Beschreibung:
McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide
Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the provenHacking Exposedmethodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies.
Foreword; Introduction; Part I: Foundations; Chapter 1: Cisco Networking and Security Models Overview; Chapter 2: Real World Cisco Security Issues; Part II: "I am Enabled:" Hacking the Box; Case Study 1: Wrestling for Enable; Case Study 2: Dude, Where is My Money!; Chapter 3: Profiling and Enumerating Cisco Devices; Chapter 4: Getting in From the Outside; Chapter 5: Preserving and Exploiting Access; Chapter 6: Denial of Service Attacks Against Cisco Devices; Part III: Protocol Exploitation in Cisco Networking Environments; Case Study 3: The Labyrinth of Underground Tunnels; Case Study 4: The Flying OSPF Hell; Chapter 7: Hacking Cisco-based Networks; Chapter 8: Routing Protocols-specific Network Exploitation; Part IV: Appendices; Appendix A: Network Device Security Evaluation Template; Appendix B: Source Code of the Phenoelit Group Exploits.