Nessus, Snort, & Ethereal power tools customizing open source security applications /
This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing the best of the rest open source secur...
| Main Author: | |
|---|---|
| Corporate Authors: | , |
| Other Authors: | , , , , |
| Format: | Book |
| Language: | English |
| Published: |
Rockland, MA : [Sebastopol, Calif.] :
Syngress ; Distributed by O'Reilly Media,
c2005.
|
| Series: | Jay Beale's open source security series
|
| Subjects: | |
| Online Access: | An electronic book accessible through the World Wide Web; click for information |
Table of Contents:
- Part I: Nessus Tools; The Inner Workings of NASL; Debugging NASLs; Extensions and Custom Tests; Understanding the Extended Capabilities of the Nessus Environment; Analyzing GetFileVersion and MySQL Passwordless Test; Automating the Creation of NASLs; Part II: Snort Tools; The Inner Workings of Snort; Snort Rules; Plugins and Preprocessors; Modifying Snort; Part III: Etherial Tools; Capture file Formats; Protocol Dissectors; Reporting from Etherial; Appendix A Host Integrity Monitoring Using Osiris and Samhain.