Nessus, Snort, & Ethereal power tools customizing open source security applications /
This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing the best of the rest open source secur...
Main Author: | |
---|---|
Corporate Authors: | , |
Other Authors: | , , , , |
Format: | Book |
Language: | English |
Published: |
Rockland, MA : [Sebastopol, Calif.] :
Syngress ; Distributed by O'Reilly Media,
c2005.
|
Series: | Jay Beale's open source security series
|
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click for information |
Table of Contents:
- Part I: Nessus Tools; The Inner Workings of NASL; Debugging NASLs; Extensions and Custom Tests; Understanding the Extended Capabilities of the Nessus Environment; Analyzing GetFileVersion and MySQL Passwordless Test; Automating the Creation of NASLs; Part II: Snort Tools; The Inner Workings of Snort; Snort Rules; Plugins and Preprocessors; Modifying Snort; Part III: Etherial Tools; Capture file Formats; Protocol Dissectors; Reporting from Etherial; Appendix A Host Integrity Monitoring Using Osiris and Samhain.