Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Cisco Networks

Buy
Hacking Exposed Cisco Networks, 9780072259179 (0072259175), McGraw-Hill, 2005

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. It’s all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You’ll prevent tomorrow’s catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, you’ll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.

  • Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks
  • Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
  • Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
  • Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
  • Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
  • Find out how IOS exploits are written and if a Cisco router can be used as an attack platform
  • Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
  • Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access
About the Author

Dr. Andrew A. Vladimirov, CCNP, CCDP, CISSP, CWNA, TIA Linux+, is a co-founder of Arhont Ltd., an international IT security consultancy.

Konstantin V. Gavrilenko, co-founder of Arhont Ltd., has extensive experience working with Cisco PIX firewalls and Cisco VPN concentrators.

Janis N. Vizulus is a researcher and programmer specializing in digital forensics and penetration testing.

Andrei A. Mikhailovsky, co-founder of Arhont Ltd., is an expert in network security and penetration testing

(HTML tags aren't allowed.)

C++ Programming: Program Design Including Data Structures
C++ Programming: Program Design Including Data Structures
WELCOME TO THE FIFTH EDITION OF C++ Programming: Program Design Including Data Structures. Designed for a two semester (CS1 and CS2) C++ course, this text will provide a breath of fresh air to you and your students. The CS1 and CS2 courses serve as the cornerstone of the Computer Science curriculum. My primary goal is to motivate...
CEH: Certified Ethical Hacker Version 8 Study Guide
CEH: Certified Ethical Hacker Version 8 Study Guide

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide

Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that...

Testing with Junit
Testing with Junit

Master high quality software development driven by unit tests

About This Book

  • Design and implement robust system components by means of the de facto unit testing standard in Java
  • Reduce defect rate and maintenance effort, plus simultaneously increase code quality and development pace
  • ...

Optimization in Medicine and Biology (Engineering and Management Innovation)
Optimization in Medicine and Biology (Engineering and Management Innovation)

Thanks to recent advancements, optimization is now recognized as a crucial component in research and decision-making across a number of fields. Through optimization, scientists have made tremendous advances in cancer treatment planning, disease control, and drug development, as well as in sequencing DNA, and identifying protein...

XML for Data Architects: Designing for Reuse and Integration
XML for Data Architects: Designing for Reuse and Integration

XML is a tremendous enabler for platform agnostic data and metadata exchanges. However, there are no clear processes and techniques specifically focused on the engineering of XML structures to support reuse and integration simplicity, which are of particular importance in the age of application integration and Web services. This book describes...

Advanced 3D Game Programming All in One
Advanced 3D Game Programming All in One
Take your 3D game programming skills to the next level! "Advanced 3D Game Programming All in One" uses the Torque Game Engine to teach experienced 3D game programmers advanced concepts. You'll use the Torque Game Engine to learn each new skill, maximizing your game engine experience. Quickly conquer TorqueScript, simulation techniques,...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy