Nessus, Snort, and Ethereal Power Tools : Customizing Open Source Security Applications.

By: Caswell, BrianContributor(s): Beale, Jay | Ramirez, Gilbert | Rathaus, Noam | Rathaus, NoamMaterial type: TextTextSeries: Jay Beale's Open Source SecurityPublisher: Rockland, MA : William Andrew, 2005Copyright date: ©2005Edition: 1st edDescription: 1 online resource (472 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9780080489421Subject(s): Computer networks -- Security measures | Computer security | Open source softwareGenre/Form: Electronic books.Additional physical formats: Print version:: Nessus, Snort, and Ethereal Power Tools : Customizing Open Source Security ApplicationsDDC classification: 005.8 LOC classification: TK5105.59 -- .A73 2005ebOnline resources: Click to View
Contents:
Cover -- Contents -- Foreword -- Nessus Tools -- The Inner Workings of NASL -- Debugging NASLs -- Extensions and Custom Tests -- Understanding the Extended Capabilities of the Nessus Environment -- Analyzing GetFileVersion and MySQL Passwordless Test -- Automating the Creation of NASLs -- The Inner Workings of Snort -- Snort Rules -- Plugins and Preprocessors -- Modifying Snort -- Capture File Formats -- Protocol Dissectors -- Reporting from Ethereal -- Host Integrity Monitoring Using Osiris and Samhain -- Index -- Related Titles.
Summary: This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to "sniff" their network for malicious or unusual traffic. The book will also contain an appendix detailing "the best of the rest" open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Contents -- Foreword -- Nessus Tools -- The Inner Workings of NASL -- Debugging NASLs -- Extensions and Custom Tests -- Understanding the Extended Capabilities of the Nessus Environment -- Analyzing GetFileVersion and MySQL Passwordless Test -- Automating the Creation of NASLs -- The Inner Workings of Snort -- Snort Rules -- Plugins and Preprocessors -- Modifying Snort -- Capture File Formats -- Protocol Dissectors -- Reporting from Ethereal -- Host Integrity Monitoring Using Osiris and Samhain -- Index -- Related Titles.

This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to "sniff" their network for malicious or unusual traffic. The book will also contain an appendix detailing "the best of the rest" open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

Powered by Koha