I: Modifying and Hacking Security Tools
Chapter 1: Writing Plug-ins for NessusChapter 2: Developing Dissectors and Plug-ins for the Ettercap Network SnifferChapter 3: Extending Hydra and NmapChapter 4: Writing Plug-ins for the Nikto Vulnerability ScannerChapter 5: Writing Modules for the Metasploit FrameworkChapter 6: Extending Code Analysis to the Webroot |