Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. | CWU Network Security Tools Table of Contents Copyright Preface Audience Assumptions This Book Makes Contents of This Book Conventions Used in This Book Using Code Examples We d Like to Hear from You Safari Enabled Acknowledgments Part I Modifying and Hacking Security Tools Chapter 1. Writing Plug-ins for Nessus Section 1.1. The Nessus Architecture Section 1.2. Installing Nessus Section 1.3. Using Nessus Section 1.4. The NASL Interpreter Section 1.5. Hello World Section 1.6. Datatypes and Variables Section 1.7. Operators Section 1.8. .