Flylib.com
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 0072259175
EAN: 2147483647
Year: 2005
Pages: 117
Authors:
Andrew Vladimirov
,
Konstantin Gavrilenko
,
Andrei Mikhailovsky
BUY ON AMAZON
Hacking Exposed Cisco Networks: Cisco Security Secrets Solutions
Back Cover
About
Foreword
Case Study
Introduction
ALL THE POWER OF HACKING EXPOSED AND MORE
HOW THE BOOK IS ORGANIZED
A FINAL MESSAGE TO OUR READERS
Part I: Foundations
Chapter 1: Cisco Network Design Models and Security Overview
CISCO NETWORK DESIGN MODELS: A SECURITY PERSPECTIVE
CISCO HIERARCHICAL DESIGN AND NETWORK SECURITY
SUMMARY
Chapter 2: Cisco Network Security Elements
COMMON CISCO DEVICE SECURITY FEATURES
CISCO FIREWALLS
CISCO SECURE IDS AND ATTACK PREVENTION
CISCO VPN SOLUTIONS
CISCO AAA AND RELATED SERVICES
SECURITY IMPLICATIONS OF CISCO INTERNETWORK DESIGN AND SECURITY ELEMENTS
SUMMARY
Chapter 3: Real-World Cisco Security Issues
WHY DO HACKERS WANT TO ENABLE YOUR BOX?
CISCO APPLIANCES AND NETWORKS: AN ATTACKER S PERSPECTIVE
CISCO NETWORK DEVICE SECURITY AUDITING AND PENETRATION TESTING FOUNDATIONS
SUMMARY
Part II: I Am Enabled-- Hacking the Box
Chapter 4: Profiling and Enumerating Cisco Networks
ROUTING ENUMERATION
ROUTING DOMAIN NUMBER DISCOVERY AND NETWORK MAPPING FOR IGPS
SUMMARY
Chapter 5: Enumerating and Fingerprinting Cisco Devices
SNIFFING FOR CISCO-SPECIFIC PROTOCOLS
ACTIVE ENUMERATION AND FINGERPRINTING OF CISCO DEVICES
SUMMARY
Chapter 6: Getting In from the Outside--Dead Easy
PASSWORD ATTACKS
SNMP COMMUNITY GUESSING, EXPLOITATION, AND SAFEGUARDS
EXPLOITING TFTP SERVERS TO TAKE OVER CISCO HOSTS
CISCO DEVICE WARDIALING
SUMMARY
Chapter 7: Hacking Cisco Devices--The Intermediate Path
A PRIMER ON PROTOCOL IMPLEMENTATION INVESTIGATION AND ABUSE: CISCO SNMP ATTACKS
A PRIMER ON DATA INPUT VALIDATION ATTACK CISCO HTTP EXPLOITATION
OTHER CISCO HTTPD FLAWS--A MORE SOPHISTICATED APPROACH
SUMMARY
Chapter 8: Cisco IOS Exploitation--The Proper Way
CISCO IOS ARCHITECTURE FOUNDATIONS
AN EXPLOITATION PRIMER: IOS TFTP BUFFER OVERFLOW
THE CURSE AND THE BLESSING OF IOS REVERSE ENGINEERING
IOS FEATURES AND COMMANDS THAT CAN BE (AB)USED BY REVERSE ENGINEERS
A MINIMALISTIC REVERSE ENGINEERING ARSENAL
SUMMARY
Chapter 9: Cracking Secret Keys, Social Engineering, and Malicious Physical Access
CISCO APPLIANCE PASSWORD CRACKING. (cisco network infrastructure)
LOCAL DEVICE ACCESS
SUMMARY
Chapter 10: Exploiting and Preserving Access
COMMON CISCO ROUTER, SWITCH, OR FIREWALL RECONFIGURATIONS BY ATTACKERS
FURTHER IOS EXPLOITATION AND DEVICE ACCESS PRESERVATION
SUMMARY
Chapter 11: Denial of Service Attacks Against Cisco Devices
DOS ATTACK MOTIVES
TYPES OF DOS ATTACKS
CISCO DOS ASSESSMENT TOOLS
WELL-KNOWN CISCO DOS VULNERABILITIES
EXAMPLES OF SPECIFIC DOS ATTACKS AGAINST CATALYST SWITCHES AND OTHER CISCO NETWORKING DEVICES
ABUSING CISCO APPLIANCES FOR NASTY DDOS DEEDS
DDOS MASSIVE: REVENGE OF THE KIDDIES
SUMMARY
Part III: Protocol Exploitation in Cisco Networking Environments
Chapter 12: Spanning Tree, VLANs, EAP-LEAP, and CDP
SPANNING TREE PROTOCOL EXPLOITATION
EXPLOITING VLANS
CISCO EAP-LEAP CRACKING
ATTACKING CDP
SUMMARY
Chapter 13: HSRP, GRE, Firewalls, and VPN Penetration
GRE EXPLOITATION
CISCO FIREWALL PENETRATION
CISCO VPN HACKING
SUMMARY
Chapter 14: Routing Protocols Exploitation
SETTING UP A ROGUE ROUTER
ATTACKING DISTANCE-VECTOR ROUTING PROTOCOLS
ATTACKING LINK STATE ROUTING PROTOCOLS
ATTACKING BGPV4
SUMMARY
Part IV: Appendixes
Appendix A: Network Appliance Security Testing Template
LAYER 3
LAYER 4
LAYERS 5--7
Appendix B: Lab Router Interactive Cisco Auto Secure Configuration Example
Appendix C: Undocumented Cisco Commands
B
C
D
E
F
G
H
I
L
M
N
P
R
S
T
W
X
List of Figures
List of Tables
List of Sidebars
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 0072259175
EAN: 2147483647
Year: 2005
Pages: 117
Authors:
Andrew Vladimirov
,
Konstantin Gavrilenko
,
Andrei Mikhailovsky
BUY ON AMAZON
Java for RPG Programmers, 2nd Edition
Data Types And Variables
Arrays And Vectors
String Manipulation
Date And Time Manipulation
User Interface
MySQL Clustering
Installing MySQL-Max
The Structure of config.ini
Performance Metrics
Data Retrieval in MySQL Cluster
MySQL Cluster Errors
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Local Area Network (LAN) Technologies
Wide Area Network (WAN) Technologies
Internet Protocol (IP) Addressing
Internet Group Management Protocol (IGMP)
Transmission Control Protocol (TCP) Basics
Cisco CallManager Fundamentals (2nd Edition)
Route Patterns and Route Filters
Miscellaneous Solutions
Ad Hoc Conferencing
Call Detail Records
Summary
Programming Microsoft ASP.NET 3.5
Paging Through Data Sources
Real-World Data Access
ASP.NET Security
Working with Web Services
Data-Bound and Templated Controls
Java Concurrency in Practice
Thread Confinement
Long-running GUI Tasks
Atomic Variables and Nonblocking Synchronization
Disadvantages of Locking
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies