Book description
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include:
- Writing your own network sniffers and packet injection tools
- Writing plugins for Nessus, Ettercap, and Nikto
- Developing exploits for Metasploit
- Code analysis for web applications
- Writing kernel modules for security applications, and understanding rootkits
Publisher resources
Table of contents
- Network Security Tools
- A Note Regarding Supplemental Files
- Preface
-
I. Modifying and Hacking Security Tools
- 1. Writing Plug-ins for Nessus
- 2. Developing Dissectors and Plug-ins for the Ettercap Network Sniffer
-
3. Extending Hydra and Nmap
-
Extending Hydra
- Overview of Hydra
- Overview of SMTP Authentication
- Adding Additional Protocols to Hydra
- Implementing SMTP-AUTH in Hydra
- Complete Source to hydra-smtpauth.c
-
Quick Reference to Hydra Functions
- void hydra_child_exit(int code)
- void hydra_register_socket(int sock)
- char *hydra_get_next_pair( )
- char *hydra_get_next_login( )
- char *hydra_get_next_password( )
- void hydra_completed_pair( )
- void hydra_completed_pair_found( )
- void hydra_report_found(int port, char *svc, FILE *fp)
- void hydra_report_found_host (int port, unsigned int ip, char *svc, FILE *fp)
- void hydra_report_found_host_msg (int port, unsigned int ip, char *svc, FILE *fp, char *msg)
- int hydra_connect_tcp(unsigned long int host, int port)
- int hydra_connect_ssl(unsigned long int host, int port)
- int hydra_connect_udp(unsigned long int host, int port)
- int hydra_disconnect(int socket)
- int hydra_data_ready_writing_timed(int socket, long sec, long usec)
- int hydra_data_ready_writing(int socket)
- int hydra_data_ready_timed(int socket, long sec, long usec)
- int hydra_data_ready(int socket)
- int hydra_recv(int socket, char *buf, int length)
- char *hydra_receive_line(int socket)
- int hydra_send(int socket, char *buf, int size, int options)
- int make_to_lower(char *buf)
- unsigned char hydra_conv64(unsigned char in)
- void hydra_tobase64(unsigned char *buf)
- void hydra_dump_asciihex(unsigned char *string, int length)
- Adding Service Signatures to Nmap
-
Extending Hydra
- 4. Writing Plug-ins for the Nikto Vulnerability Scanner
- 5. Writing Modules for the Metasploit Framework
- 6. Extending Code Analysis to the Webroot
-
II. Modifying and Hacking Security Tools
- 7. Fun with Linux Kernel Modules
- 8. Developing Web Assessment Tools and Scripts
- 9. Automated Exploit Tools
- 10. Writing Network Sniffers
- 11. Writing Packet-Injection Tools
- Index
- About the Authors
- Colophon
- Copyright
Product information
- Title: Network Security Tools
- Author(s):
- Release date: April 2005
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781491947418
You might also like
book
Network Security Strategies
Build a resilient network and prevent advanced cyber attacks and breaches Key Features Explore modern cybersecurity …
book
Nmap: Network Exploration and Security Auditing Cookbook - Second Edition
Over 100 practical recipes related to network and application security auditing using the powerful Nmap About …
article
Managing Encryption Keys
This collection of shortcuts provides a practical and concise guide to securing cloud environments. It covers …
video
Hands-On Network Scanning with Nmap for Network Security
Do you want to enhance your organization’s network security? Are you worried about what could happen …