Syngress.Nessus.Network.Auditing.Second.Edition.May.2008.eBook-DDU.pdf

(10685 KB) Pobierz
Nessus Network Auditing, Second Edition
652646251.001.png
Russ Rogers Technical Editor
Mark Carey
Paul Criscuolo
Mike Petruzzi
652646251.002.png
Elsevier, Inc., the author(s), and any person or fi rm involved in the writing, editing, or production (collectively
“Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work.
There is no guarantee of any kind, expressed or implied, regarding the Work or its contents. The Work is
sold AS IS and WITHOUT WARRANTY. You may have other legal rights, which vary from state to state.
In no event will Makers be liable to you for damages, including any loss of profi ts, lost savings, or other
incidental or consequential damages arising out from the Work or its contents. Because some states do not
allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation
may not apply to you.
You should always use reasonable care, including backup and other appropriate precautions, when working
with computers, networks, data, and fi les.
Syngress Media ® , Syngress ® , “Career Advancement Through Skill Enhancement ® ,” “Ask the Author
UPDATE ® ,” and “Hack Proofi ng ® ,” are registered trademarks of Elsevier, Inc. “Syngress: The Defi nition
of a Serious Security Library”™, “Mission Critical™,” and “The Only Way to Stop a Hacker is to Think
Like One™” are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are
trademarks or service marks of their respective companies.
KEY
SERIAL NUMBER
001
HJIRTCV764
002
PO9873D5FG
003
829KM8NJH2
004
BAL923457U
005
CVPLQ6WQ23
006
VBP965T5T5
007
HJJJ863WD3E
008
2987GVTWMK
009
629MP5SDJT
010
IMWQ295T6T
PUBLISHED BY
Syngress Publishing, Inc.
Elsevier, Inc.
30 Corporate Drive
Burlington, MA 01803
Nessus Network Auditing, Second Edition
Copyright © 2008 by Elsevier, Inc. All rights reserved. Printed in the United States of America. Except as
permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed
in any form or by any means, or stored in a database or retrieval system, without the prior written
permission of the publisher, with the exception that the program listings may be entered, stored, and
executed in a computer system, but they may not be reproduced for publication.
Printed in the United States of America
1 2 3 4 5 6 7 8 9 0
ISBN 13: 978-1-59749-208-9
Publisher: Andrew Williams
Technical Editor: Russ Rogers
Page Layout and Art: SPi Publishing Services
For information on rights, translations, and bulk sales, contact Matt Pedersen, Commercial Sales Director
and Rights, at Syngress Publishing; email m.pedersen@elsevier.com.
Technical Editor
Russ Rogers (CISSP, CISM, IAM, IEM, HonScD), author of the popular Hacking
a Terror Network (Syngress Publishing, ISBN 1-928994-98-9), co-author on multiple
other books including the best selling Stealing the Network: How to Own a Continent
(Syngress, ISBN 1-931836-05-1), Network Security Evaluation Using the NSA IEM
(Syngress, 1-597490-35-0) and Editor in Chief of The Security Journal ; is currently
a penetration tester for a Federal agency and formerly the Co-Founder and Chief
Executive Offi cer of Security Horizon; a veteran-owned small business based in
Colorado Springs, CO. Russ has been involved in information technology since 1980
and has spent the last 18 years working professionally as both an IT and INFOSEC
consultant. Russ has worked with the United States Air Force (USAF), National
Security Agency (NSA), and the Defense Information Systems Agency (DISA).
He is a globally renowned security expert, speaker, and author who has presented
at conferences around the world including Amsterdam, Tokyo, Singapore, Sao Paulo,
and cities all over the United States.
Russ has an Honorary Doctorate of Science in Information Technology from
the University of Advancing Technology, a Masters Degree in Computer Systems
Management from the University of Maryland, a Bachelor of Science in Computer
Information Systems from the University of Maryland, and an Associate Degree in
Applied Communications Technology from the Community College of the Air Force.
Russ is currently pursuing a Bachelor of Science in Electrical Engineering from
the University of Colorado at Colorado Springs. He is a member of ISSA and ISC2
(CISSP) and co-founded the Security Tribe (securitytribe.com). He also teaches at
and fi lls the role of Professor of Network Security for the University of Advancing
Technology (uat.edu).
Russ would like to thank his kids and father for being so supportive over all these years.
Thanks and shout outs go out to Chris Hurley, Jeff Thomas, Brian Baker, Mark Carey, Mike
Petruzzi, Paul Criscuolo, Dan Connelly, Ping Look, Greg Miles, Johnny Long, Joe Grand,
Ryan Clarke, Luke McOmie, and Eddie Mize .
iii
652646251.003.png
Contributing Authors
Mark Carey (CISSP, IAM) has been involved with the Computer Security
Industry for over twenty years. He has pioneered techniques and written a
number of exploits. Mark has presented on Information Security topics for
The United States Army, The United States Air Force, NASA, and several
Corporations in the United States and UK. He has worked for several
major Midwestern banks, insurance companies, and credit unions, as well as
a brief engagement writing video games. He is currently employed as a
technology and technique developer and penetration tester for a Federal
agency, and as a freelance consultant upon occasion.
Mark was educated at Ohio Northern and The Ohio State University,
and has a CISSP and IAM certifi cation.
Mark would like to thank: my beloved wife Karen and daughter Katie, for
being wonderful and tolerant of my (over)-working habits and generally wonderful,
my sister, Robin (and all my nieces and nephews), the team: Chris Hurley,
Jeff Thomas, Brian Baker, Mike Petruzzi, Paul Criscuolo, Dan Connelly, Kevin
Kerr, and George Armstrong, all my friends (you know who you are), my fans,
and everyone who believed in me and made me who I am. A special thank you to
Charles Smith (Spike) for all the help in learning to write, right. A special tip of the
hat to Andy Riffl e, Mike Cappelli, William Knowles, just for being great friends .
Paul Criscuolo (CISSP) has been involved in the Computer Security
Industry for over 15 years, with the rare distinction of having export
experience in both the defensive and offensive aspects of INFOSEC. For
the last 4 years, Paul has worked as a penetration tester for a Federal agency.
He was involved with the Computer Incident Advisory Capability (CIAC)
working incidents for the Department of Energy (DOE). Paul was the
Incident Response and Intrusion Detection Team lead at Los Alamos
National Laboratory, writing a number of intrusion detection tools that
have resulted in technologies licenses from the DOE, and created tech-
nology startups with those licenses. He has also consulted with Fortune
500 companies, assisting in incident response and recovery. Paul has
iv
652646251.004.png
Zgłoś jeśli naruszono regulamin