Customize Open Source Security Applications
If you have Nessus, Snort, and Ethereal up and running and are now ready to customize, code, and torque these tools to their fullest potential, then this book is for your. The authors of this book provide the inside scoop on coding the most effective and efficient Snort rules, Nessus plug-ins with NASL, and Ethereal wiretap, dissector, and tap modules. After reading this book, you will be a master at coding your own tools to detect malicious traffic, scan for vulnerabilities, and capture only the packets YOU really care about. Each section also contains dozens of working code examples available for download.
Nessus Power Tools
- Create Extensions and Custom Tests
Customize NASL and extend the capabilities of Nessus using Include Files; Process Launching and Results Analysis; and the Nessus Knowledge Base.
- Debug Newly Created or Existing NASLs
Use the command-line interpreter or the Nessus daemon to test the validity of code and vulnerability tests.
- Automate NASL Creation
Automate and simplify creation of complex NASLs using Plugin Templates, Per's CGI Module, and XML Parsing
Snort Power Tools
- Create Custom Rules
Write, test, and optimize advanced rules to work on even the most complex traffic
- Master Plugins and Preprocessors
Write detection plugins, output plugins, and preprocessors to optimize speed and efficiency of rules
- Patch Snort to Enhance and Customize Performance
Use Snort AV (Active Verification) to reduce false positives and Snort-Wireless to provide layer 2 Wireless IDS functionality
Ethereal Power Tools
- Enable Ethereal to Read New Data Sources
Use libpcap to capture packets, use text2pcap to convert from hex dumps to the pcap format, and learn techniques for reverse engineering and undocumented packet capture file format and writing a wiretap module
- Program Your Own Protocol Dissector
Set up and program advanced dissectors either linked into Ethereal or as a plugin
- Create and Customize Ethereal Reports
Unlock the power of Ethereal by reporting with a line-mode tap module; a GUI tap module; grep and awk commands; and Python programs to parse Ethereal's verbose output and PDML (XML) output.
Comments
There are currently no comments
New Comment