SitemapTable of ContentsBackCoverBuilding Open Source Network Security Tools Components and Techniques--Components and TechniquesIntroductionComponents LegendWho Should Read This BookLanguage, Platform, and CompilerC Programming ConceptsConventions Used in This BookChapter 1: The Network Security Tool ParadigmA Modular ModelNetwork Security Tool TaxonomySoftware Development LifecycleConclusionChapter 2: The Libpcap LibraryInstallation NotesNative DatatypesInitialization FunctionsCapture FunctionsFilter FunctionsSavefile (Dump) FunctionsAncillary FunctionsError FunctionsSample Program--StrokeSample Code--StrokeChapter 3: The Libnet LibraryInstallation NotesDesign ConsiderationsNative DatatypesFramework FunctionsAddress Resolution FunctionsPacket Builder FunctionsPort List FunctionsAncillary FunctionsAdvanced-Mode FunctionsPsuedo-Random Number FunctionsSample Program--PunchSample Code--PunchChapter 4: The Libnids LibraryInstallation NotesNative DatatypesInitialization and Execution FunctionsCallback Registration FunctionsTCP-Specific FunctionsSample Program-LiltSample Code-LiltChapter 5: The Libsf LibraryInstallation NotesDesign ConsiderationsNative DatatypesFramework FunctionsFingerprint FunctionsResults FunctionsSample Program-LegerdemainSample Code-LegerdemainChapter 6: The Libdnet LibraryInstallation NotesNative DatatypesAddressing FunctionsARP Cache FunctionsRoute Table FunctionsInterface FunctionsFirewall FunctionsEthernet and IP FunctionsBinary BuffersRandom Number GenerationSample Program-ClutchSample Code-ClutchChapter 7: The OpenSSL LibraryInstallation NotesThe EVP InterfaceNative DatatypesTop-level FunctionsSymmetric Functions and MacrosAsymmetric FunctionsMessage Digest Functions and MacrosDigital Signature FunctionsSample Program-RoilSample Code-RoilChapter 8: Passive Reconnaissance TechniquesSample Program-ScoopSample Code-ScoopChapter 9: Active Reconnaissance TechniquesIP ExpirySample Program-KnockSample Code-KnockChapter 10: Attack and Penetration TechniquesVulnerability TestingSample Program-SiftSample Code-SiftChapter 11: Defensive TechniquesEncryptionFirewallingNetwork Intrusion DetectionSample Program-DescrySample Code-DescryChapter 12: Tying Everything Together--FirewalkFirewalk in PracticeFirewalxsxsk Code WalkthroughFirewalk Complete Code ListingReferencesChapter 1Chapter 2Chapter 3Chapter 4Chapter 5Chapter 6Chapter 7Chapter 8Chapter 9Chapter 10Chapter 11Chapter 12IndexIndex_BIndex_CIndex_DIndex_EIndex_FIndex_G-HIndex_IIndex_J-LIndex_MIndex_NIndex_OIndex_PIndex_Q-RIndex_SIndex_TIndex_UIndex_VIndex_W-ZList of FiguresList of Tables