Nessus network auditing

The Updated Version of the Bestselling Nessus Book.This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de...

Descripción completa

Detalles Bibliográficos
Autor principal: Beale, Jay (-)
Otros Autores: Rogers, Russ
Formato: Libro electrónico
Idioma:Inglés
Publicado: Rockland, MA : Oxford : Syngress ; Elsevier Science [distributor] 2008.
Edición:2nd ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627269106719
Tabla de Contenidos:
  • Fornt Cover; Nessus Network Auditing, Second Edition; Copyright Page; Technical Editor; Contributing Authors; Contents; Chapter 1: Vulnerability Assessment; Introduction; What Is a Vulnerability Assessment?; Why a Vulnerability Assessment?; Assessment Types; Host Assessments; Network Assessments; Automated Assessments; Stand-Alone vs. Subscription; The Assessment Process; Detecting Live Systems; Identifying Live Systems; Enumerating Services; Identifying Services; Identifying Applications; Identifying Vulnerabilities; Reporting Vulnerabilities; Two Approaches; Administrative Approach
  • The Outsider ApproachThe Hybrid Approach; Realistic Expectations; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2: Introducing Nessus; Introduction; What Is It?; The De Facto Standard; History; Basic Components; Client and Server; The Plugins; The Knowledge Base; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3: Installing Nessus; Introduction; Nessus Version Comparison; Picking a Server; Supported Operating Systems; Minimal Hardware Specifications; Network Location; Nessus 2.2.x Install Guide; Nessus Install Script; Installation from Source
  • ./configureNessus 3 Install Guide; Mac OS X Install Process; UNIX Install Process; Fresh Installation; Red Hat and SUSE; Debian; Solaris; FreeBSD; Upgrading from Nessus 2; Configuring Nessus for UNIX; Creating a User Account; Windows Install Process; Final Steps; Installing a Client; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4: Running Your First Scan; Introduction; Preparing for Your First Scan; Authorization; Risk vs. Benefit; Denial of Service; Missing Information; Providing Authentication Information; Plugin Selection; Starting the Nessus Client; Policies
  • Policy TabOptions Tab; Credentials Tab; Plugin Selection Tab; Network Tab; Advanced Tab; Target Selection; Starting the Scan; Nessus Command Line; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5: Interpreting Results; Introduction; The Nessus UI Basics; Viewing Results Using the Nessus 3 Client for Linux/UNIX and Windows; Using the Basic Report Viewer; Saving and Exporting to Other Formats; Loading and Importing Reports; Reading a Nessus Report; Understanding Vulnerabilities; Understanding Risk; Understanding Scanner Logic; Key Report Elements; Asking the Right Questions
  • Factors that Can Affect Scanner OutputPlugin Selection; The Role of Dependencies; Safe Checks; no404.nasl; Ping the Remote Host; Portscanner Settings; Proxies, Firewalls, and TCP Wrappers; Valid Credentials; KB Reuse and Differential Scanning; And Many More...; Scanning Web Servers and Web Sites; Web Servers and Load Balancing; Bugs in the Plugins; Additional Reading; Configuration Files; NASL; The Nessus KB; The Nessus Logs; Forums and Mailing Lists; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6: Vulnerability Types; Introduction; Critical Vulnerabilities
  • Buffer Overflows