Describes the architecture of Nessus, how to obtain and install it, and how it is used to find programming errors. This description may be from another edition of this product.
The purpose of Nessus is to provide an Open Source Solution for network auditing on all Unix like systems. This book not only details using Nessus but also comes with a CD containing the program, as well as Ethereal, Snort, and Newt (a port of the program to the Windows environment). What is a network assessment? At its basic level it is an attempt to detect a live system and then identify the computing environment, services, applications, and vulnerabilities on that system. Basically there are two types of assessment - internal and external. An internal assessment is done over the local network and external is done from outside the LAN. Nessus will do both types and the book details how to do either, or both of them. The authors do an excellent job of detailing installation, setup, and how to interpret the results of a scan as well as various factors that can affect the report. One of the parts not to be missed is the discussion of not only the benefits but also the potential problems of scanning your system. Some of the vulnerability types scanned for include buffer overflows, default passwords, backdoors, information leaks, and denial of service. The Nessus scripting language is covered in detail in Appendix A instead of the main portion of the book; a choice I appreciated very much as it allowed the flow of the book to not be interrupted by such a highly technical section. With Open Source products there generally is no organized technical support phone number you can call of help. So, the authors include information on how to get help via the Nessus User Community, mailing lists, and archives. Nessus Network Auditing is a highly recommended book for anyone interested in auditing their network to find potential problems before they become reality.
Invaluable content best suited for infrastructure use
Published by Thriftbooks.com User , 20 years ago
If you are, or are considering, using Nessus in a wide-scale/enterprise scanning infrastructure you will likely find everything you need to know in this book. If you are, or are considering, using Nessus for ad-hoc assessments (or penetration tests), this book will indeed provide a lot of valuable information but at a price: you'll have to read the whole thing to glean all the useful tips and you'll end up spending a lot of time getting intimately familiar with what's probably going to be just one of very many tools in your toolbox, getting only a fraction of your attention in each assessment. If you're new to vulnerability assessment or penetration testing (not just to Nessus) you should really read a few other books first, even though this one does contain some useful info on testing in general, for example, how to identify false positives and negatives. There's a lot of good content but it tends to be all over the place--numerous sidebars and tables throughout are usually in context but could also have been placed elsewhere. The style, however, seems fairly consistent considering the book had 10 contributing authors and three editors, one of which is the creator of the subject of the book. Unfortunately Jay Beale, whose name appears prominantly on the cover, is merely an editor--a shame since I typically find his articles in Information Security magazine well-written and informative. There are a just a couple downsides to this book. Like several other current Syngress titles it suffers from poor quality printing and paper with some very tiny and/or fuzzy screen shots, large print, and lack of whitespace--making it a little hard on the eyes. It also really would have been nice if it had included a CD with the current version of Nessus on it, since that's what the book's about after all.
Long overdue but worth the wait
Published by Thriftbooks.com User , 20 years ago
'Nessus Network Auditing' (NNA) is the definitive (and only) guide to the Nessus open source vulnerability assessment tool. I recommend all security professionals read this book. You may start as a Nessus user, but the book will help you become part of the Nessus community. NNA features twelve contributors, but it doesn't suffer the fate of other books with similar high author counts. NNA manages to present fairly original material in each chapter, without a lot of overlap. I credit the lead authors and editors for keeping the contributors on track. They could have reduced the number of crashing printer stories, however. Several chapters stood out from the others. Ch 1 explains the need for conducting vulnerability assessment. Ch 3 makes a good case for always installing from source code and not trusting precompiled binaries. Chs 8 and 9 deliver real value with insights into Nessus internals, such as scanning architecture and the Nessus Knowledge Base. Ch 10 presents crude albeit workable ways to measure bandwidth to alleviate loads caused by scans. Ch 11 is an excellent rationale for the Nessus Attack Scripting Language (NASL) written by Nessus' creator. I would have liked to have seen an appendix based on an actual (perhaps sanitized) scan, showing how a security admin selected tests, ran the scan, and validated results. NNA suffers a few problems. A few typos are present, but nothing that distracts from the book's content. I did find the ch 4 author's mention of the TCP "triple handshake" to be odd. While not wrong, this process is usually called the "three-way handshake." The screenshots in appendix B are of poor quality and should be replaced in future editions. Note that the Nessus version used in NNA varies from 2.0.9 to 2.0.10a, and the current edition is 2.2.0. Version creep is part of every technical book, and did not make a big difference at this point. When Nessus 2.4 is released, watch for the adoption of the new BOSS GUI to clearly alter the face of the Nessus interface. Overall, NNA is an excellent technical resource for anyone charged with auditing network security. I have a greater appreciation for the Nessus architecture and its ability to do more in-depth host checks. Motivated readers can use this book to learn how to write their own NASL scripts and effectively deploy a distributed scanning architecture.
Invaluable resource for an excellent tool
Published by Thriftbooks.com User , 20 years ago
This is the third book in Jay Beale's Open Source Security Series from Syngress Publishing and it is every bit as good as the first two. It certainly doesn't hurt to have the founder of the Nessus Project be one of the leading contributors to the book. The book begins with an overview of the basic concept of vulnerability assessment and how a scan can be used to proactively detect holes and protect the network. After a brief introduction to the founding of the Nessus Project and the birth of the Nessus software the book goes into comprehensive detail about how to install, configure, administer, and employ the full functionality of Nessus to secure and protect your network. Some of the most valuable information is contained in the chapters describing how to interpret the results of a Nessus scan and how to handle false positives. The book also provides information about the Nessus Knowledge Base and the Nessus User Community - two valuable resources for further information. The enclosed CD contains full versions of Nessus, Ethereal and Snort as well as NeWT, a standalone security scanner for Windows based on Nessus. Nessus is an excellent tool and this book is an invaluable resource in helping you get the most out of it. (...)
a MUST read for all IT Security Engineers!
Published by Thriftbooks.com User , 20 years ago
I must admit, as a Nessus user for many many years now, I was excited to hear that a publication was finally becoming available on Nessus (isn't one astonished of how many actual Cisco/Microsoft/Java books exist). However, I was "pensive at best" when it came to actually purchasing a book that "appeared" to simply convey how to install/configure/run this award-winning IT Security tool. To my pleasant surprise, the very evening I purchased the book, I found myself unable to put this book down, and in fact, stayed up nearly all night reading the entire thing. My overall rating? The best investment I'd spent for an IT Security book in several years. Hands down! Thankfully, only about 1/3 of the book is spent on install/configure/running the product, the other 2/3rds of the publication convey keen insights surrounding the ins and outs of vulnerability assessments. I submit that all IT Security Engineers should spent the money and time gaining "keen insights and perspectives" of Renaud Deraison, unquestionably a pioneer in the history of IT Security. True, a vulnerability assessment is only one (yet key) piece of the entire "Security Puzzle", nevertheless, if your job carries the title CISSP/CISM, and you're involved with IT Security (regardless of whether or not your vulnerability assessment tool du jour is Nessus or not) your understanding surrounding vulnerability assessments isn't complete til you've peered into the "Mind's eye" of Mr. Deraison. Clearly, in the annals of IT Security, history will render him a Pioneer in the journey of protecting an organizations IT assets.
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.