信息安全和孙子兵法(目录)
来源:百度文库 编辑:神马文学网 时间:2024/06/03 09:51:08
信息安全和孙子兵法
Metasploit Framework- -|回首页 |2005年索引 | - -建筑的永恒之道
介绍一本书
目录如下:
Part I: Modifying and Hacking Security Tools
Chapter 1. Writing Plug-ins for Nessus
Section 1.1. The Nessus Architecture
Section 1.2. Installing Nessus
Section 1.3. Using Nessus
Section 1.4. The NASL Interpreter
Section 1.5. Hello World
Section 1.6. Datatypes and Variables
Section 1.7. Operators
Section 1.8. if...else
Section 1.9. Loops
Section 1.10. Functions
Section 1.11. Predefined Global Variables
Section 1.12. Important NASL Functions
Section 1.13. Nessus Plug-ins
Chapter 2. Developing Dissectors and Plug-ins for the Ettercap Network Sniffer
Section 2.1. Installing and Using Ettercap
Section 2.2. Writing an Ettercap Dissector
Section 2.3. Writing an Ettercap Plug-in
Chapter 3. Extending Hydra and Nmap
Section 3.1. Extending Hydra
Section 3.2. Adding Service Signatures to Nmap
Chapter 4. Writing Plug-ins for the Nikto Vulnerability Scanner
Section 4.1. Installing Nikto
Section 4.2. Using Nikto
Section 4.3. Nikto Under the Hood
Section 4.4. Existing Nikto Plug-ins
Section 4.5. Adding Custom Entries to the Plug-in Databases
Section 4.6. Using LibWhisker
Section 4.7. Writing an NTLM Plug-in for Brute-Force Testing
Section 4.8. Writing a Standalone Plug-in to Attack Lotus Domino
Chapter 5. Writing Modules for the Metasploit Framework
Section 5.1. Introduction to MSF
Section 5.2. Overview of Stack Buffer Overflows
Section 5.3. Writing Exploits for MSF
Section 5.4. Writing a Module for the MnoGoSearch Overflow
Section 5.5. Writing an Operating System Fingerprinting Module for MSF
Chapter 6. Extending Code Analysis to the Webroot
Section 6.1. Attacking Web Applications at the Source
Section 6.2. Toolkit 101
Section 6.3. PMD
Section 6.4. Extending PMD
Part II: Modifying and Hacking Security Tools
Chapter 7. Fun with Linux Kernel Modules
Section 7.1. Hello World
Section 7.2. Intercepting System Calls
Section 7.3. Hiding Processes
Section 7.4. Hiding from netstat
Chapter 8. Developing Web Assessment Tools and Scripts
Section 8.1. Web Application Environment
Section 8.2. Designing the Scanner
Section 8.3. Building the Log Parser
Section 8.4. Building the Scanner
Section 8.5. Using the Scanner
Section 8.6. Complete Source Code
Chapter 9. Automated Exploit Tools
Section 9.1. SQL Injection Exploits
Section 9.2. The Exploit Scanner
Section 9.3. Using the Scanner
Chapter 10. Writing Network Sniffers
Section 10.1. Introduction to libpcap
Section 10.2. Getting Started with libpcap
Section 10.3. libpcap and 802.11 Wireless Networks
Section 10.4. libpcap and Perl
Section 10.5. libpcap Library Reference
Chapter 11. Writing Packet-Injection Tools
Section 11.1. Introduction to libnet
Section 11.2. Getting Started with libnet
Section 11.3. Advanced libnet Functions
Section 11.4. Combining libnet and libpcap
Section 11.5. Introducing AirJack
【作者:szbf】【访问统计: 33】【2005年06月21日 星期二 09:34】【加入博采】【打印】
你可以使用这个链接引用该篇文章 http://publishblog.blogchina.com/blog/tb.b?diaryID=2002959
发布人: 邮箱:
主 页:
评论内容:
2003-2004 BlogChina.COM All rights reserved
Powered by BlogDriver 2.1
Metasploit Framework- -|回首页 |2005年索引 | - -建筑的永恒之道
介绍一本书
目录如下:
Part I: Modifying and Hacking Security Tools
Chapter 1. Writing Plug-ins for Nessus
Section 1.1. The Nessus Architecture
Section 1.2. Installing Nessus
Section 1.3. Using Nessus
Section 1.4. The NASL Interpreter
Section 1.5. Hello World
Section 1.6. Datatypes and Variables
Section 1.7. Operators
Section 1.8. if...else
Section 1.9. Loops
Section 1.10. Functions
Section 1.11. Predefined Global Variables
Section 1.12. Important NASL Functions
Section 1.13. Nessus Plug-ins
Chapter 2. Developing Dissectors and Plug-ins for the Ettercap Network Sniffer
Section 2.1. Installing and Using Ettercap
Section 2.2. Writing an Ettercap Dissector
Section 2.3. Writing an Ettercap Plug-in
Chapter 3. Extending Hydra and Nmap
Section 3.1. Extending Hydra
Section 3.2. Adding Service Signatures to Nmap
Chapter 4. Writing Plug-ins for the Nikto Vulnerability Scanner
Section 4.1. Installing Nikto
Section 4.2. Using Nikto
Section 4.3. Nikto Under the Hood
Section 4.4. Existing Nikto Plug-ins
Section 4.5. Adding Custom Entries to the Plug-in Databases
Section 4.6. Using LibWhisker
Section 4.7. Writing an NTLM Plug-in for Brute-Force Testing
Section 4.8. Writing a Standalone Plug-in to Attack Lotus Domino
Chapter 5. Writing Modules for the Metasploit Framework
Section 5.1. Introduction to MSF
Section 5.2. Overview of Stack Buffer Overflows
Section 5.3. Writing Exploits for MSF
Section 5.4. Writing a Module for the MnoGoSearch Overflow
Section 5.5. Writing an Operating System Fingerprinting Module for MSF
Chapter 6. Extending Code Analysis to the Webroot
Section 6.1. Attacking Web Applications at the Source
Section 6.2. Toolkit 101
Section 6.3. PMD
Section 6.4. Extending PMD
Part II: Modifying and Hacking Security Tools
Chapter 7. Fun with Linux Kernel Modules
Section 7.1. Hello World
Section 7.2. Intercepting System Calls
Section 7.3. Hiding Processes
Section 7.4. Hiding from netstat
Chapter 8. Developing Web Assessment Tools and Scripts
Section 8.1. Web Application Environment
Section 8.2. Designing the Scanner
Section 8.3. Building the Log Parser
Section 8.4. Building the Scanner
Section 8.5. Using the Scanner
Section 8.6. Complete Source Code
Chapter 9. Automated Exploit Tools
Section 9.1. SQL Injection Exploits
Section 9.2. The Exploit Scanner
Section 9.3. Using the Scanner
Chapter 10. Writing Network Sniffers
Section 10.1. Introduction to libpcap
Section 10.2. Getting Started with libpcap
Section 10.3. libpcap and 802.11 Wireless Networks
Section 10.4. libpcap and Perl
Section 10.5. libpcap Library Reference
Chapter 11. Writing Packet-Injection Tools
Section 11.1. Introduction to libnet
Section 11.2. Getting Started with libnet
Section 11.3. Advanced libnet Functions
Section 11.4. Combining libnet and libpcap
Section 11.5. Introducing AirJack
【作者:szbf】【访问统计: 33】【2005年06月21日 星期二 09:34】【加入博采】【打印】
你可以使用这个链接引用该篇文章 http://publishblog.blogchina.com/blog/tb.b?diaryID=2002959
发布人: 邮箱:
主 页:
评论内容:
2003-2004 BlogChina.COM All rights reserved
Powered by BlogDriver 2.1
信息安全和孙子兵法(目录)
信息安全和孙子兵法(目录)
信息安全和孙子兵法(目录)
孙子兵法,目录
政府信息公开目录
讲台信息目录
部门上传信息目录
安全操作规程目录
“中国国家生物多样性信息交换所”和“中国国家生物安全信息交换所”简介
三台县政府信息公开目录
个人电脑信息安全指南
信息安全师
《孙子兵法》和积极人生
关于信息安全和安全漏洞的一些科普——从支付宝控件漏洞谈起
生产安全重特大事故和重大未遂伤亡事故信息处置办法(试行)
面向首席信息安全官的云策略指南-IT频道-和讯网
省联合调研组到黔西南开展电子政务建设和网络与信息安全调研
信息安全方案横向评述
信息安全与可信计算
武汉大学“信息安全”专业课程简介
合肥市人民政府信息公开目录系统
目录和提要
标题、目录和内容提要
信息安全事故管理 | 信息安全体系/管理/服务 - 国际信息安全学习联盟