Flylib.com
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 0072259175
EAN: 2147483647
Year: 2005
Pages: 117
Authors:
Andrew Vladimirov
,
Konstantin Gavrilenko
,
Andrei Mikhailovsky
BUY ON AMAZON
Hacking Exposed Cisco Networks: Cisco Security Secrets Solutions
Back Cover
About
Foreword
Case Study
Introduction
ALL THE POWER OF HACKING EXPOSED AND MORE
HOW THE BOOK IS ORGANIZED
A FINAL MESSAGE TO OUR READERS
Part I: Foundations
Chapter 1: Cisco Network Design Models and Security Overview
CISCO NETWORK DESIGN MODELS: A SECURITY PERSPECTIVE
CISCO HIERARCHICAL DESIGN AND NETWORK SECURITY
SUMMARY
Chapter 2: Cisco Network Security Elements
COMMON CISCO DEVICE SECURITY FEATURES
CISCO FIREWALLS
CISCO SECURE IDS AND ATTACK PREVENTION
CISCO VPN SOLUTIONS
CISCO AAA AND RELATED SERVICES
SECURITY IMPLICATIONS OF CISCO INTERNETWORK DESIGN AND SECURITY ELEMENTS
SUMMARY
Chapter 3: Real-World Cisco Security Issues
WHY DO HACKERS WANT TO ENABLE YOUR BOX?
CISCO APPLIANCES AND NETWORKS: AN ATTACKER S PERSPECTIVE
CISCO NETWORK DEVICE SECURITY AUDITING AND PENETRATION TESTING FOUNDATIONS
SUMMARY
Part II: I Am Enabled-- Hacking the Box
Chapter 4: Profiling and Enumerating Cisco Networks
ROUTING ENUMERATION
ROUTING DOMAIN NUMBER DISCOVERY AND NETWORK MAPPING FOR IGPS
SUMMARY
Chapter 5: Enumerating and Fingerprinting Cisco Devices
SNIFFING FOR CISCO-SPECIFIC PROTOCOLS
ACTIVE ENUMERATION AND FINGERPRINTING OF CISCO DEVICES
SUMMARY
Chapter 6: Getting In from the Outside--Dead Easy
PASSWORD ATTACKS
SNMP COMMUNITY GUESSING, EXPLOITATION, AND SAFEGUARDS
EXPLOITING TFTP SERVERS TO TAKE OVER CISCO HOSTS
CISCO DEVICE WARDIALING
SUMMARY
Chapter 7: Hacking Cisco Devices--The Intermediate Path
A PRIMER ON PROTOCOL IMPLEMENTATION INVESTIGATION AND ABUSE: CISCO SNMP ATTACKS
A PRIMER ON DATA INPUT VALIDATION ATTACK CISCO HTTP EXPLOITATION
OTHER CISCO HTTPD FLAWS--A MORE SOPHISTICATED APPROACH
SUMMARY
Chapter 8: Cisco IOS Exploitation--The Proper Way
CISCO IOS ARCHITECTURE FOUNDATIONS
AN EXPLOITATION PRIMER: IOS TFTP BUFFER OVERFLOW
THE CURSE AND THE BLESSING OF IOS REVERSE ENGINEERING
IOS FEATURES AND COMMANDS THAT CAN BE (AB)USED BY REVERSE ENGINEERS
A MINIMALISTIC REVERSE ENGINEERING ARSENAL
SUMMARY
Chapter 9: Cracking Secret Keys, Social Engineering, and Malicious Physical Access
CISCO APPLIANCE PASSWORD CRACKING. (cisco network infrastructure)
LOCAL DEVICE ACCESS
SUMMARY
Chapter 10: Exploiting and Preserving Access
COMMON CISCO ROUTER, SWITCH, OR FIREWALL RECONFIGURATIONS BY ATTACKERS
FURTHER IOS EXPLOITATION AND DEVICE ACCESS PRESERVATION
SUMMARY
Chapter 11: Denial of Service Attacks Against Cisco Devices
DOS ATTACK MOTIVES
TYPES OF DOS ATTACKS
CISCO DOS ASSESSMENT TOOLS
WELL-KNOWN CISCO DOS VULNERABILITIES
EXAMPLES OF SPECIFIC DOS ATTACKS AGAINST CATALYST SWITCHES AND OTHER CISCO NETWORKING DEVICES
ABUSING CISCO APPLIANCES FOR NASTY DDOS DEEDS
DDOS MASSIVE: REVENGE OF THE KIDDIES
SUMMARY
Part III: Protocol Exploitation in Cisco Networking Environments
Chapter 12: Spanning Tree, VLANs, EAP-LEAP, and CDP
SPANNING TREE PROTOCOL EXPLOITATION
EXPLOITING VLANS
CISCO EAP-LEAP CRACKING
ATTACKING CDP
SUMMARY
Chapter 13: HSRP, GRE, Firewalls, and VPN Penetration
GRE EXPLOITATION
CISCO FIREWALL PENETRATION
CISCO VPN HACKING
SUMMARY
Chapter 14: Routing Protocols Exploitation
SETTING UP A ROGUE ROUTER
ATTACKING DISTANCE-VECTOR ROUTING PROTOCOLS
ATTACKING LINK STATE ROUTING PROTOCOLS
ATTACKING BGPV4
SUMMARY
Part IV: Appendixes
Appendix A: Network Appliance Security Testing Template
LAYER 3
LAYER 4
LAYERS 5--7
Appendix B: Lab Router Interactive Cisco Auto Secure Configuration Example
Appendix C: Undocumented Cisco Commands
B
C
D
E
F
G
H
I
L
M
N
P
R
S
T
W
X
List of Figures
List of Tables
List of Sidebars
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 0072259175
EAN: 2147483647
Year: 2005
Pages: 117
Authors:
Andrew Vladimirov
,
Konstantin Gavrilenko
,
Andrei Mikhailovsky
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Basic Commands, Variables, and Data Types
Basic Graphics Commands
Programming the Keyboard, Mouse, and Joystick
Loading and Saving Information Using Files
Appendix A Answers to the Chapter Quizzes
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Filling Out Forms
Creating Forms
Setting Form Template and Digital Signing Options
Introducing InfoPath Form Template Projects
Navigating the InfoPath Object Model
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Managing Project Constraints and Documenting Risks
Managing Project Risk
Monitoring and Controlling Risky Projects
Appendix A Selected Detail From the PERIL Database
Lotus Notes and Domino 6 Development (2nd Edition)
Using the Programmers Pane
Using Other Java IDEs
Real-World Java Examples
Creating the Activity
Enabling Database Encryption
Systematic Software Testing (Artech House Computer Library)
The Test Organization
Some Final Thoughts…
Appendix C IEEE Templates
Appendix D Sample Master Test Plan
Appendix E Simplified Unit Test Plan
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Basic Commands to Get Started
Setting Up a Drawing
Using Layers to Organize Your Drawing
Controlling Text in a Drawing
Printing an AutoCAD Drawing
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies