lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <43A82BC6.2060101@arhont.com>
Date: Tue Dec 20 16:00:36 2005
From: mlists at arhont.com (Konstantin V. Gavrilenko)
Subject: Hacking Exposed Cisco Networks

Hi List,


"Hacking Exposed Cisco Networks" was officially released yesterday. In 
the next couple of weeks it should be available in the shops. In the 
meantime you can download a sample chapter, get additional info about 
the book and download related tools from the book's official web page.

http://www.hackingciscoexposed.com/




------The book outline------

Defend against the sneakiest attacks by looking at your Cisco network 
and devices through the eyes of the intruder. Hacking Exposed Cisco 
Networks shows you, step-by-step, how hackers target exposed systems, 
gain access, and pilfer compromised networks. All device-specific and 
network-centered security issues are covered alongside real-world 
examples, in-depth case studies, and detailed countermeasures. It's all 
here: from switch, router, firewall, wireless, and VPN vulnerabilities 
to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. 
You'll prevent tomorrow's catastrophe by learning how new flaws in 
Cisco-centered networks are discovered and abused by cyber-criminals.

* Use the tried-and-true Hacking Exposed methodology to find, exploit, 
and plug security holes in Cisco devices and networks
* Locate vulnerable Cisco networks using Google and BGP queries, 
wardialing, fuzzing, host fingerprinting, and portscanning
* Gain network access using password and SNMP community guessing, Telnet 
session hijacking, and searching for open TFTP servers
* Use blackbox testing to uncover data input validation errors, hidden 
backdoors, HTTP, and SNMP vulnerabilities
* Find out how IOS exploits are currently written and whether an 
attacker can insert malicious code into the IOS binary itself and use 
Cisco router as an attack platform
* Block determined DoS and DDoS attacks using Cisco proprietary 
safeguards, CAR, and NBAR
* Prevent secret keys cracking, sneaky data link attacks, routing 
protocol exploits, and malicious physical access
* Abuse Cisco failover protocols, punch holes in firewalls, and break 
into VPN tunnels


I hope you enjoy the read.


-- 
Respectfully,
Konstantin V. Gavrilenko

Arhont Ltd - Information Security

web:    http://www.arhont.com
         http://www.wi-foo.com
	e-mail: k.gavrilenko@...ont.com

	tel: +44 (0) 870 44 31337
	fax: +44 (0) 117 969 0141

	PGP: Key ID - 0x4F3608F7
	PGP: Server - keyserver.pgp.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ