Flylib.com
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 0072259175
EAN: 2147483647
Year: 2005
Pages: 117
Authors:
Andrew Vladimirov
,
Konstantin Gavrilenko
,
Andrei Mikhailovsky
BUY ON AMAZON
Hacking Exposed Cisco Networks: Cisco Security Secrets Solutions
Back Cover
About
Foreword
Case Study
Introduction
ALL THE POWER OF HACKING EXPOSED AND MORE
HOW THE BOOK IS ORGANIZED
A FINAL MESSAGE TO OUR READERS
Part I: Foundations
Chapter 1: Cisco Network Design Models and Security Overview
CISCO NETWORK DESIGN MODELS: A SECURITY PERSPECTIVE
CISCO HIERARCHICAL DESIGN AND NETWORK SECURITY
SUMMARY
Chapter 2: Cisco Network Security Elements
COMMON CISCO DEVICE SECURITY FEATURES
CISCO FIREWALLS
CISCO SECURE IDS AND ATTACK PREVENTION
CISCO VPN SOLUTIONS
CISCO AAA AND RELATED SERVICES
SECURITY IMPLICATIONS OF CISCO INTERNETWORK DESIGN AND SECURITY ELEMENTS
SUMMARY
Chapter 3: Real-World Cisco Security Issues
WHY DO HACKERS WANT TO ENABLE YOUR BOX?
CISCO APPLIANCES AND NETWORKS: AN ATTACKER S PERSPECTIVE
CISCO NETWORK DEVICE SECURITY AUDITING AND PENETRATION TESTING FOUNDATIONS
SUMMARY
Part II: I Am Enabled-- Hacking the Box
Chapter 4: Profiling and Enumerating Cisco Networks
ROUTING ENUMERATION
ROUTING DOMAIN NUMBER DISCOVERY AND NETWORK MAPPING FOR IGPS
SUMMARY
Chapter 5: Enumerating and Fingerprinting Cisco Devices
SNIFFING FOR CISCO-SPECIFIC PROTOCOLS
ACTIVE ENUMERATION AND FINGERPRINTING OF CISCO DEVICES
SUMMARY
Chapter 6: Getting In from the Outside--Dead Easy
PASSWORD ATTACKS
SNMP COMMUNITY GUESSING, EXPLOITATION, AND SAFEGUARDS
EXPLOITING TFTP SERVERS TO TAKE OVER CISCO HOSTS
CISCO DEVICE WARDIALING
SUMMARY
Chapter 7: Hacking Cisco Devices--The Intermediate Path
A PRIMER ON PROTOCOL IMPLEMENTATION INVESTIGATION AND ABUSE: CISCO SNMP ATTACKS
A PRIMER ON DATA INPUT VALIDATION ATTACK CISCO HTTP EXPLOITATION
OTHER CISCO HTTPD FLAWS--A MORE SOPHISTICATED APPROACH
SUMMARY
Chapter 8: Cisco IOS Exploitation--The Proper Way
CISCO IOS ARCHITECTURE FOUNDATIONS
AN EXPLOITATION PRIMER: IOS TFTP BUFFER OVERFLOW
THE CURSE AND THE BLESSING OF IOS REVERSE ENGINEERING
IOS FEATURES AND COMMANDS THAT CAN BE (AB)USED BY REVERSE ENGINEERS
A MINIMALISTIC REVERSE ENGINEERING ARSENAL
SUMMARY
Chapter 9: Cracking Secret Keys, Social Engineering, and Malicious Physical Access
CISCO APPLIANCE PASSWORD CRACKING. (cisco network infrastructure)
LOCAL DEVICE ACCESS
SUMMARY
Chapter 10: Exploiting and Preserving Access
COMMON CISCO ROUTER, SWITCH, OR FIREWALL RECONFIGURATIONS BY ATTACKERS
FURTHER IOS EXPLOITATION AND DEVICE ACCESS PRESERVATION
SUMMARY
Chapter 11: Denial of Service Attacks Against Cisco Devices
DOS ATTACK MOTIVES
TYPES OF DOS ATTACKS
CISCO DOS ASSESSMENT TOOLS
WELL-KNOWN CISCO DOS VULNERABILITIES
EXAMPLES OF SPECIFIC DOS ATTACKS AGAINST CATALYST SWITCHES AND OTHER CISCO NETWORKING DEVICES
ABUSING CISCO APPLIANCES FOR NASTY DDOS DEEDS
DDOS MASSIVE: REVENGE OF THE KIDDIES
SUMMARY
Part III: Protocol Exploitation in Cisco Networking Environments
Chapter 12: Spanning Tree, VLANs, EAP-LEAP, and CDP
SPANNING TREE PROTOCOL EXPLOITATION
EXPLOITING VLANS
CISCO EAP-LEAP CRACKING
ATTACKING CDP
SUMMARY
Chapter 13: HSRP, GRE, Firewalls, and VPN Penetration
GRE EXPLOITATION
CISCO FIREWALL PENETRATION
CISCO VPN HACKING
SUMMARY
Chapter 14: Routing Protocols Exploitation
SETTING UP A ROGUE ROUTER
ATTACKING DISTANCE-VECTOR ROUTING PROTOCOLS
ATTACKING LINK STATE ROUTING PROTOCOLS
ATTACKING BGPV4
SUMMARY
Part IV: Appendixes
Appendix A: Network Appliance Security Testing Template
LAYER 3
LAYER 4
LAYERS 5--7
Appendix B: Lab Router Interactive Cisco Auto Secure Configuration Example
Appendix C: Undocumented Cisco Commands
B
C
D
E
F
G
H
I
L
M
N
P
R
S
T
W
X
List of Figures
List of Tables
List of Sidebars
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 0072259175
EAN: 2147483647
Year: 2005
Pages: 117
Authors:
Andrew Vladimirov
,
Konstantin Gavrilenko
,
Andrei Mikhailovsky
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Using the Data Link Properties Dialog Box
Retrieving and Managing Data
Binding Complex Data to Web Forms Controls
Editing and Updating Data in a Web Forms DataGrid
Getting SQL Server Column Metadata Without Returning Data
Qshell for iSeries
Running Qshell
Parameters and Variables, Defined
Input and Output
Functions
The Perl Utility
Systematic Software Testing (Artech House Computer Library)
Master Test Planning
Detailed Test Planning
Test Execution
The Test Organization
Appendix E Simplified Unit Test Plan
Developing Tablet PC Applications (Charles River Media Programming)
Obtaining the Tablet PC SDK
Tablet PC Screen Rotation and Special Buttons
Form Effects
Using Gestures to Control Tablet Media Player
Storing Ink in a Database
Managing Enterprise Systems with the Windows Script Host
Logon Scripts and Scheduling
Regular Expressions
Application Automation
Internet Applications
System Administration
Microsoft VBScript Professional Projects
VBScript Objects
Customizing the Start Menu and Quick Launch Toolbar
Archive Management
Building the Report Archive Page
Report Distribution and Remote Archive Management
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies