Flylib.com
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 0072259175
EAN: 2147483647
Year: 2005
Pages: 117
Authors:
Andrew Vladimirov
,
Konstantin Gavrilenko
,
Andrei Mikhailovsky
BUY ON AMAZON
Hacking Exposed Cisco Networks: Cisco Security Secrets Solutions
Back Cover
About
Foreword
Case Study
Introduction
ALL THE POWER OF HACKING EXPOSED AND MORE
HOW THE BOOK IS ORGANIZED
A FINAL MESSAGE TO OUR READERS
Part I: Foundations
Chapter 1: Cisco Network Design Models and Security Overview
CISCO NETWORK DESIGN MODELS: A SECURITY PERSPECTIVE
CISCO HIERARCHICAL DESIGN AND NETWORK SECURITY
SUMMARY
Chapter 2: Cisco Network Security Elements
COMMON CISCO DEVICE SECURITY FEATURES
CISCO FIREWALLS
CISCO SECURE IDS AND ATTACK PREVENTION
CISCO VPN SOLUTIONS
CISCO AAA AND RELATED SERVICES
SECURITY IMPLICATIONS OF CISCO INTERNETWORK DESIGN AND SECURITY ELEMENTS
SUMMARY
Chapter 3: Real-World Cisco Security Issues
WHY DO HACKERS WANT TO ENABLE YOUR BOX?
CISCO APPLIANCES AND NETWORKS: AN ATTACKER S PERSPECTIVE
CISCO NETWORK DEVICE SECURITY AUDITING AND PENETRATION TESTING FOUNDATIONS
SUMMARY
Part II: I Am Enabled-- Hacking the Box
Chapter 4: Profiling and Enumerating Cisco Networks
ROUTING ENUMERATION
ROUTING DOMAIN NUMBER DISCOVERY AND NETWORK MAPPING FOR IGPS
SUMMARY
Chapter 5: Enumerating and Fingerprinting Cisco Devices
SNIFFING FOR CISCO-SPECIFIC PROTOCOLS
ACTIVE ENUMERATION AND FINGERPRINTING OF CISCO DEVICES
SUMMARY
Chapter 6: Getting In from the Outside--Dead Easy
PASSWORD ATTACKS
SNMP COMMUNITY GUESSING, EXPLOITATION, AND SAFEGUARDS
EXPLOITING TFTP SERVERS TO TAKE OVER CISCO HOSTS
CISCO DEVICE WARDIALING
SUMMARY
Chapter 7: Hacking Cisco Devices--The Intermediate Path
A PRIMER ON PROTOCOL IMPLEMENTATION INVESTIGATION AND ABUSE: CISCO SNMP ATTACKS
A PRIMER ON DATA INPUT VALIDATION ATTACK CISCO HTTP EXPLOITATION
OTHER CISCO HTTPD FLAWS--A MORE SOPHISTICATED APPROACH
SUMMARY
Chapter 8: Cisco IOS Exploitation--The Proper Way
CISCO IOS ARCHITECTURE FOUNDATIONS
AN EXPLOITATION PRIMER: IOS TFTP BUFFER OVERFLOW
THE CURSE AND THE BLESSING OF IOS REVERSE ENGINEERING
IOS FEATURES AND COMMANDS THAT CAN BE (AB)USED BY REVERSE ENGINEERS
A MINIMALISTIC REVERSE ENGINEERING ARSENAL
SUMMARY
Chapter 9: Cracking Secret Keys, Social Engineering, and Malicious Physical Access
CISCO APPLIANCE PASSWORD CRACKING. (cisco network infrastructure)
LOCAL DEVICE ACCESS
SUMMARY
Chapter 10: Exploiting and Preserving Access
COMMON CISCO ROUTER, SWITCH, OR FIREWALL RECONFIGURATIONS BY ATTACKERS
FURTHER IOS EXPLOITATION AND DEVICE ACCESS PRESERVATION
SUMMARY
Chapter 11: Denial of Service Attacks Against Cisco Devices
DOS ATTACK MOTIVES
TYPES OF DOS ATTACKS
CISCO DOS ASSESSMENT TOOLS
WELL-KNOWN CISCO DOS VULNERABILITIES
EXAMPLES OF SPECIFIC DOS ATTACKS AGAINST CATALYST SWITCHES AND OTHER CISCO NETWORKING DEVICES
ABUSING CISCO APPLIANCES FOR NASTY DDOS DEEDS
DDOS MASSIVE: REVENGE OF THE KIDDIES
SUMMARY
Part III: Protocol Exploitation in Cisco Networking Environments
Chapter 12: Spanning Tree, VLANs, EAP-LEAP, and CDP
SPANNING TREE PROTOCOL EXPLOITATION
EXPLOITING VLANS
CISCO EAP-LEAP CRACKING
ATTACKING CDP
SUMMARY
Chapter 13: HSRP, GRE, Firewalls, and VPN Penetration
GRE EXPLOITATION
CISCO FIREWALL PENETRATION
CISCO VPN HACKING
SUMMARY
Chapter 14: Routing Protocols Exploitation
SETTING UP A ROGUE ROUTER
ATTACKING DISTANCE-VECTOR ROUTING PROTOCOLS
ATTACKING LINK STATE ROUTING PROTOCOLS
ATTACKING BGPV4
SUMMARY
Part IV: Appendixes
Appendix A: Network Appliance Security Testing Template
LAYER 3
LAYER 4
LAYERS 5--7
Appendix B: Lab Router Interactive Cisco Auto Secure Configuration Example
Appendix C: Undocumented Cisco Commands
B
C
D
E
F
G
H
I
L
M
N
P
R
S
T
W
X
List of Figures
List of Tables
List of Sidebars
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 0072259175
EAN: 2147483647
Year: 2005
Pages: 117
Authors:
Andrew Vladimirov
,
Konstantin Gavrilenko
,
Andrei Mikhailovsky
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Using a Web Service as a Data Source
Binding a Group of Radio Buttons in a Windows Form
Improving DataReader Performance with Typed Accessors
Listing Tables in an Access Database
Listing Installed ODBC Drivers
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
Optimizing: The Crystal Reports Side
Optimizing: The Oracle Side
Data Dictionary Report
The Crystal Repository
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Assessing Business-IT Alignment Maturity
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Measuring ROI in E-Commerce Applications: Analysis to Action
Governing Information Technology Through COBIT
Cisco IOS Cookbook (Cookbooks (OReilly))
Classical IP Over ATM
Logging Unauthorized SNMP Attempts
Configuring Basic Multicast Functionality with PIM-DM
Configuring Routing for a Low-Frequency Multicast Application
Automatically Generating IPv6 Addresses for an Interface
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
Tcpdump
Internet Security Systems RealSecure
Policy and Procedures
The Future of Intrusion Detection and Prevention
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Using Start and End Dates with CronTrigger
Using Multiple Plug-Ins
Testing the RMI Server and Client
Using Quartz with the Struts Framework
Configuring JobStore Settings
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies