Nessus, Snort, and Ethereal Power Tools

Nessus, Snort, and Ethereal Power Tools

Customizing Open Source Security Applications

1st Edition - August 1, 2005

Write a review

  • Authors: Brian Caswell, Jay Beale, Gilbert Ramirez, Noam Rathaus
  • eBook ISBN: 9780080489421

Purchase options

Purchase options
DRM-free (PDF)
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order

Description

Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book.

Key Features

  • Snort, Nessus, and Ethereal are the three most popular open source security tools in the world
  • Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters
  • Companion Web site provides all working code and scripts from the book for download

Table of Contents

  • Part I: Nessus Tools
    The Inner Workings of NASL
    Debugging NASLs; Extensions and Custom Tests
    Understanding the Extended Capabilities of the Nessus Environment
    Analyzing GetFileVersion and MySQL Passwordless Test
    Automating the Creation of NASLs

    Part II: Snort Tools
    The Inner Workings of Snort
    Snort Rules
    Plugins and Preprocessors
    Modifying Snort

    Part III: Etherial Tools
    Capture file Formats
    Protocol Dissectors
    Reporting from Etherial

    Appendix A Host Integrity Monitoring Using Osiris and Samhain

Product details

  • No. of pages: 400
  • Language: English
  • Copyright: © Syngress 2005
  • Published: August 1, 2005
  • Imprint: Syngress
  • eBook ISBN: 9780080489421

About the Authors

Brian Caswell

Affiliations and Expertise

Snort.org webmaster, USA

Jay Beale

Affiliations and Expertise

Series Editor of the Jay Beale Open Source Security Series, lead developer of the Bastille project, Seattle, WA

Gilbert Ramirez

Affiliations and Expertise

Author, Snort 2.1 Intrusion Detection

Noam Rathaus

Noam Rathaus is the co-founder and CTO of Beyond Security, a company specializing in the development of enterprise-wide security assessment technologies, vulnerability assessment-based SOCs (security operation centers) and related products. He holds an electrical engineering degree from Ben Gurion University, and has been checking the security of computer systems from the age of 13. Noam is also the editor-in-chief of SecuriTeam.com, one of the largest vulnerability databases and security portals on the Internet. He has contributed to several security-related open-source projects including an active role in the Nessus security scanner project. He has written over 150 security tests to the open source tool's vulnerability database, and also developed the first Nessus client for the Windows operating system. Noam is apparently on the hit list of several software giants after being responsible for uncovering security holes in products by vendors such as Microsoft, Macromedia, Trend Micro, and Palm. This keeps him on the run using his Nacra Catamaran, capable of speeds exceeding 14 knots for a quick getaway.

Affiliations and Expertise

Co-founder and CTO, Beyond Security, Israel, Microsoft Events Insider

Ratings and Reviews

Write a review

There are currently no reviews for "Nessus, Snort, and Ethereal Power Tools"