Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Overview

If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle. Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function. Some of the topics covered include:

  • Writing your own network sniffers and packet injection tools

  • Writing plugins for Nessus, Ettercap, and Nikto

  • Developing exploits for Metasploit

  • Code analysis for web applications

  • Writing kernel modules for security applications, and understanding rootkits

While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network.

Subscriber Reviews

Average Rating: 0 out of 5 rating Based on 0 Ratings

No Subscribers have provided a review for this book.

Table of Contents

 

Extras

The publisher has provided additional content related to this title.


Description
Content

Visit the catalog page for Network Security Tools

  • Catalog Page

Visit the errata page for Network Security Tools

  • Errata

Download the supplemental electronic content for Network Security Tools

  • Supplemental Content