Network Security ToolsBy Table of Contents| Examples| Errata Copyright Preface Audience Assumptions This Book Makes Contents of This Book Conventions Used in This Book Using Code Examples We''d Like to Hear from You Safari Enabled Acknowledgments Part I: Modifying and Hacking Security Tools Chapter 1. Writing Plug-ins for Nessus Section 1.1. The Nessus Architecture Section 1.2. Installing Nessus Section 1.3. Using Nessus Section 1.4. The NASL Interpreter Section 1.5. Hello World Section 1.6. Datatypes and Variables Section 1.7. Operators Section 1.8. if...else Section 1.9. Loops Section 1.10. Functions Section 1.11. Predefined Global Variables Section 1.12. Important NASL Functions Section 1.13. Nessus Plug-ins Chapter 2. Developing Dissectors and Plug-ins for the Ettercap Network Sniffer Section 2.1. Installing and Using Ettercap Section 2.2. Writing an Ettercap Dissector Section 2.3. Writing an Ettercap Plug-in Chapter 3. Extending Hydra and Nmap Section 3.1. Extending Hydra Section 3.2. Adding Service Signatures to Nmap Chapter 4. Writing Plug-ins for the Nikto Vulnerability Scanner Section 4.1. Installing Nikto Section 4.2. Using Nikto Section 4.3. Nikto Under the Hood Section 4.4. Existing Nikto Plug-ins Section 4.5. Adding Custom Entries to the Plug-in Databases Section 4.6. Using LibWhisker Section 4.7. Writing an NTLM Plug-in for Brute-Force Testing Section 4.8. Writing a Standalone Plug-in to Attack Lotus Domino Chapter 5. Writing Modules for the Metasploit Framework Section 5.1. Introduction to MSF Section 5.2. Overview of Stack Buffer Overflows Section 5.3. Writing Exploits for MSF Section 5.4. Writing a Module for the MnoGoSearch Overflow Section 5.5. Writing an Operating System Fingerprinting Module for MSF Chapter 6. Extending Code Analysis to the Webroot Section 6.1. Attacking Web Applications at the Source Section 6.2. Toolkit 101 Section 6.3. PMD Section 6.4. Extending PMD Part II: Modifying and Hacking Security Tools Chapter 7. Fun with Linux Kernel Modules Section 7.1. Hello World Section 7.2. Intercepting System Calls Section 7.3. Hiding Processes Section 7.4. Hiding from netstat Chapter 8. Developing Web Assessment Tools and Scripts Section 8.1. Web Application Environment Section 8.2. Designing the Scanner Section 8.3. Building the Log Parser Section 8.4. Building the Scanner Section 8.5. Using the Scanner Section 8.6. Complete Source Code Chapter 9. Automated Exploit Tools Section 9.1. SQL Injection Exploits Section 9.2. The Exploit Scanner Section 9.3. Using the Scanner Chapter 10. Writing Network Sniffers Section 10.1. Introduction to libpcap Section 10.2. Getting Started with libpcap Section 10.3. libpcap and 802.11 Wireless Networks Section 10.4. libpcap and Perl Section 10.5. libpcap Library Reference Chapter 11. Writing Packet-Injection Tools Section 11.1. Introduction to libnet Section 11.2. Getting Started with libnet Section 11.3. Advanced libnet Functions Section 11.4. Combining libnet and libpcap Section 11.5. Introducing AirJack Colophon