Description |
1 online resource |
Note |
Title from e-book home page (viewed Jan. 25, 2006). |
|
Print version has edition statement: 1st ed. |
|
Includes index and errata. |
Contents |
pt. I. Modifying and hacking security tools -- 1. Writing plug-ins for Nessus -- 2. Developing dissectors and plug-ins for the Ettercap network sniffer -- 3. Extending Hydra and Nmap -- 4. Writing plug-ins for the Nikto vulnerability scanner -- 5. Writing modules for the Metasploit framework -- 6. Extending code analysis to the Webroot -- pt. II. Writing network security tools -- 7. Fun with Linux kernel modules -- 8. Developing web assessment tools and scripts -- 9. Automated exploit tools -- 10. Writing network sniffers -- 11. Writing packet-injection tools. |
Summary |
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle. Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to. |
Subject |
Computer security.
|
|
Computer networks -- Security measures.
|
|
Computers -- Access control.
|
|
Sécurité informatique. |
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Ordinateurs -- Accès -- Contrôle. |
|
Computer networks -- Security measures |
|
Computer security |
|
Computers -- Access control |
Added Author |
Dhanjani, Nitesh.
|
Other Form: |
Print version: Dhanjani, Nitesh. Network Security Tools : Writing, Hacking, and Modifying Security Tools. Sebastopol : O'Reilly Media, ©2005 9780596007942 |
ISBN |
9781491947425 (electronic bk.) |
|
149194742X (electronic bk.) |
|
9781491947418 (electronic bk.) |
|
1491947411 (electronic bk.) |
|