Network Security Tools: Writing, Hacking, and Modifying Security Tools

Network Security Tools: Writing, Hacking, and Modifying Security Tools

Network Security Tools: Writing, Hacking, and Modifying Security Tools

Network Security Tools: Writing, Hacking, and Modifying Security Tools

eBook

$20.99  $27.99 Save 25% Current price is $20.99, Original price is $27.99. You Save 25%.

Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include:

  • Writing your own network sniffers and packet injection tools
  • Writing plugins for Nessus, Ettercap, and Nikto
  • Developing exploits for Metasploit
  • Code analysis for web applications
  • Writing kernel modules for security applications, and understanding rootkits
While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network.

Product Details

ISBN-13: 9781491947418
Publisher: O'Reilly Media, Incorporated
Publication date: 04/04/2005
Sold by: Barnes & Noble
Format: eBook
Pages: 344
File size: 2 MB

About the Author

Nitesh Dhanjani is a well known security researcher, author, and speaker. Dhanjani is currently Senior Manager at a large consulting firm where he advises some of the largest corporations around the world on how to establish enterprise wide information security programs and solutions. Dhanjani is also responsible for evangelizing brand new technology service lines around emerging technologies and trends such as cloud computing and virtualization.

Prior to his current job, Dhanjani was Senior Director of Application Security and Assessments at a major credit bureau where he spearheaded brand new security efforts into enhancing the enterprise SDLC, created a process for performing source code security reviews & Threat Modeling, and managed the Attack & Penetration team.

Dhanjani is the author of "Network Security Tools: Writing, Hacking, and Modifying Security Tools" (O'Reilly) and "HackNotes: Linux and Unix Security" (Osborne McGraw-Hill). He is also a contributing author to "Hacking Exposed 4" (Osborne McGraw-Hill) and "HackNotes: Network Security". Dhanjani has been invited to talk at various information security events such as the Black Hat Briefings, RSA, Hack in the Box, Microsoft Blue Hat, and OSCON.

Dhanjani graduated from Purdue University with both a Bachelors and Masters degree in Computer Science.

Dhanjani's personal blog is located at dhanjani.com.


Justin Clarke is a Director with Gotham Digital Science, based in the United Kingdom. He has many years of experience in testing the security of networks, web applications, and wireless networks for large financial, retail, and technology clients in the United States, the United Kingdom and New Zealand.

Justin is the co-author of Network Security Tools: Writing, Hacking, and Modifying Security Tools, a contributing author to Network Security Assessment: Know Your Network, 2nd Edition, and the lead author of SQL Injection Attacks and Defenses (Syngress) as well as having been invited to speak at a number of conferences on security topics, including Black Hat, EuSecWest, OSCON and RSA.

Justin is active in developing security tools for penetrating web applications, servers, and wireless networks and as a compulsive tinkerer he can't leave anything alone without at least trying to see how it works.

Table of Contents

Prefaceix
Part IModifying and Hacking Security Tools
1Writing Plug-ins for Nessus3
The Nessus Architecture3
Installing Nessus4
Using Nessus4
The NASL Interpreter10
Hello World11
Datatypes and Variables11
Operators13
if...else15
Loops16
Functions17
Predefined Global Variables18
Important NASL Functions20
Nessus Plug-ins26
2Developing Dissectors and Plug-ins for the Ettercap Network Sniffer42
Installing and Using Ettercap42
Writing an Ettercap Dissector43
Writing an Ettercap Plug-in50
3Extending Hydra and Nmap56
Extending Hydra56
Adding Service Signatures to Nmap70
4Writing Plug-ins for the Nikto Vulnerability Scanner75
Installing Nikto75
Using Nikto76
Nikto Under the Hood78
Existing Nikto Plug-ins79
Adding Custom Entries to the Plug-in Databases81
Using LibWhisker84
Writing an NTLM Plug-in for Brute-Force Testing86
Writing a Standalone Plug-in to Attack Lotus Domino89
5Writing Modules for the Metasploit Framework92
Introduction to MSF92
Overview of Stack Buffer Overflows94
Writing Exploits for MSF102
Writing a Module for the MnoGoSearch Overflow106
Writing an Operating System Fingerprinting Module for MSF113
6Extending Code Analysis to the Webroot121
Attacking Web Applications at the Source121
Toolkit 101126
PMD128
Extending PMD131
Part IIWriting Network Security Tools
7Fun with Linux Kernel Modules159
Hello World159
Intercepting System Calls161
Hiding Processes170
Hiding from netstat175
8Developing Web Assessment Tools and Scripts178
Web Application Environment179
Designing the Scanner183
Building the Log Parser189
Building the Scanner191
Using the Scanner206
Complete Source Code207
9Automated Exploit Tools214
SQL Injection Exploits215
The Exploit Scanner216
Using the Scanner242
10Writing Network Sniffers244
Introduction to libpcap244
Getting Started with libpcap246
libpcap and 802.11 Wireless Networks261
libpcap and Perl271
libpcap Library Reference272
11Writing Packet-Injection Tools282
Introduction to libnet282
Getting Started with libnet283
Advanced libnet Functions292
Combining libnet and libpcap293
Introducing AirJack301
Index309
From the B&N Reads Blog

Customer Reviews