rockland, MA : Syngress ; [Sebastopol, Calif.] : Distributed by O'Reilly Media, ©2005.Description: 1 online resource (xxvi, 445 pages) : illustrationsContent type: - text
- computer
- online resource
- 1423754220
- 9781423754220
- 0080489427
- 9780080489421
- 9781597490207
- 1597490202
- Nessus, Snort, and Ethereal power tools
- Customizing open source security applications
- Computer networks -- Security measures
- Open source software
- Computer networks -- Security measures
- Open source software
- COMPUTERS -- Internet -- Security
- COMPUTERS -- Networking -- Security
- COMPUTERS -- Security -- General
- Computer networks -- Security measures
- Open source software
- Computer networks -- Security measures
- Open source software
- 005.8 22
- TK5105.59 .A734 2005eb
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | EBSCO Computers | Available |
Print version record.
pt. I. Nessus tools -- Ch. 1. The inner workings of NASL (Nessus attack scripting language) -- Ch. 2. Debugging NASLs -- Ch. 3. Extensions and custom tests -- Ch. 4. Understanding the extended capabilities of the Nessus environment -- Ch. 5. Analyzing GetFileVersion and MySQL passwordless test -- Ch. 6. Automating the creation of NASLs -- pt. II. Snort tools -- Ch. 7. The inner workings of Snort -- Ch. 8. Snort rules -- Ch. 9. Plugins and preprocessors -- Ch. 10. Modifying Snort -- pt. III. Ethereal tools -- Ch. 11. Capture file formats -- Ch. 12. Protocol dissectors -- Ch. 13. Reporting from Ethereal -- App. A. Host integrity monitoring using Osiris and Samhain.
Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts.
Master record variable field(s) change: 082