Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions

Case Study

CASE STUDY: THE BLACK HAT HASSLE

Part I: Foundations

CASE STUDY: EBAY SURPRISE

Chapter 2: Cisco Network Security Elements

Disable Signatures to Avoid Overflooding Logs

Part II: "I Am Enabled"Hacking the Box

CASE STUDY: THE ONE WITH A NESSUS REPORT

Chapter 8: Cisco IOS ExploitationThe Proper Way

Lessons from Michael Lynn's Black Hat Presentation

Part III: Protocol Exploitation in Cisco Networking Environments

CASE STUDY: THE FLYING OSPF HELL

Chapter 14: Routing Protocols Exploitation

Which OSPF Router to Attack

Part IV: Appendixes

CASE STUDY: THE EPIC BATTLE

Категории