Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Cisco Networks

Buy
Hacking Exposed Cisco Networks, 9780072259179 (0072259175), McGraw-Hill, 2005

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. It’s all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You’ll prevent tomorrow’s catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, you’ll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.

  • Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks
  • Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
  • Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
  • Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
  • Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
  • Find out how IOS exploits are written and if a Cisco router can be used as an attack platform
  • Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
  • Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access
About the Author

Dr. Andrew A. Vladimirov, CCNP, CCDP, CISSP, CWNA, TIA Linux+, is a co-founder of Arhont Ltd., an international IT security consultancy.

Konstantin V. Gavrilenko, co-founder of Arhont Ltd., has extensive experience working with Cisco PIX firewalls and Cisco VPN concentrators.

Janis N. Vizulus is a researcher and programmer specializing in digital forensics and penetration testing.

Andrei A. Mikhailovsky, co-founder of Arhont Ltd., is an expert in network security and penetration testing

(HTML tags aren't allowed.)

PAINTING FOR PHOTOGRAPHERS
PAINTING FOR PHOTOGRAPHERS

I was listening in the car to an audio CD of the book, Success through a Positive Mental Attitude, by Napoleon Hill and W. Clement Stone, when an amazing thing happened. I heard these words: “If you think you can do something, you probably can.”Incredible! I have said that in my Artistry Painting for Photographers Retreats to...

Strategic Data Warehousing: Achieving Alignment with Business
Strategic Data Warehousing: Achieving Alignment with Business
Strategic Data Warehousing: Achieving Alignment with Business provides an integrated approach to achieving successful and sustainable alignment of data warehouses and business goals. It details the roles and responsibilities of the data warehouse and business managers in achieving strategic alignment, technical integration, and...
Electronic Materials Science
Electronic Materials Science
Starting in the 1960s the field of materials science has undergone significant changes,
from a field derived largely from well-established disciplines of metallurgy and ceramics
to a field that includes microelectronics, polymers, biomaterials, and nanotechnology. The
stringent materials requirements, such as extreme purity, perfect
...

Windows Server 2012 Unified Remote Access Planning and Deployment
Windows Server 2012 Unified Remote Access Planning and Deployment

DirectAccess, introduced in Windows Server 2008 R2, has been a ground breaking VPN-like connectivity solution, adopted by thousands of organizations worldwide. Allowing organizations to deploy without manually configuring every client and providing always-on connectivity has made this technology world-famous. Now, with Windows Server 2012,...

Routing Congestion in VLSI Circuits: Estimation and Optimization (Integrated Circuits and Systems)
Routing Congestion in VLSI Circuits: Estimation and Optimization (Integrated Circuits and Systems)
With the dramatic increases in on-chip packing densities, routing congestion has become a major problem in chip design. The problem is especially acute as interconnects are also the performance bottleneck in integrated circuits. The solution lies in judicious resource management. This involves intelligent allocation of the available interconnect...
50 Math and Science Games for Leadership
50 Math and Science Games for Leadership

Did you like Math or Science in school? Have you played games that stimulated your thought processes for Math and Science? Trying to be creative in your Math, Science or leadership class? Can leadership be taught? Is leadership an Art or a Science or Math? Seeking to impact your training program with creative games? A primer for leadership...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy