Nessus, Snort, and Ethereal Power Tools - 1st Edition - ISBN: 9781597490207, 9780080489421

Nessus, Snort, and Ethereal Power Tools

1st Edition

Customizing Open Source Security Applications

eBook ISBN: 9780080489421
Paperback ISBN: 9781597490207
Imprint: Syngress
Published Date: 1st August 2005
Page Count: 400
Sales tax will be calculated at check-out Price includes VAT/GST
Price includes VAT/GST
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.


Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book.

Key Features

  • Snort, Nessus, and Ethereal are the three most popular open source security tools in the world
  • Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters
  • Companion Web site provides all working code and scripts from the book for download

Table of Contents

Part I: Nessus Tools
The Inner Workings of NASL
Debugging NASLs; Extensions and Custom Tests
Understanding the Extended Capabilities of the Nessus Environment
Analyzing GetFileVersion and MySQL Passwordless Test
Automating the Creation of NASLs

Part II: Snort Tools
The Inner Workings of Snort
Snort Rules
Plugins and Preprocessors
Modifying Snort

Part III: Etherial Tools
Capture file Formats
Protocol Dissectors
Reporting from Etherial

Appendix A Host Integrity Monitoring Using Osiris and Samhain


No. of pages:
© Syngress 2005
eBook ISBN:
Paperback ISBN:

Ratings and Reviews