Flylib.com
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 0072259175
EAN: 2147483647
Year: 2005
Pages: 117
Authors:
Andrew Vladimirov
,
Konstantin Gavrilenko
,
Andrei Mikhailovsky
BUY ON AMAZON
Hacking Exposed Cisco Networks: Cisco Security Secrets Solutions
Back Cover
About
Foreword
Case Study
Introduction
ALL THE POWER OF HACKING EXPOSED AND MORE
HOW THE BOOK IS ORGANIZED
A FINAL MESSAGE TO OUR READERS
Part I: Foundations
Chapter 1: Cisco Network Design Models and Security Overview
CISCO NETWORK DESIGN MODELS: A SECURITY PERSPECTIVE
CISCO HIERARCHICAL DESIGN AND NETWORK SECURITY
SUMMARY
Chapter 2: Cisco Network Security Elements
COMMON CISCO DEVICE SECURITY FEATURES
CISCO FIREWALLS
CISCO SECURE IDS AND ATTACK PREVENTION
CISCO VPN SOLUTIONS
CISCO AAA AND RELATED SERVICES
SECURITY IMPLICATIONS OF CISCO INTERNETWORK DESIGN AND SECURITY ELEMENTS
SUMMARY
Chapter 3: Real-World Cisco Security Issues
WHY DO HACKERS WANT TO ENABLE YOUR BOX?
CISCO APPLIANCES AND NETWORKS: AN ATTACKER S PERSPECTIVE
CISCO NETWORK DEVICE SECURITY AUDITING AND PENETRATION TESTING FOUNDATIONS
SUMMARY
Part II: I Am Enabled-- Hacking the Box
Chapter 4: Profiling and Enumerating Cisco Networks
ROUTING ENUMERATION
ROUTING DOMAIN NUMBER DISCOVERY AND NETWORK MAPPING FOR IGPS
SUMMARY
Chapter 5: Enumerating and Fingerprinting Cisco Devices
SNIFFING FOR CISCO-SPECIFIC PROTOCOLS
ACTIVE ENUMERATION AND FINGERPRINTING OF CISCO DEVICES
SUMMARY
Chapter 6: Getting In from the Outside--Dead Easy
PASSWORD ATTACKS
SNMP COMMUNITY GUESSING, EXPLOITATION, AND SAFEGUARDS
EXPLOITING TFTP SERVERS TO TAKE OVER CISCO HOSTS
CISCO DEVICE WARDIALING
SUMMARY
Chapter 7: Hacking Cisco Devices--The Intermediate Path
A PRIMER ON PROTOCOL IMPLEMENTATION INVESTIGATION AND ABUSE: CISCO SNMP ATTACKS
A PRIMER ON DATA INPUT VALIDATION ATTACK CISCO HTTP EXPLOITATION
OTHER CISCO HTTPD FLAWS--A MORE SOPHISTICATED APPROACH
SUMMARY
Chapter 8: Cisco IOS Exploitation--The Proper Way
CISCO IOS ARCHITECTURE FOUNDATIONS
AN EXPLOITATION PRIMER: IOS TFTP BUFFER OVERFLOW
THE CURSE AND THE BLESSING OF IOS REVERSE ENGINEERING
IOS FEATURES AND COMMANDS THAT CAN BE (AB)USED BY REVERSE ENGINEERS
A MINIMALISTIC REVERSE ENGINEERING ARSENAL
SUMMARY
Chapter 9: Cracking Secret Keys, Social Engineering, and Malicious Physical Access
CISCO APPLIANCE PASSWORD CRACKING. (cisco network infrastructure)
LOCAL DEVICE ACCESS
SUMMARY
Chapter 10: Exploiting and Preserving Access
COMMON CISCO ROUTER, SWITCH, OR FIREWALL RECONFIGURATIONS BY ATTACKERS
FURTHER IOS EXPLOITATION AND DEVICE ACCESS PRESERVATION
SUMMARY
Chapter 11: Denial of Service Attacks Against Cisco Devices
DOS ATTACK MOTIVES
TYPES OF DOS ATTACKS
CISCO DOS ASSESSMENT TOOLS
WELL-KNOWN CISCO DOS VULNERABILITIES
EXAMPLES OF SPECIFIC DOS ATTACKS AGAINST CATALYST SWITCHES AND OTHER CISCO NETWORKING DEVICES
ABUSING CISCO APPLIANCES FOR NASTY DDOS DEEDS
DDOS MASSIVE: REVENGE OF THE KIDDIES
SUMMARY
Part III: Protocol Exploitation in Cisco Networking Environments
Chapter 12: Spanning Tree, VLANs, EAP-LEAP, and CDP
SPANNING TREE PROTOCOL EXPLOITATION
EXPLOITING VLANS
CISCO EAP-LEAP CRACKING
ATTACKING CDP
SUMMARY
Chapter 13: HSRP, GRE, Firewalls, and VPN Penetration
GRE EXPLOITATION
CISCO FIREWALL PENETRATION
CISCO VPN HACKING
SUMMARY
Chapter 14: Routing Protocols Exploitation
SETTING UP A ROGUE ROUTER
ATTACKING DISTANCE-VECTOR ROUTING PROTOCOLS
ATTACKING LINK STATE ROUTING PROTOCOLS
ATTACKING BGPV4
SUMMARY
Part IV: Appendixes
Appendix A: Network Appliance Security Testing Template
LAYER 3
LAYER 4
LAYERS 5--7
Appendix B: Lab Router Interactive Cisco Auto Secure Configuration Example
Appendix C: Undocumented Cisco Commands
B
C
D
E
F
G
H
I
L
M
N
P
R
S
T
W
X
List of Figures
List of Tables
List of Sidebars
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 0072259175
EAN: 2147483647
Year: 2005
Pages: 117
Authors:
Andrew Vladimirov
,
Konstantin Gavrilenko
,
Andrei Mikhailovsky
BUY ON AMAZON
Java How to Program (6th Edition) (How to Program (Deitel))
Self-Review Exercises
Generic Methods: Implementation and Compile-Time Translation
Playing Video and Other Media with Java Media Framework
JSlider
Printing Dates and Times
Visual C# 2005 How to Program (2nd Edition)
foreach Statement
Base Classes and Derived Classes
Extracting Substrings from strings
Card Shuffling and Dealing Simulation
Introduction
802.11 Wireless Networks: The Definitive Guide, Second Edition
EAP Methods
Characteristics of the OFDM PHY
11g: The Extended-Rate PHY (ERP)
Security Definition and Analysis
Authentication and Access Control
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #2: Improve Your Processes
Key #3: Work Together for Maximum Gain
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Special Edition Using FileMaker 8
Troubleshooting
FileMaker Extra: Building a Three-Way Join
Using the Server Administration Tool
Monitoring FileMaker Server
FileMaker Extra: Best Practices Checklist
User Interfaces in C#: Windows Forms and Custom Controls
Control Class Basics
Classic Controls
Data Controls
GDI+ Controls
Help and Application-Embedded Support
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies