Saturday, August 18, 2007

Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions



Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. It̢۪s all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You̢۪ll prevent tomorrow̢۪s catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, you̢۪ll get undocumented Cisco commands, security evaluation templates, and vital security tools.
Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networks
Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanningAbuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnelsUse blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilitiesGain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP serversFind out how IOS exploits are written and if a Cisco router can be used as an attack platformBlock determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBARPrevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access .

download


Cisco IOS Access Lists


Book Description:
Cisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes. Cisco IOS Access Lists focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet. Cisco IOS Access Lists covers three critical areas:
Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking.
Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's Building Internet Firewalls. Packet filtering is an integral part of many firewall architectures, and Cisco IOS Access Lists describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers. The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet.Cisco IOS Access Lists differs from other Cisco router titles in that it focuses on practical instructions for setting router access policies. The details of interfaces and routing protocol settings are not discussed.
Download

Securing and Controlling Cisco Routers




Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. In order to practice the material taught, the reader can log on to a real router and perform the commands.



Download:

http://rapidshare.com/files/9446121/Securing_and_Controlling_Cisco_Routers_KINGDWARF.zip

Managing Cisco Network Security


This book is intended primarily for network managers and network administrators who are responsible for implementing IP network security in a Cisco environment. However, it is also useful for people who are interested in knowing more about the security features available in Cisco products in general. The book is designed to be read from beginning to end, but each chapter can stand alone as a useful reference should you want detailed coverage of a particular topic. Readers who want a quick understanding of the information contained in the bookcan read Chapter 9 first.This book will give the reader a good understanding of what security solutions are available from Cisco and how to apply those solutions in real-world cases. These solutions will give the security managers and administrators the necessary tools and knowledge to provide the best protection for their network and data.


Download: