Nessus Network Auditing: Jay Beale Open Source Security SeriesElsevier, 2004. gada 14. okt. - 550 lappuses This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network. * Nessus is the premier Open Source vulnerability assessment tool, and was recently voted the "most popular" open source security tool of any kind. * This is the first book available on Nessus and it is written by the world's premier Nessus developers led by the creator of Nessus, Renaud Deraison. * The dramatic success of Syngress' SNORT 2.0 INTRUSION DETECTION clearly illustrates the strong demand for books that offer comprehensive documentation of Open Source security tools that are otherwise Undocumented. |
No grāmatas satura
1.–5. rezultāts no 69.
16. lappuse
... return incomplete results. Network and host-based firewalls can also interfere with the assessment.This interference is a common occurrence when performing assessments against a system hosted on a different network segment, such as a ...
... return incomplete results. Network and host-based firewalls can also interfere with the assessment.This interference is a common occurrence when performing assessments against a system hosted on a different network segment, such as a ...
20. lappuse
... return them to service. Dynamic systems are the bane of the vulnerability assessment tools. If an assess- ment is in full swing and a user decides to reboot his workstation, the assessment tool will start receiving connection timeouts ...
... return them to service. Dynamic systems are the bane of the vulnerability assessment tools. If an assess- ment is in full swing and a user decides to reboot his workstation, the assessment tool will start receiving connection timeouts ...
21. lappuse
... return a success message for any file that is requested from the system. In response, almost all of the popular assessment tools have developed some form of Web server fingerprinting that allows their system to work around these strange ...
... return a success message for any file that is requested from the system. In response, almost all of the popular assessment tools have developed some form of Web server fingerprinting that allows their system to work around these strange ...
63. lappuse
... returns a line that reads exactly “/usr/local/lib” then we have nothing to do. Otherwise, we'll need to add it to this file, running ldconfig afterward. We accomplish this via the command sequence: # echo "/usr/local/lib" >> /etc/ld.so ...
... returns a line that reads exactly “/usr/local/lib” then we have nothing to do. Otherwise, we'll need to add it to this file, running ldconfig afterward. We accomplish this via the command sequence: # echo "/usr/local/lib" >> /etc/ld.so ...
113. lappuse
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Saturs
1 | |
27 | |
45 | |
Running Your First Scan | 85 |
Interpreting Results | 133 |
Vulnerability Types | 187 |
False Positives | 211 |
Under the Hood | 239 |
The Nessus Knowledge Base | 271 |
Enterprise Scanning | 295 |
NASL | 363 |
The Nessus User Community | 399 |
The NASL2 Reference Manual | 423 |
Utilizing Domain Credentials to Enhance Nessus Scans | 487 |
Index | 497 |
Citi izdevumi - Skatīt visu
Nessus Network Auditing: Jay Beale Open Source Security Series Jay Beale,Haroon Meer,Charl van der Walt,Renaud Deraison Ierobežota priekšskatīšana - 2004 |
Bieži izmantoti vārdi un frāzes
actually addition administrator affect allows application argument assessment attack authors banner called cause chapter client command complete configuration connection consider contains create database default dependencies detect determine enable example execute exist exploit false positives Figure format function host identify important install issues Knowledge Base launched look machine mailing NASL Nessus Note Once operating option packet password perform plugin port port scanner possible problem protocol Questions received remote request response returns risk scan scanner script server simply specified stored string takes understand update vulnerability Windows write written