Description:
If you have Nessus, Snort, and Ethereal up and running and now you’re ready to customize, code, and torque these tools to their fullest potential, then this book is for you. The authors of this book provide the inside scoop on coding the most effective and efficient Snort rules, Nessus plug-ins with NASL, and Ethereal wiretap, dissector, and tap modules. After reading this book, you will be a master at coding your own tools to detect malicious traffic, scan for vulnerabilities, and capture only the packets YOU really care about. Each section also contains dozens of working code examples available for download from www.syngress.com/solutions.