๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Hacking exposed Cisco networks: Cisco security secrets & solutions

โœ Scribed by Vladimirov, Andrew A


Publisher
McGraw-Hill;Osborne
Year
2006
Tongue
English
Leaves
650
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Foreword
Introduction
Part I: Foundations
Chapter 1: Cisco Networking and Security Models Overview
Chapter 2: Real World Cisco Security Issues
Part II: "I am Enabled:" Hacking the Box
Case Study 1: Wrestling for Enable
Case Study 2: Dude, Where is My Money!
Chapter 3: Profiling and Enumerating Cisco Devices
Chapter 4: Getting in From the Outside
Chapter 5: Preserving and Exploiting Access
Chapter 6: Denial of Service Attacks Against Cisco Devices
Part III: Protocol Exploitation in Cisco Networking Environments
Case Study 3: The Labyrinth of Underground Tunnels
Case Study 4: The Flying OSPF Hell
Chapter 7: Hacking Cisco-based Networks
Chapter 8: Routing Protocols-specific Network Exploitation
Part IV: Appendices
Appendix A: Network Device Security Evaluation Template
Appendix B: Source Code of the Phenoelit Group Exploits.

โœฆ Subjects


COMPUTERS--Internet--Security;COMPUTERS--Networking--Security;COMPUTERS--Security--General;Computer networks--Security measures;Data protection;Electronic books;Computer networks -- Security measures;COMPUTERS -- Internet -- Security;COMPUTERS -- Networking -- Security;COMPUTERS -- Security -- General


๐Ÿ“œ SIMILAR VOLUMES


Hacking exposed Cisco networks: Cisco se
โœ Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› McGraw-Hill/Osborne ๐ŸŒ English

Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers devi

Hacking Exposed: Network Security Secret
โœ Stuart McClure, Joel Scambray, George Kurtz ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Osborne/McGraw-Hill ๐ŸŒ English

The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET

Hacking Exposed: Network Security Secret
โœ Jean Letessier, Johann Rafelski ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Osborne/McGraw-Hill ๐ŸŒ English

The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET

Hacking Exposed: Network Security Secret
โœ Scambray, Joel;McClure, Stuart;Kurtz, George ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐ŸŒ English

The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET

Hacking Exposed: Network Security Secret
โœ Stuart McClure, Joel Scambray, George Kurtz ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Osborne/McGraw-Hill ๐ŸŒ English

PROS: It covers lots of, if not all information on either protecting your business from hackers, or if you ARE the hacker just trying to learn a few little tricks. CONS: Requires a bit of previous knowledge of how network security works, for example, a lot computer jargon.