Hacking Exposed Cisco Networks - Cisco Security Secrets & Solutions by A Vladimirov, K Gavrilenko A Mikhailovsky.pdf

(5085 KB) Pobierz
Hacking Exposed Cisco Networks: Cisco Security
Secrets & Solutions
by Andrew A. Vladimirov, Konstantin V. Gavrilenko,
Janis N. Vizulis and Andrei A. Mikhailovsky
McGraw-Hill/Osborne
�½�
2006 (648 pages)
ISBN:0072259175
Defend against the sneakiest attacks by looking at
your C isco network through the eyes of the intruder.
With the help of this step-by-step guide, you値l prevent
catastrophes by learning how new flaws in C isco-
centered networks are discovered and abused.
Table of Contents
Hacking Exposed C isco Networks—C isco Security
Secrets & Solutions
Foreword
C ase Study
Introduction
Part I - Foundations
C hapter 1
C hapter 2
C hapter 3
-
C isco Network Design Models and
Security Overview
- C isco Network Security Elements
- Real-World C isco Security Issues
Profiling and Enumerating C isco
Networks
Part II - "I A m Enabled" —Hacking the Box
C hapter 4
-
C hapter 5
C hapter 6
C hapter 7
C hapter 8
C hapter 9
- Enumerating and Fingerprinting C isco
Devices
- Getting In from the Outside—Dead Easy
-
Hacking C isco Devices—The
Intermediate Path
- C isco IOS Exploitation—The Proper Way
C racking Secret Keys, Social
- Engineering, and Malicious Physical
Access
C hapter 10
- Exploiting and Preserving Access
C hapter 11
- Denial of Service Attacks Against C isco
Devices
Part III - Protocol Exploitation in Cisco Networking
Environments
C hapter 12
-
C hapter 13
-
Spanning Tree, VLANs, EAP-LEAP, and
C DP
HSRP, GRE, Firewalls, and VPN
Penetration
C hapter 14
- Routing Protocols Exploitation
Part IV - A ppendixes
Appendix A
-
Appendix B
-
Network Appliance Security Testing
Template
Lab Router Interactive C isco Auto
Secure C onfiguration Example
Appendix C
- Undocumented C isco C ommands
List of Figures
List of Tables
List of Sidebars
Zgłoś jeśli naruszono regulamin