Network.Security.Tools [Electronic resources]

نسخه متنی -صفحه : 85/ 3
نمايش فراداده

Network Security Tools

By Table of Contents | Examples | Errata

Copyright

Preface

Audience

Assumptions This Book Makes

Contents of This Book

Conventions Used in This Book

Using Code Examples

We''d Like to Hear from You

Safari Enabled

Acknowledgments

Part I: Modifying and Hacking Security Tools

Chapter 1. Writing Plug-ins for Nessus

Section 1.1. The Nessus Architecture

Section 1.2. Installing Nessus

Section 1.3. Using Nessus

Section 1.4. The NASL Interpreter

Section 1.5. Hello World

Section 1.6. Datatypes and Variables

Section 1.7. Operators

Section 1.8. if...else

Section 1.9. Loops

Section 1.10. Functions

Section 1.11. Predefined Global Variables

Section 1.12. Important NASL Functions

Section 1.13. Nessus Plug-ins

Chapter 2. Developing Dissectors and Plug-ins for the Ettercap Network Sniffer

Section 2.1. Installing and Using Ettercap

Section 2.2. Writing an Ettercap Dissector

Section 2.3. Writing an Ettercap Plug-in

Chapter 3. Extending Hydra and Nmap

Section 3.1. Extending Hydra

Section 3.2. Adding Service Signatures to Nmap

Chapter 4. Writing Plug-ins for the Nikto Vulnerability Scanner

Section 4.1. Installing Nikto

Section 4.2. Using Nikto

Section 4.3. Nikto Under the Hood

Section 4.4. Existing Nikto Plug-ins

Section 4.5. Adding Custom Entries to the Plug-in Databases

Section 4.6. Using LibWhisker

Section 4.7. Writing an NTLM Plug-in for Brute-Force Testing

Section 4.8. Writing a Standalone Plug-in to Attack Lotus Domino

Chapter 5. Writing Modules for the Metasploit Framework

Section 5.1. Introduction to MSF

Section 5.2. Overview of Stack Buffer Overflows

Section 5.3. Writing Exploits for MSF

Section 5.4. Writing a Module for the MnoGoSearch Overflow

Section 5.5. Writing an Operating System Fingerprinting Module for MSF

Chapter 6. Extending Code Analysis to the Webroot

Section 6.1. Attacking Web Applications at the Source

Section 6.2. Toolkit 101

Section 6.3. PMD

Section 6.4. Extending PMD

Part II: Modifying and Hacking Security Tools

Chapter 7. Fun with Linux Kernel Modules

Section 7.1. Hello World

Section 7.2. Intercepting System Calls

Section 7.3. Hiding Processes

Section 7.4. Hiding from netstat

Chapter 8. Developing Web Assessment Tools and Scripts

Section 8.1. Web Application Environment

Section 8.2. Designing the Scanner

Section 8.3. Building the Log Parser

Section 8.4. Building the Scanner

Section 8.5. Using the Scanner

Section 8.6. Complete Source Code

Chapter 9. Automated Exploit Tools

Section 9.1. SQL Injection Exploits

Section 9.2. The Exploit Scanner

Section 9.3. Using the Scanner

Chapter 10. Writing Network Sniffers

Section 10.1. Introduction to libpcap

Section 10.2. Getting Started with libpcap

Section 10.3. libpcap and 802.11 Wireless Networks

Section 10.4. libpcap and Perl

Section 10.5. libpcap Library Reference

Chapter 11. Writing Packet-Injection Tools

Section 11.1. Introduction to libnet

Section 11.2. Getting Started with libnet

Section 11.3. Advanced libnet Functions

Section 11.4. Combining libnet and libpcap

Section 11.5. Introducing AirJack

Colophon