Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Cisco Networks

Buy
Hacking Exposed Cisco Networks, 9780072259179 (0072259175), McGraw-Hill, 2005

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. It’s all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You’ll prevent tomorrow’s catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, you’ll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.

  • Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks
  • Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
  • Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
  • Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
  • Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
  • Find out how IOS exploits are written and if a Cisco router can be used as an attack platform
  • Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
  • Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access
About the Author

Dr. Andrew A. Vladimirov, CCNP, CCDP, CISSP, CWNA, TIA Linux+, is a co-founder of Arhont Ltd., an international IT security consultancy.

Konstantin V. Gavrilenko, co-founder of Arhont Ltd., has extensive experience working with Cisco PIX firewalls and Cisco VPN concentrators.

Janis N. Vizulus is a researcher and programmer specializing in digital forensics and penetration testing.

Andrei A. Mikhailovsky, co-founder of Arhont Ltd., is an expert in network security and penetration testing

(HTML tags aren't allowed.)

The Language of SQL: How to Access Data in Relational Databases
The Language of SQL: How to Access Data in Relational Databases

Most SQL texts attempt to serve as an encyclopedic reference on SQL syntax -- an approach that is counterproductive, since this information is readily available in online references published by the major database vendors. For SQL beginners, it's more important for a book to focus on general concepts and offer clear explanations and...

ACE the IT Resume
ACE the IT Resume

Create a first-rate resume that will get you hired in IT 

Stand out in a crowd of IT job applicants by creating and submitting a winning resume and cover letter with help from this practical guide. Fully revised and updated for the latest trends, technologies, and in-demand jobs, Ace the IT Resume, Second...

Information, Physics, and Computation (Oxford Graduate Texts)
Information, Physics, and Computation (Oxford Graduate Texts)

This book presents a unified approach to a rich and rapidly evolving research domain at the interface between statistical physics, theoretical computer science/discrete mathematics, and coding/information theory. It is accessible to graduate students and researchers without a specific training in any of these fields. The selected topics...


Professional .NET Framework 2.0 (Programmer to Programmer)
Professional .NET Framework 2.0 (Programmer to Programmer)
As the .NET Framework and Common Language Runtime (CLR) continue to mature in terms of platform adoption, robustness, reliability, and feature richness, developers have an increasing need to understand the foundation on top of which all managed code runs. This book looks at the underlying platform commonalities that all developers can use,...
The Art and Business of Speech Recognition: Creating the Noble Voice
The Art and Business of Speech Recognition: Creating the Noble Voice
Most people have experienced an automated speech-recognition system when calling a company. Instead of prompting callers to choose an option by entering numbers, the system asks questions and understands spoken responses. With a more advanced application, callers may feel as if they're having a conversation with another person. Not only will the...
Practical LEGO Technics: Bring Your LEGO Creations to Life (Technology in Action)
Practical LEGO Technics: Bring Your LEGO Creations to Life (Technology in Action)

You already know you can create amazing things with LEGO, but did you know you can also make vehicles that roll and model plans that include landing gear and flaps that actually extend and retract? You can even make functional robots without getting into Mindstorms and programming. In Practical LEGO Technics, Mark...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy