Wednesday, September 5, 2012

Hacking Exposed Cisco Networks



Hacking Exposed Cisco Networks shows you step by step, how hackers target open systems, gain access and steal network is compromised. Any special security issues and network-based devices are covered with concrete examples, in-depth case studies, and detailed countermeasures. It's all here, from the vulnerability of switches, routers, firewalls, wireless and VPN to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You will learn how to prevent the new flaws in Cisco-centered networks are discovered and abused by cyber criminals. In addition, you'll get undocumented Cisco commands, security evaluation templates, and security tools are vital.

Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks.
Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
Find out how IOS exploits are written and if a Cisco router can be used as an attack platform
Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access


Table of content Hacking Exposed Cisco Networks
--------------------------------------------------------------------
Part I - Foundations
Chapter 1: Cisco Network Design Models and Security Overview
Chapter 2: Cisco Network Security Elements
Chapter 3: Real-World Cisco Security Issues

Part II - "I Am Enabled" - Hacking the Box
Chapter 4: Profiling and Enumerating Cisco Networks
Chapter 5: Enumerating and Fingerprinting Cisco Devices
Chapter 6: Getting In from the Outside - Dead Easy
Chapter 7: Hacking Cisco Devices - The Intermediate Path
Chapter 8: Cisco IOS Exploitation - The Proper Way
Chapter 9: Cracking Secret Keys, Social Engineering, and Malicious Physical Access
Chapter 10: Exploiting and Preserving Access
Chapter 11: Denial of Service Attacks Against Cisco Devices

Part III - Protocol Exploitation in Cisco Networking Environments
Chapter 12: Spanning Tree, VLANs, EAP-LEAP, and CDP
Chapter 13: HSRP, GRE, Firewalls, and VPN Penetration
Chapter 14: Routing Protocols Exploitation

Part IV - Appendixes
Appendix A: Network Appliance Security Testing Template 
Appendix B: Lab Router Interactive Cisco Auto Secure Configuration Example 
Appendix C: Undocumented Cisco Commands


Link Dowwnload:

0 comments:

Post a Comment