I: Modifying and Hacking Security Tools
Chapter 1: Writing Plug-ins for Nessus
Chapter 2: Developing Dissectors and Plug-ins for the Ettercap Network Sniffer
Chapter 3: Extending Hydra and Nmap
Chapter 4: Writing Plug-ins for the Nikto Vulnerability Scanner
Chapter 5: Writing Modules for the Metasploit Framework
Chapter 6: Extending Code Analysis to the Webroot
|