找回密码
 注册
搜索
热搜: java php web
查看: 806|回复: 5

Hacking Exposed Cisco Networks

[复制链接]
发表于 2009-9-9 17:28:39 | 显示全部楼层 |阅读模式


作者:Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky
出版日期:December 15, 2005
出版社:McGraw-Hill
页数:400
ISBN:ISBN-10: 0072259175 ISBN-13: 978-0072259179
文件格式:CHM


Product Description
Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposedmethodology, this book shows you how to locate and patch systemvulnerabilities by looking at your Cisco network through the eyes of ahacker. The book covers device-specific and network-centered attacksand defenses and offers real-world case studies.
From the Back Cover
Implement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networksshows you, step-by-step, how hackers target exposed systems, gainaccess, and pilfer compromised networks. All device-specific andnetwork-centered security issues are covered alongside real-worldexamples, in-depth case studies, and detailed countermeasures. It’s allhere–from switch, router, firewall, wireless, and VPN vulnerabilitiesto Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks.You’ll prevent tomorrow’s catastrophe by learning how new flaws inCisco-centered networks are discovered and abused by cyber-criminals.Plus, you’ll get undocumented Cisco commands, security evaluationtemplates, and vital security tools from hackingexposedcisco.com.
  • Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks
  • Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
  • Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
  • Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
  • Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
  • Find out how IOS exploits are written and if a Cisco router can be used as an attack platform
  • Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
  • Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册

×
发表于 2009-11-16 03:50:56 | 显示全部楼层
1# 石头 感谢分享

评分

1

查看全部评分

回复

使用道具 举报

发表于 2009-12-17 10:34:50 | 显示全部楼层
非常感谢
回复

使用道具 举报

发表于 2010-5-13 01:42:22 | 显示全部楼层
非常感谢
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|软晨网(RuanChen.com)

GMT+8, 2024-11-22 19:50

Powered by Discuz! X3.5

Copyright © 2001-2023 Tencent Cloud.

快速回复 返回顶部 返回列表