Network.Security.Tools [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network.Security.Tools [Electronic resources] - نسخه متنی

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید




















Network Security Tools




By Table of Contents
| Examples
| Errata













Copyright






Preface







Audience







Assumptions This Book Makes







Contents of This Book







Conventions Used in This Book







Using Code Examples







We''d Like to Hear from You







Safari Enabled







Acknowledgments







Part I:
Modifying and Hacking Security Tools








Chapter 1.
Writing Plug-ins for Nessus








Section 1.1.
The Nessus Architecture








Section 1.2.
Installing Nessus








Section 1.3.
Using Nessus








Section 1.4.
The NASL Interpreter








Section 1.5.
Hello World








Section 1.6.
Datatypes and Variables








Section 1.7.
Operators








Section 1.8.
if...else








Section 1.9.
Loops








Section 1.10.
Functions








Section 1.11.
Predefined Global Variables








Section 1.12.
Important NASL Functions








Section 1.13.
Nessus Plug-ins








Chapter 2.
Developing Dissectors and Plug-ins for the Ettercap Network Sniffer








Section 2.1.
Installing and Using Ettercap








Section 2.2.
Writing an Ettercap Dissector








Section 2.3.
Writing an Ettercap Plug-in








Chapter 3.
Extending Hydra and Nmap








Section 3.1.
Extending Hydra








Section 3.2.
Adding Service Signatures to Nmap








Chapter 4.
Writing Plug-ins for the Nikto Vulnerability Scanner








Section 4.1.
Installing Nikto








Section 4.2.
Using Nikto








Section 4.3.
Nikto Under the Hood








Section 4.4.
Existing Nikto Plug-ins








Section 4.5.
Adding Custom Entries to the Plug-in Databases








Section 4.6.
Using LibWhisker








Section 4.7.
Writing an NTLM Plug-in for Brute-Force Testing








Section 4.8.
Writing a Standalone Plug-in to Attack Lotus Domino








Chapter 5.
Writing Modules for the Metasploit Framework








Section 5.1.
Introduction to MSF








Section 5.2.
Overview of Stack Buffer Overflows








Section 5.3.
Writing Exploits for MSF








Section 5.4.
Writing a Module for the MnoGoSearch Overflow








Section 5.5.
Writing an Operating System Fingerprinting Module for MSF








Chapter 6.
Extending Code Analysis to the Webroot








Section 6.1.
Attacking Web Applications at the Source








Section 6.2.
Toolkit 101








Section 6.3.
PMD








Section 6.4.
Extending PMD







Part II:
Modifying and Hacking Security Tools








Chapter 7.
Fun with Linux Kernel Modules








Section 7.1.
Hello World








Section 7.2.
Intercepting System Calls








Section 7.3.
Hiding Processes








Section 7.4.
Hiding from netstat








Chapter 8.
Developing Web Assessment Tools and Scripts








Section 8.1.
Web Application Environment








Section 8.2.
Designing the Scanner








Section 8.3.
Building the Log Parser








Section 8.4.
Building the Scanner








Section 8.5.
Using the Scanner








Section 8.6.
Complete Source Code








Chapter 9.
Automated Exploit Tools








Section 9.1.
SQL Injection Exploits








Section 9.2.
The Exploit Scanner








Section 9.3.
Using the Scanner








Chapter 10.
Writing Network Sniffers








Section 10.1.
Introduction to libpcap








Section 10.2.
Getting Started with libpcap








Section 10.3.
libpcap and 802.11 Wireless Networks








Section 10.4.
libpcap and Perl








Section 10.5.
libpcap Library Reference








Chapter 11.
Writing Packet-Injection Tools








Section 11.1.
Introduction to libnet








Section 11.2.
Getting Started with libnet








Section 11.3.
Advanced libnet Functions








Section 11.4.
Combining libnet and libpcap








Section 11.5.
Introducing AirJack






Colophon









/ 85