Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers devi
Hacking exposed Cisco networks: Cisco security secrets & solutions
โ Scribed by Vladimirov, Andrew A
- Publisher
- McGraw-Hill;Osborne
- Year
- 2006
- Tongue
- English
- Leaves
- 650
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Foreword
Introduction
Part I: Foundations
Chapter 1: Cisco Networking and Security Models Overview
Chapter 2: Real World Cisco Security Issues
Part II: "I am Enabled:" Hacking the Box
Case Study 1: Wrestling for Enable
Case Study 2: Dude, Where is My Money!
Chapter 3: Profiling and Enumerating Cisco Devices
Chapter 4: Getting in From the Outside
Chapter 5: Preserving and Exploiting Access
Chapter 6: Denial of Service Attacks Against Cisco Devices
Part III: Protocol Exploitation in Cisco Networking Environments
Case Study 3: The Labyrinth of Underground Tunnels
Case Study 4: The Flying OSPF Hell
Chapter 7: Hacking Cisco-based Networks
Chapter 8: Routing Protocols-specific Network Exploitation
Part IV: Appendices
Appendix A: Network Device Security Evaluation Template
Appendix B: Source Code of the Phenoelit Group Exploits.
โฆ Subjects
COMPUTERS--Internet--Security;COMPUTERS--Networking--Security;COMPUTERS--Security--General;Computer networks--Security measures;Data protection;Electronic books;Computer networks -- Security measures;COMPUTERS -- Internet -- Security;COMPUTERS -- Networking -- Security;COMPUTERS -- Security -- General
๐ SIMILAR VOLUMES
The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET
The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET
This is one of those books that needs to be at every Security Professional's desk. It is a good reference to security attacks, exploits, and general security concepts.
The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET
PROS: It covers lots of, if not all information on either protecting your business from hackers, or if you ARE the hacker just trying to learn a few little tricks. CONS: Requires a bit of previous knowledge of how network security works, for example, a lot computer jargon.