Index

A

ACT_ATTACK plugins, 236
ACT_DESTRUCTIVE_ATTACK plugins, 236
ACT_END plugins, 224
ACT_FLOOD plugins, 237
ACT_GATHER_INFO plugins, 231
ACT_INIT plugins, 224
ACT_KILL_HOST plugins, 237
ACT_SCANNER plugins, 224, 228, 258
agent-based systems, 6
anti Nessus detection plugin, 223
assessment tools, for detecting corporate policy violations, 4
.audit files
commands and directives for
Linux .audit file, 400–401
Windows .audit file, 398–400
configuration checks, 396
from Tenable Security, 397
automated assessment process, 8
automated patch installation tools, 16
automated teller machines (ATMs), 323
AUX/LPT/COM1 DoS vulnerability, 321

B

best-practices vulnerability, 183–184
blowfish algorithm, 97
buffer overflows, 172–173
Bug Tracker, advantages ...

Get Nessus Network Auditing, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.