Books & Videos

Table of Contents

  1. Modifying and Hacking Security Tools

    1. Chapter 1 Writing Plug-ins for Nessus

      1. The Nessus Architecture
      2. Installing Nessus
      3. Using Nessus
      4. The NASL Interpreter
      5. Hello World
      6. Datatypes and Variables
      7. Operators
      8. if...else
      9. Loops
      10. Functions
      11. Predefined Global Variables
      12. Important NASL Functions
      13. Nessus Plug-ins
    2. Chapter 2 Developing Dissectors and Plug-ins for the Ettercap Network Sniffer

      1. Installing and Using Ettercap
      2. Writing an Ettercap Dissector
      3. Writing an Ettercap Plug-in
    3. Chapter 3 Extending Hydra and Nmap

      1. Extending Hydra
      2. Adding Service Signatures to Nmap
    4. Chapter 4 Writing Plug-ins for the Nikto Vulnerability Scanner

      1. Installing Nikto
      2. Using Nikto
      3. Nikto Under the Hood
      4. Existing Nikto Plug-ins
      5. Adding Custom Entries to the Plug-in Databases
      6. Using LibWhisker
      7. Writing an NTLM Plug-in for Brute-Force Testing
      8. Writing a Standalone Plug-in to Attack Lotus Domino
    5. Chapter 5 Writing Modules for the Metasploit Framework

      1. Introduction to MSF
      2. Overview of Stack Buffer Overflows
      3. Writing Exploits for MSF
      4. Writing a Module for the MnoGoSearch Overflow
      5. Writing an Operating System Fingerprinting Module for MSF
    6. Chapter 6 Extending Code Analysis to the Webroot

      1. Attacking Web Applications at the Source
      2. Toolkit 101
      3. PMD
      4. Extending PMD
  2. Modifying and Hacking Security Tools

    1. Chapter 7 Fun with Linux Kernel Modules

      1. Hello World
      2. Intercepting System Calls
      3. Hiding Processes
      4. Hiding from netstat
    2. Chapter 8 Developing Web Assessment Tools and Scripts

      1. Web Application Environment
      2. Designing the Scanner
      3. Building the Log Parser
      4. Building the Scanner
      5. Using the Scanner
      6. Complete Source Code
    3. Chapter 9 Automated Exploit Tools

      1. SQL Injection Exploits
      2. The Exploit Scanner
      3. Using the Scanner
    4. Chapter 10 Writing Network Sniffers

      1. Introduction to libpcap
      2. Getting Started with libpcap
      3. libpcap and 802.11 Wireless Networks
      4. libpcap and Perl
      5. libpcap Library Reference
    5. Chapter 11 Writing Packet-Injection Tools

      1. Introduction to libnet
      2. Getting Started with libnet
      3. Advanced libnet Functions
      4. Combining libnet and libpcap
      5. Introducing AirJack
  1. Colophon