Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Cisco Networks

Buy
Hacking Exposed Cisco Networks, 9780072259179 (0072259175), McGraw-Hill, 2005

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. It’s all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You’ll prevent tomorrow’s catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, you’ll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.

  • Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks
  • Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
  • Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
  • Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
  • Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
  • Find out how IOS exploits are written and if a Cisco router can be used as an attack platform
  • Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
  • Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access
About the Author

Dr. Andrew A. Vladimirov, CCNP, CCDP, CISSP, CWNA, TIA Linux+, is a co-founder of Arhont Ltd., an international IT security consultancy.

Konstantin V. Gavrilenko, co-founder of Arhont Ltd., has extensive experience working with Cisco PIX firewalls and Cisco VPN concentrators.

Janis N. Vizulus is a researcher and programmer specializing in digital forensics and penetration testing.

Andrei A. Mikhailovsky, co-founder of Arhont Ltd., is an expert in network security and penetration testing

(HTML tags aren't allowed.)

UNIX Filesystems: Evolution, Design, and Implementation
UNIX Filesystems: Evolution, Design, and Implementation
A comprehensive look at the principles, functionality, and implementations of UNIX and Linux® filesystems

Every aspect of a network–storage, file transfers, backup–depends on the filesystem for structure, functionality, and integrity. Surprisingly, UNIX–the operating system of choice for mission-critical networks–has...

Geographic Information Systems and Science
Geographic Information Systems and Science

Geographic Information Systems and Science has become the pre-eminent textbook in its field, for students and practitioners alike. Its unique approach communicates the richness and diversity of GIS in a lucid and accessible format. This fully revised and updated second edition reinforces the view of GIS as a gateway to science and...

Optimizing Sales and Distribution in SAP ERP: Functionality and Configuration
Optimizing Sales and Distribution in SAP ERP: Functionality and Configuration
Any company selling products or services must have the ability to efficiently fulfill orders and deliver their products and services. An integrated sales and distribu tion system enables them to create contracts and agreements, acknowledge order receipt, fulfill orders, and provide accurate invoices. In today's competitive envi...

Beginning Linux Programming, Third Edition
Beginning Linux Programming, Third Edition
If you have some programming experience and are ready to venture into Linux programming, this updated edition of the bestselling entry-level book takes you there. New to this edition are chapters on MySQL® access and administration; programming GNOMETM and KDETM; and Linux...
Face Processing: Advanced Modeling and Methods
Face Processing: Advanced Modeling and Methods
As one of the most important applications of image analysis and understanding, face recognition has recently received significant attention, especially during the past 10 years. There are at least two reasons for this trend: the first is the wide range of commercial and law-enforcement applications, and the second is the availability of feasible...
Microsoft Private Cloud Computing
Microsoft Private Cloud Computing

Learn the foundation of cloud computing and how to build your own Microsoft private cloud

Written by a team of expert authors who are MVPs and leaders in their respective fields, this one-of-a-kind book is an essential resource for IT administrators who are responsible for implementing and managing a cloud infrastructure....

©2021 LearnIT (support@pdfchm.net) - Privacy Policy