Team LiB
Previous Section Next Section

Book Cover
Network Security Tools
By Justin Clarke, Nitesh Dhanjani
...............................................
Publisher: O'Reilly
Pub Date: April 2005
ISBN: 0-596-00794-9
Pages: 352
 

Table of Contents  | Index  | Examples  | Errata

   Copyright
   Preface
      Audience
      Assumptions This Book Makes
      Contents of This Book
      Conventions Used in This Book
      Using Code Examples
      We'd Like to Hear from You
      Safari Enabled
      Acknowledgments
    Part I:  Modifying and Hacking Security Tools
          Chapter 1.  Writing Plug-ins for Nessus
      Section 1.1.  The Nessus Architecture
      Section 1.2.  Installing Nessus
      Section 1.3.  Using Nessus
      Section 1.4.  The NASL Interpreter
      Section 1.5.  Hello World
      Section 1.6.  Datatypes and Variables
      Section 1.7.  Operators
      Section 1.8.  if...else
      Section 1.9.  Loops
      Section 1.10.  Functions
      Section 1.11.  Predefined Global Variables
      Section 1.12.  Important NASL Functions
      Section 1.13.  Nessus Plug-ins
          Chapter 2.  Developing Dissectors and Plug-ins for the Ettercap Network Sniffer
      Section 2.1.  Installing and Using Ettercap
      Section 2.2.  Writing an Ettercap Dissector
      Section 2.3.  Writing an Ettercap Plug-in
          Chapter 3.  Extending Hydra and Nmap
      Section 3.1.  Extending Hydra
      Section 3.2.  Adding Service Signatures to Nmap
          Chapter 4.  Writing Plug-ins for the Nikto Vulnerability Scanner
      Section 4.1.  Installing Nikto
      Section 4.2.  Using Nikto
      Section 4.3.  Nikto Under the Hood
      Section 4.4.  Existing Nikto Plug-ins
      Section 4.5.  Adding Custom Entries to the Plug-in Databases
      Section 4.6.  Using LibWhisker
      Section 4.7.  Writing an NTLM Plug-in for Brute-Force Testing
      Section 4.8.  Writing a Standalone Plug-in to Attack Lotus Domino
          Chapter 5.  Writing Modules for the Metasploit Framework
      Section 5.1.  Introduction to MSF
      Section 5.2.  Overview of Stack Buffer Overflows
      Section 5.3.  Writing Exploits for MSF
      Section 5.4.  Writing a Module for the MnoGoSearch Overflow
      Section 5.5.  Writing an Operating System Fingerprinting Module for MSF
          Chapter 6.  Extending Code Analysis to the Webroot
      Section 6.1.  Attacking Web Applications at the Source
      Section 6.2.  Toolkit 101
      Section 6.3.  PMD
      Section 6.4.  Extending PMD
    Part II:  Modifying and Hacking Security Tools
          Chapter 7.  Fun with Linux Kernel Modules
      Section 7.1.  Hello World
      Section 7.2.  Intercepting System Calls
      Section 7.3.  Hiding Processes
      Section 7.4.  Hiding from netstat
          Chapter 8.  Developing Web Assessment Tools and Scripts
      Section 8.1.  Web Application Environment
      Section 8.2.  Designing the Scanner
      Section 8.3.  Building the Log Parser
      Section 8.4.  Building the Scanner
      Section 8.5.  Using the Scanner
      Section 8.6.  Complete Source Code
          Chapter 9.  Automated Exploit Tools
      Section 9.1.  SQL Injection Exploits
      Section 9.2.  The Exploit Scanner
      Section 9.3.  Using the Scanner
          Chapter 10.  Writing Network Sniffers
      Section 10.1.  Introduction to libpcap
      Section 10.2.  Getting Started with libpcap
      Section 10.3.  libpcap and 802.11 Wireless Networks
      Section 10.4.  libpcap and Perl
      Section 10.5.  libpcap Library Reference
          Chapter 11.  Writing Packet-Injection Tools
      Section 11.1.  Introduction to libnet
      Section 11.2.  Getting Started with libnet
      Section 11.3.  Advanced libnet Functions
      Section 11.4.  Combining libnet and libpcap
      Section 11.5.  Introducing AirJack
   Colophon
   Index

Team LiB
Previous Section Next Section