Building.Open.Source.Network.Security.Tools.Components.And.Techniques [Electronic resources]

Mike D. Schiffman

نسخه متنی -صفحه : 135/ 1
نمايش فراداده

Sitemap

Table of Contents

BackCover

Building Open Source Network Security Tools Components and Techniques--Components and Techniques

Introduction

Components Legend

Who Should Read This Book

Language, Platform, and Compiler

C Programming Concepts

Conventions Used in This Book

Chapter 1: The Network Security Tool Paradigm

A Modular Model

Network Security Tool Taxonomy

Software Development Lifecycle

Conclusion

Chapter 2: The Libpcap Library

Installation Notes

Native Datatypes

Initialization Functions

Capture Functions

Filter Functions

Savefile (Dump) Functions

Ancillary Functions

Error Functions

Sample Program--Stroke

Sample Code--Stroke

Chapter 3: The Libnet Library

Installation Notes

Design Considerations

Native Datatypes

Framework Functions

Address Resolution Functions

Packet Builder Functions

Port List Functions

Ancillary Functions

Advanced-Mode Functions

Psuedo-Random Number Functions

Sample Program--Punch

Sample Code--Punch

Chapter 4: The Libnids Library

Installation Notes

Native Datatypes

Initialization and Execution Functions

Callback Registration Functions

TCP-Specific Functions

Sample Program-Lilt

Sample Code-Lilt

Chapter 5: The Libsf Library

Installation Notes

Design Considerations

Native Datatypes

Framework Functions

Fingerprint Functions

Results Functions

Sample Program-Legerdemain

Sample Code-Legerdemain

Chapter 6: The Libdnet Library

Installation Notes

Native Datatypes

Addressing Functions

ARP Cache Functions

Route Table Functions

Interface Functions

Firewall Functions

Ethernet and IP Functions

Binary Buffers

Random Number Generation

Sample Program-Clutch

Sample Code-Clutch

Chapter 7: The OpenSSL Library

Installation Notes

The EVP Interface

Native Datatypes

Top-level Functions

Symmetric Functions and Macros

Asymmetric Functions

Message Digest Functions and Macros

Digital Signature Functions

Sample Program-Roil

Sample Code-Roil

Chapter 8: Passive Reconnaissance Techniques

Sample Program-Scoop

Sample Code-Scoop

Chapter 9: Active Reconnaissance Techniques

IP Expiry

Sample Program-Knock

Sample Code-Knock

Chapter 10: Attack and Penetration Techniques

Vulnerability Testing

Sample Program-Sift

Sample Code-Sift

Chapter 11: Defensive Techniques

Encryption

Firewalling

Network Intrusion Detection

Sample Program-Descry

Sample Code-Descry

Chapter 12: Tying Everything Together--Firewalk

Firewalk in Practice

Firewalxsxsk Code Walkthrough

Firewalk Complete Code Listing

References

Chapter 1

Chapter 2

Chapter 3

Chapter 4

Chapter 5

Chapter 6

Chapter 7

Chapter 8

Chapter 9

Chapter 10

Chapter 11

Chapter 12

Index

Index_B

Index_C

Index_D

Index_E

Index_F

Index_G-H

Index_I

Index_J-L

Index_M

Index_N

Index_O

Index_P

Index_Q-R

Index_S

Index_T

Index_U

Index_V

Index_W-Z

List of Figures

List of Tables