|
Hacking Exposed Cisco Networks English | 648 Pages | ISBN: 0072259175 | PDF | 9.81Mb |
Hacking Exposed Cisco Networks shows you step by step, how hackers target open systems, gain access and steal network is compromised. Any special security issues and network-based devices are covered with concrete examples, in-depth case studies, and detailed countermeasures. It's all here, from the vulnerability of switches, routers, firewalls, wireless and VPN to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You will learn how to prevent the new flaws in Cisco-centered networks are discovered and abused by cyber criminals. In addition, you'll get undocumented Cisco commands, security evaluation templates, and security tools are vital.
Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks.
- Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
- Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
- Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
- Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
- Find out how IOS exploits are written and if a Cisco router can be used as an attack platform
- Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
- Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access
Table of content Hacking Exposed Cisco Networks -------------------------------------------------------------------- Chapter 1: Cisco Network Design Models and Security Overview
Chapter 2: Cisco Network Security Elements
Chapter 3: Real-World Cisco Security Issues
Part II - "I Am Enabled" - Hacking the Box
Chapter 4: Profiling and Enumerating Cisco Networks
Chapter 5: Enumerating and Fingerprinting Cisco Devices
Chapter 6: Getting In from the Outside - Dead Easy
Chapter 7: Hacking Cisco Devices - The Intermediate Path
Chapter 8: Cisco IOS Exploitation - The Proper Way
Chapter 9: Cracking Secret Keys, Social Engineering, and Malicious Physical Access
Chapter 10: Exploiting and Preserving Access
Chapter 11: Denial of Service Attacks Against Cisco Devices
Part III - Protocol Exploitation in Cisco Networking Environments
Chapter 12: Spanning Tree, VLANs, EAP-LEAP, and CDP
Chapter 13: HSRP, GRE, Firewalls, and VPN Penetration
Chapter 14: Routing Protocols Exploitation
Part IV - Appendixes
Appendix A: Network Appliance Security Testing Template
Appendix B: Lab Router Interactive Cisco Auto Secure Configuration Example
Appendix C: Undocumented Cisco Commands
{ 0 komentar... read them below or add one }
Posting Komentar