Table of Contents |
| Hacking Exposed Cisco Networks ”Cisco Security Secrets & Solutions |
| Foreword |
| Case Study |
| Introduction |
Part I - Foundations |
| Chapter 1 | - | Cisco Network Design Models and Security Overview |
| Chapter 2 | - | Cisco Network Security Elements |
| Chapter 3 | - | Real-World Cisco Security Issues |
Part II - "I Am Enabled" ”Hacking the Box |
| Chapter 4 | - | Profiling and Enumerating Cisco Networks |
| Chapter 5 | - | Enumerating and Fingerprinting Cisco Devices |
| Chapter 6 | - | Getting In from the Outside ”Dead Easy |
| Chapter 7 | - | Hacking Cisco Devices ”The Intermediate Path |
| Chapter 8 | - | Cisco IOS Exploitation ”The Proper Way |
| Chapter 9 | - | Cracking Secret Keys, Social Engineering, and Malicious Physical Access |
| Chapter 10 | - | Exploiting and Preserving Access |
| Chapter 11 | - | Denial of Service Attacks Against Cisco Devices |
Part III - Protocol Exploitation in Cisco Networking Environments |
| Chapter 12 | - | Spanning Tree, VLANs, EAP-LEAP, and CDP |
| Chapter 13 | - | HSRP, GRE, Firewalls, and VPN Penetration |
| Chapter 14 | - | Routing Protocols Exploitation |
Part IV - Appendixes |
| Appendix A | - | Network Appliance Security Testing Template |
| Appendix B | - | Lab Router Interactive Cisco Auto Secure Configuration Example |
| Appendix C | - | Undocumented Cisco Commands |
| List of Figures |
| List of Tables |
| List of Sidebars |