Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
| ||
| ||
|
Case Study
- CASE STUDY: THE BLACK HAT HASSLE
Part I: Foundations
- CASE STUDY: EBAY SURPRISE
Chapter 2: Cisco Network Security Elements
- Disable Signatures to Avoid Overflooding Logs
Part II: "I Am Enabled"Hacking the Box
- CASE STUDY: THE ONE WITH A NESSUS REPORT
Chapter 8: Cisco IOS ExploitationThe Proper Way
- Lessons from Michael Lynn's Black Hat Presentation
Part III: Protocol Exploitation in Cisco Networking Environments
- CASE STUDY: THE FLYING OSPF HELL
Chapter 14: Routing Protocols Exploitation
- Which OSPF Router to Attack
Part IV: Appendixes
- CASE STUDY: THE EPIC BATTLE
| ||
| ||
|