TY - BOOK AU - Archibald,Neil AU - Ramirez,Gilbert AU - Rathaus,Noam ED - Syngress Media, Inc. TI - Nessus, Snort, & Ethereal power tools: customizing open source security applications T2 - Jay Beale's open source security series SN - 1423754220 AV - TK5105.59 .A734 2005eb U1 - 005.8 22 PY - 2005/// CY - Rockland, MA, [Sebastopol, Calif.] PB - Syngress, Distributed by O'Reilly Media KW - Computer networks KW - Security measures KW - Open source software KW - COMPUTERS KW - Internet KW - Security KW - bisacsh KW - Networking KW - General KW - blmlsh KW - fast KW - Electronic books N1 - pt. I. Nessus tools -- Ch. 1. The inner workings of NASL (Nessus attack scripting language) -- Ch. 2. Debugging NASLs -- Ch. 3. Extensions and custom tests -- Ch. 4. Understanding the extended capabilities of the Nessus environment -- Ch. 5. Analyzing GetFileVersion and MySQL passwordless test -- Ch. 6. Automating the creation of NASLs -- pt. II. Snort tools -- Ch. 7. The inner workings of Snort -- Ch. 8. Snort rules -- Ch. 9. Plugins and preprocessors -- Ch. 10. Modifying Snort -- pt. III. Ethereal tools -- Ch. 11. Capture file formats -- Ch. 12. Protocol dissectors -- Ch. 13. Reporting from Ethereal -- App. A. Host integrity monitoring using Osiris and Samhain N2 - Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts UR - https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149577 ER -