[内容简介]
Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies.
[目次]
Foreword; Introduction;
Part I: Foundations;
Chapter 1: Cisco Networking and Security Models Overview;
Chapter 2: Real World Cisco Security Issues;
Part II: "I am Enabled:" Hacking the Box; Case Study
1: Wrestling for Enable; Case Study
2: Dude, Where is My Money!; Chapter
3: Profiling and Enumerating Cisco Devices; Chapter
4: Getting in From the Outside; Chapter
5: Preserving and Exploiting Access; Chapter
6: Denial of Service Attacks Against Cisco Devices;
Part III: Protocol Exploitation in Cisco Networking Environments; Case Study
3: The Labyrinth of Underground Tunnels; Case Study
4: The Flying OSPF Hell; Chapter
7: Hacking Cisco-based Networks; Chapter
8: Routing Protocols-specific Network Exploitation;
Part IV: Appendices; Appendix A: Network Device Security Evaluation Template; Appendix B: Source Code of the Phenoelit Group Exploits.