Nessus Network Auditing: Jay Beale Open Source Security SeriesElsevier, 2004. gada 14. okt. - 550 lappuses This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network. * Nessus is the premier Open Source vulnerability assessment tool, and was recently voted the "most popular" open source security tool of any kind. * This is the first book available on Nessus and it is written by the world's premier Nessus developers led by the creator of Nessus, Renaud Deraison. * The dramatic success of Syngress' SNORT 2.0 INTRUSION DETECTION clearly illustrates the strong demand for books that offer comprehensive documentation of Open Source security tools that are otherwise Undocumented. |
No grāmatas satura
1.–5. rezultāts no 79.
31. lappuse
... Notes. from. the. Underground... The. Dark. Side. of. Security. Consultants. The myriad of reasons that make Nessus such a great tool for security consultants also enable a dark phenomenon in the world of network security. All too often ...
... Notes. from. the. Underground... The. Dark. Side. of. Security. Consultants. The myriad of reasons that make Nessus such a great tool for security consultants also enable a dark phenomenon in the world of network security. All too often ...
49. lappuse
... note the following additional considerations when installing Nessus on a SUSE Linux system. Installation on SUSE requires the following packages be in place prior to installation: □ bison.rpm □ flex.rpm □ gtkdev.rpm □ glibdev.rpm ...
... note the following additional considerations when installing Nessus on a SUSE Linux system. Installation on SUSE requires the following packages be in place prior to installation: □ bison.rpm □ flex.rpm □ gtkdev.rpm □ glibdev.rpm ...
67. lappuse
... note that the password will be seen on the screen as it is typed. Typically, it is best to be able to authenticate users based on what is known as two-factor authentication.This is where users are tested for something they know and ...
... note that the password will be seen on the screen as it is typed. Typically, it is best to be able to authenticate users based on what is known as two-factor authentication.This is where users are tested for something they know and ...
71. lappuse
... Note that the total number of processes will be max_checks x max_hosts, so you need to find a balance between these two options. Note that launching too many plugins at the same time might disable the remote host, either temporarily ...
... Note that the total number of processes will be max_checks x max_hosts, so you need to find a balance between these two options. Note that launching too many plugins at the same time might disable the remote host, either temporarily ...
72. lappuse
... Note that you can specify UDP and TCP ports by prefixing each range by T or U. For instance, the following range will make nessusd scan UDP ports 1 to 1024 and TCP ports 1 to 65535: “T:1- 65535,U:1-1024”. Continued Table 3.3 ...
... Note that you can specify UDP and TCP ports by prefixing each range by T or U. For instance, the following range will make nessusd scan UDP ports 1 to 1024 and TCP ports 1 to 65535: “T:1- 65535,U:1-1024”. Continued Table 3.3 ...
Saturs
1 | |
27 | |
45 | |
Running Your First Scan | 85 |
Interpreting Results | 133 |
Vulnerability Types | 187 |
False Positives | 211 |
Under the Hood | 239 |
The Nessus Knowledge Base | 271 |
Enterprise Scanning | 295 |
NASL | 363 |
The Nessus User Community | 399 |
The NASL2 Reference Manual | 423 |
Utilizing Domain Credentials to Enhance Nessus Scans | 487 |
Index | 497 |
Citi izdevumi - Skatīt visu
Nessus Network Auditing: Jay Beale Open Source Security Series Jay Beale,Haroon Meer,Charl van der Walt,Renaud Deraison Ierobežota priekšskatīšana - 2004 |
Bieži izmantoti vārdi un frāzes
actually addition administrator affect allows application argument assessment attack authors banner called cause chapter client command complete configuration connection consider contains create database default dependencies detect determine enable example execute exist exploit false positives Figure format function host identify important install issues Knowledge Base launched look machine mailing NASL Nessus Note Once operating option packet password perform plugin port port scanner possible problem protocol Questions received remote request response returns risk scan scanner script server simply specified stored string takes understand update vulnerability Windows write written