This page was exported from Free Cisco Training & Resources - Certification Exam Preparation [ https://www.ciscobibles.com ] Export date:Tue Mar 4 21:57:50 2025 / +0000 GMT ___________________________________________________ Title: CiscoPress - Hacking Exposed Cisco Networks Cisco Security Secrets & Solutions --------------------------------------------------- Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies. From the Back Cover: Implement bulletproof Cisco security the battle-testedHacking Exposed way Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. It's all hereā€“from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You'll prevent tomorrow's catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, you'll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com. * Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks * Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning * Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels * Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities * Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers * Find out how IOS exploits are written and if a Cisco router can be used as an attack platform * Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR * Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access Download | Size: 9.80 MB [This hidden content is only available for our VIP member]. Become VIP Member NOW --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2010-06-30 16:15:08 Post date GMT: 2010-06-30 08:15:08 Post modified date: 2010-07-21 19:30:16 Post modified date GMT: 2010-07-21 11:30:16 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com