• Complain

Clarke Justin - Network Security Tools

Here you can read online Clarke Justin - Network Security Tools full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Boston;MA, year: 2005;2013, publisher: OReilly Media;Safari Tech Books Online, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Clarke Justin Network Security Tools
  • Book:
    Network Security Tools
  • Author:
  • Publisher:
    OReilly Media;Safari Tech Books Online
  • Genre:
  • Year:
    2005;2013
  • City:
    Boston;MA
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Network Security Tools: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Network Security Tools" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

If youre an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, its a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle. Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to.

Clarke Justin: author's other books


Who wrote Network Security Tools? Find out the surname, the name of the author of the book and a list of all author's works by series.

Network Security Tools — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Network Security Tools" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Network Security Tools
Nitesh Dhanjani
Justin Clarke
Beijing Cambridge Farnham Kln Sebastopol Tokyo Special Upgrade Offer If you - photo 1

Beijing Cambridge Farnham Kln Sebastopol Tokyo

Special Upgrade Offer

If you purchased this ebook directly from oreilly.com, you have the following benefits:

  • DRM-free ebooksuse your ebooks across devices without restrictions or limitations

  • Multiple formatsuse on your laptop, tablet, or phone

  • Lifetime access, with free updates

  • Dropbox syncingyour files, anywhere

If you purchased this ebook from another retailer, you can upgrade your ebook to take advantage of all these benefits for just $4.99. to access your ebook upgrade.

Please note that upgrade offers are not available from sample content.

A Note Regarding Supplemental Files

Supplemental files and examples for this book can be found at http://examples.oreilly.com/9780596007942/. Please use a standard desktop web browser to access these files, as they may not be accessible from all ereader devices.

All code files or examples referenced in the book will be available online. For physical books that ship with an accompanying disc, whenever possible, weve posted all CD/DVD content. Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to .

Preface

These days, software vulnerabilities are announced to the publicbefore vendors have a chance to provide a patch to customers.Therefore, it has become important, if not absolutely necessary, foran organization to routinely assess its network to measure itssecurity posture.

But how does one go about performing a thorough network assessment?Network security books today typically teach you only how to use theout-of-the-box functionality provided by existing network securitytools, which is often limited. Malicious attackers, however, aresophisticated enough to understand that the real power of the mostpopular network security tools does not lie in their out-of-the-boxfunctionality, but in the framework that allows you to extend andtweak their functionality. These sophisticated attackers also knowhow to quickly write their own tools to break into remote networks.The aim of this book is to teach you how to tweak existing andpowerful open source assessment tools and how to write your own toolsto protect your networks and data from the most experiencedattackers.

Audience

This book is for anyone interested in extending existing open sourcenetwork assessment tools and in writing their own assessment tools.Hundreds of other network assessment books are available today, butthey simply teach readers how to use existing tools, while neglectingto teach them how to modify existing security tools to suit theirneeds. If you are a network security assessment professional orhobbyist, and if you have always wanted to learn how to tweak andwrite your own security tools, this book is for you.

Assumptions This Book Makes

This book assumes you are familiar with programming languages such asC and Perl. It also assumes you are familiar with the use of theassessment tools covered in this book: Ettercap, Hydra, Metasploit,Nessus, Nikto, and Nmap.

Contents of This Book

This book is divided into two parts. Part Icovers several commonly used open source security tools and shows youhow to leverage existing well-known and reliable network securitytools to solve your network security problems.Heres a summary of what we cover:

,Writing Plug-ins for Nessus

Nessus is the most popular vulnerability scanner available today. Itis also open source and free. This chapter demonstrates not only howto use Nessus, but also how to write plug-ins to enable it to scanfor new vulnerabilities.

,Developing Dissectors and Plug-ins for the Ettercap Network Sniffer

Ettercap is a popular network sniffer that also is free and opensource. Its plug-in functionality is one of the most robustavailable. In fact, quite a few plug-ins for this sniffer areavailable that perform a variety of useful tasks, such as detectingother sniffers on the network and collecting data such as passwordsthat are being passed around the network. This chapter explains howto write plug-ins for this most powerful scanner to look for specificdata on the network, as well as other useful tricks.

,Extending Hydra and Nmap

Many security tools do not use a plug-in architecture, and thereforecannot be trivially extended. This chapter discusses how to extendthe commonly used nonplug-in tool, Hydra, a tool for performing bruteforce testing against passwords, to support an additional protocol.It also discusses how to create binary signatures for Nmap that use asignature database for expansion.

, Writing Plug-ins for the Nikto Vulnerability Scanner

Nikto is a free, open source, and popular web vulnerability scannerthat uses the well-known libwhisker library tooperate. This chapter teaches you how to extend Nikto to find newvulnerabilities that might exist with external web applications andservers, or even within a companys custom-built webapplication.

,Writing Modules for the Metasploit Framework

The Metasploit Framework is a freely available framework for writingand testing network security exploits. This chapter explores how todevelop exploits for the framework, as well as how to use theframework for more general security purposes.

,Extending Code Analysis to the Webroot

Source code analysis tools exist for languages such as Java. However,such tools for web applications are lacking. This chapterdemonstrates how to implement web application-specific rules for thereview of J2EE applications using the PMD tool.

Part IIdescribes approaches to writing customLinux kernel modules, web application vulnerability identificationand exploitation tools, packet sniffers, and packet injectors. All ofthese can be useful features in network security tools, and in eachcase an approach or toolset is introduced to guide readers inintegrating these capabilities into their own custom security tools.

,Fun with Linux Kernel Modules

Linux security starts at the kernel level. This chapter discusses howto write Linux kernel modules and explains to readers what they canachieve at the kernel level, as well as how kernel-level rootkitsachieve some of the things they do.

,Developing Web Assessment Tools and Scripts

Effective tools for hacking web applications must be able toadequately adapt to the custom applications they can be run against.This chapter discusses how to develop scripts in Perl that can beused to dynamically detect and identify vulnerabilities within customweb applications.

,Automated Exploit Tools

Tools for exploiting web application issues must leverage access toapplication databases and operating systems. This chapterdemonstrates techniques for creating tools that show what can be donewith web application vulnerabilities.

,Writing Network Sniffers

Observing network traffic is an important capability of many securitytools. The most common toolset used for network sniffing islibpcap. This chapter discusses howlibpcap works, and demonstrates how you can useit in your own tools where intercepting network traffic is needed. Wealso discuss network sniffing in both wired and wireless situations.

,Writing Packet-Injection Tools

Packet injectors are required in scenarios where the ability togenerate custom or malformed network traffic is needed to testnetwork services. Several tools exist to perform such testing. Inthis chapter we discuss and demonstrate use of the

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Network Security Tools»

Look at similar books to Network Security Tools. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Network Security Tools»

Discussion, reviews of the book Network Security Tools and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.