I: Modifying and Hacking Security Tools
Chapter 1: Writing Plug-ins for Nessus Chapter 2: Developing Dissectors and Plug-ins for the Ettercap Network Sniffer Chapter 3: Extending Hydra and Nmap Chapter 4: Writing Plug-ins for the Nikto Vulnerability Scanner Chapter 5: Writing Modules for the Metasploit Framework Chapter 6: Extending Code Analysis to the Webroot |