How to Cheat at Configuring Open Source Security Tools
內容描述
Description
The perfect book and companion Web site for
multi-tasked security professionals and IT managers responsible for securing
corporate networks using the 10 most popular tools including: Snort, Nessus,
Wireshark, Nmap, and Kismet on Windows, Linux, or Max OS X.This book is
designed to teach readers about the many common vulnerabilities and the ways
in which attackers exploit, manipulate, misuse, and abuse protocols and
applications. The authors guide the readers to identify and defend against
these attacks using the most commonly deployed open source security tools
including Wireshark (sniffer), Snort (IDS), Nessus (Vulnerability Assessment),
and Kismet (wireless sniffer). The sniffer is used to help readers understand
how the protocols should work and what the various attacks are doing to break
them. IDS is used to demonstrate the format of specific signatures and provide
the reader with the skills needed to recognize and detect attacks when they
occur. The companion Web site for the book contains dozens of working scripts
and tools from the book.Covers the top 10 most popular open source
security tools including Snort, Nessus, Wireshark, Nmap, and
KismetCompanion Web site contains dozens of working scripts and tools for
readers*Follows Syngress proven How to Cheat pedagogy providing readers
with everything they need and nothing they dont