Open source security software and penetration testing were top-of-mind amongst SearchSecurityChannel users in the month of May. Peruse our list of top five tips and learn how to use Nessus and Snort, how to conduct network and Web application penetration testing and, finally, learn how Vista's new features help protect the OS against malware.1. Nessus Tutorial: Using the open source vulnerability scanning tool
Learn how to use Nessus -- a robust, free vulnerability scanning tool that fits any budget and matches commercial product feature sets. Use this expert step-by-step guidance to learn everything from installation and configuration techniques, to running a scan, to managing reports and interpreting results. 2. Snort Report: Detect events without Snort IDS rules
In this edition of Richard Bejtlich's Snort Report, learn how to run the open source intrusion detection system and how to analyze what Snort detects based on the Snort.conf file. 3. Network penetration testing: Ethical hacking tools and techniques
In this installment of our series on how to conduct a network penetration test, SearchSecurityChannel expert Russell Dean Vines introduces the information gathering, port scanning, vulnerability scanning and password cracking tools used in network penetration testing. 4. Web application penetration testing: Best practices
Learn how to pen test your customers' Web applications to assess their ability to withstand an attack. This tip describes the proper procedures for conducting Web application penetration testing and provides strategies for getting the most out of a pen test. 5. Windows Vista malware protection
Vista includes a number of features that, when used together, do a far better job of protecting against malware than any previous versions of Windows. Learn about Vista's user account control, Windows Defender and the Malicious Software Removal Tool in this tip.
This was first published in June 2007