Hacking Exposed Cisco Networks
Samenvatting
Implement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. 'Hacking Exposed Cisco Networks' shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. It's all here-from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You'll prevent tomorrow's catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, you'll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.
- Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks 
- Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning 
- Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels 
- Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities 
- Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers 
- Find out how IOS exploits are written and if a Cisco router can be used as an attack platform 
- Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR 
- Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access
Specificaties
Inhoudsopgave
Case study: The black hat hassle
Acknowledgements
Introduction
Part 1: Foundations
1. Cisco network design models and security overview
2. Cisco network security elements
3. Real-world Cisco security issues
Part 2: 'I am enabled': Hacking the box
4. Profiling and enumerating Cisco networks
5. Enumerating and fingerprinting Cisco Devices
6. Getting in from the outside: dead easy
7. Hacking Cisco devices: The intermediate path
8. Cisco IOS exploitation: The proper way
9. Cracking Secrets keys, social engineering, and malicious physical access
10. Exploiting and preserving Access
11. Denial of service attacks against Cisco devices
Part 3: Protocol exploitation in Cisco networking environments
12. Spanning Tree, VLANs, EAP-LEAP, and CDP
13. HSRP, GRE, Firewalls, and VPN penetration
14. Routing protocols exploitation
Appendixes
A: Network appliance security testing template
B: Lab router interactive Cisco auto secure configuration example
C: Undocumented Cisco commands
Index
Anderen die dit boek kochten, kochten ook
Net verschenen
Rubrieken
- aanbestedingsrecht
 - aansprakelijkheids- en verzekeringsrecht
 - accountancy
 - algemeen juridisch
 - arbeidsrecht
 - bank- en effectenrecht
 - bestuursrecht
 - bouwrecht
 - burgerlijk recht en procesrecht
 - europees-internationaal recht
 - fiscaal recht
 - gezondheidsrecht
 - insolventierecht
 - intellectuele eigendom en ict-recht
 - management
 - mens en maatschappij
 - milieu- en omgevingsrecht
 - notarieel recht
 - ondernemingsrecht
 - pensioenrecht
 - personen- en familierecht
 - sociale zekerheidsrecht
 - staatsrecht
 - strafrecht en criminologie
 - vastgoed- en huurrecht
 - vreemdelingenrecht
 

