CONTENTS. Foundations. Case Study: The Black Hat Hassle Acknowledgments Introduction
|
|
|
- Amanda Fisher
- 10 years ago
- Views:
Transcription
1 CONTENTS Foreword Case Study: The Black Hat Hassle Acknowledgments Introduction xvii xx xxiii xxv Foundations Case Study: ebay Surprise 2 1 Cisco Network Design Models and Security Overview 5 Cisco Network Design Models: A Security Perspective 7 The Fiat Earth Model 7 The Star Model 9 The Two-Tier Model 10 The Ring Model 11 The Mesh and Partial Mesh Model 12 Network Security Zones 14 IDS Sensor Deployment Guidelines 17 Cisco Hierarchical Design and Network Security 18 The Core Layer 19 The Distribution Layer 20 The Access Layer Cisco Network Security Elements 23 Common Cisco Device Security Features 24 Cisco Firewalls 27 Packet-Filtering Firewalls 27 Stateful Packet-Filtering Firewalls 28 Proxy Filters 29 ix
2 Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions 30 PIX Firewall Failover Types of Cisco Firewall Hardware Cisco Secure IDS and Attack Prevention Hardware Standalone IDS Sensors _ Modular IDS Sensors Cisco IOS IDS Software 6 Cisco PIX Firewalls as IDS Sensors Cisco Traffic Anomaly Detector XT 5600 J Cisco Secure IDS Management Consoles Cisco VPN Solutions 44 IPSec ; 46 PPTP 47 Cisco AAA and Related Services Overview of AAA Methodology 4g Cisco and AAA Security Implications of Cisco Internetwork Design and Security Elements 57 Real-World Cisco Security Issues Why Do Hackers Want to Enable Your Box? What Attackers Gain Cisco Appliances and Networks: an Attacker's Perspective oz Attacking Network Protocols Hiding Tracks and Forensics on Routers and Switches Cisco Network Device Security Auditing and Penetration Testing Foundations The Evaluation Process "I Am Enabled": Hacking the Box ' 74 Case Study: The One with a Nessus Report > Profiling and Enumerating Cisco Networks... 7g Online Searching and "Cisco Googledorks" Basic Searching Searching Using Google Operators Googling for Enable Routing Enumeration Autonomous System Discovery and Mapping: BGPv4 o4 Interrogation Internet Routing Registries, Route Servers, and Lookmg Glasses ob Querymg
3 Contents 0 Mapping IP Addresses to Autonomous Systems 92 2 Enumerating an Autonomous System 95 3 Finding Autonomous Systems That Belong to an Organization 99 4 AS Path Enumeration, Building BGP Trees, and Finding 6 Border Routers Routing Domain Number Discovery and Network Mapping 9 forigps Mapping RIP, IGRP, and IRDP Enumerating OSPF Analyzing OSPF Enumeration Data ' 5 Enumerating and Fingerprinting Cisco Devices Sniffing for Cisco-Specific Protocols 124 g Dissecting CDP Frames 128 Passive Enumeration and Fingerprinting of Cisco Devices Active Enumeration and Fingerprinting of Cisco Devices Active Enumeration and Fingerprinting of Cisco Routers 136 Active Enumeration and Fingerprinting of Catalyst Switches ' Active Enumeration and Fingerprinting of Other Cisco Appliances Using IOS 11.X Memory Leak to Enumerate Remote Cisco Routers Getting In from the Outside: Dead Easy Password Attacks 172 Mass Guessing/Bruteforcing Attacks Against Open 9 * Cisco Telnet Servers Password Guessing and Bruteforcing Attacks Against 1 Other Open Cisco Services 180 SNMP Community Guessing, Exploitation, and Safeguards 189 Cisco SNMP Basics 189 SNMP Mass Scanning 193 SNMP Bruteforcing and Dictionary Attacks SNMP Browsing and Cisco Device Reconfiguration 199 j Command-Line Remote Cisco Device SNMP a Manipulation IOS Hosts 207 i Command-Line Remote Cisco Device SNMP I Manipulation CatOS Switches 213 l Exploiting TFTP Servers to Take Over Cisco Hosts 221 A Enumerating TFTP Servers 221 Sniffing Out Cisco Configuration Files 223. Bruteforcing TFTP Servers to Snatch Configs 224 Cisco Device Wardialing 225 Cisco Router Wardialing 101: Interfaces, Configurations, and Reverse Telnet 225
4 Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions Discovering the Numbers to Dial In 228 Gettine into a Cisco Router or an Access Server Hacking Cisco Devices:The Intermediate Path A Primer on Protocol Implementation Investigation and Abuse: Cisco SNMP Attacks SilverCreek SimpleTester and SimpleSleuth j Oulu University PROTOS Project 247 From SNMP Fuzzing to DoS and Reflective DDoS 251 From SNMP Stress Testing to Nongeneric DoS 252 Hidden Menace Undocumented SNMP Communities and Remote Access *~r Getting In via Observation Skills Alone 256 Brief SNMPv3 Security Analysis 259 A Primer on Data Input Validation Attack Cisco HTTP Exploitation Basics of Cisco Web Configuration Interface 260 Cisco IOS HTTP Administrative Access 263 Cisco ATA-186 HTTP Device Configuration Disclosure 264 VPN Concentrator HTTP Device Information Leakage 265 Other Cisco HTTPd Flaws a More Sophisticated Approach 265 Cisco IOS 2GB HTTP GET Buffer Overflow Vulnerability 266 Assessing Security of a Cisco Web Service 267 SPIKE and Its Relatives 268 The Peach Fuzzer 271 Cisco IOS Exploitation:The ProperWay 273 Cisco IOS Architecture Foundations 2/ Cisco IOS Memory Dissection 2/b An Exploitation Primer: IOS TFTP Buffer Overflow 281 Defeating Check Heaps 284 The Curse and the Blessing of IOS Reverse Engineering 2yi IOS Features and Commands That Can Be (Ab)used by Reverse Engineers A Minimalistic Reverse Engineering Arsenal 293 Cracking Secret Keys, Social Engineering, and Malicious Physical Access 297 Cisco Appliance Password Cracking Cracking Type-7 Passwords L Cracking MD5 Password Hashes 3U1 Social Engineering Attacks 237
5 Contents Local Device Access 308 Local Router Password Reset or Recovery 308 Local Switch Password Reset or Recovery 310 Local PIX Firewall Password Reset or Recovery 313 Local Cisco VPN Concentrator Password Reset or Recovery Exploiting and Preserving Access 317 Common Cisco Router, Switch, or Firewall Reconfigurations by Attackers 318 Is Anyone Here? 318 Covering Tracks 320 Looking Around 323 Using a Hacked IOS Router to Hide Tracks 327 Using a Hacked IOS Router or PIX Firewall to Allow Malicious Traffic Through 328 Using a Hacked IOS Router to Mirror, Capture, and Modify Bypassing Traffic 330 Sniffing Traffic from a Hacked PIX Firewall 332 Sniffing the Network Using a Cisco Catalyst Switch 333 (Ab)using Remote SPAN 336 The Secret CatOS Enable Engineer Mode 337 Further IOS Exploitation and Device Access Preservation 340 IOS Binary Patching: Myth and Reality 340 TCLing the Router for Fun and Profit Denial of Service Attacks Against Cisco Devices 361 DoS Attack Motives 362 Types of DoS Attacks 363 Consumption of Resources 363 Disruption of Information Flow 364 Disruption of Communication 364 Cisco DoS Assessment Tools 364 Cisco Global Exploiter 365 Cisco TCP Test Tool 366 Well-Known Cisco DoS Vulnerabilities 367 Cisco Devices Generic DoS 367 ICMP Remote DoS Vulnerabilities 367 Malformed SNMP Message DoS Vulnerability 369 Examples of Specific DoS Attacks Against Cisco Routers 370 Cisco IOS Malformed IKE Packet Remote DoS Vulnerability 370 Cisco Bug 370
6 XiV Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions Examples of Specific DoS Attacks Against Catalyst Switches and Other Cisco Networking Devices 372 Cisco Catalyst Memory Leak DoS Vulnerability 372 Incorrect TCP Checksum Attack Disrupting Communication Through a PIX Firewall 373 Cisco Broadband OS TCP/IP Stack DoS Vulnerability 373 Cisco Aironet APlxOO Malformed HTTP GET DoS Vulnerability Cisco Catalyst Nonstandard TCP Flags Remote DoS Vulnerability Abusing Cisco Appliances for Nasty DDoS Deeds 376 Mass Cisco Pinging, the SNMP Way 376 Mass Cisco Pinging, the Telnet Way MKI 376 Mass Cisco Pinging, the Telnet Way MK II 378 Mass Cisco Flood, the SNMP Way 379 DDoS Massive: Revenge of the Kiddies 382 Direct DDoS Attacks 382 Reflective DDoS Attacks 382 ihateperl.pl 3 f, 1 OOO drdos 390 Protocol Exploitation in Cisco Networking Environments Case Study: The Flying OSPF Hell SpanningTree,VLANs,EAP-LEAP,andCDP 397 Spanning Tree Protocol Exploitation 398 Inserting a Rogue Root Bridge Modifying a Traffic Path Without Becoming Root 410 Recalculating STP and Data Sniffing 411 STP DoS Attacks Exploiting VLANs 4 DTP Abuse 4i 802.1q and ISL Exploitation Double Tagging VLAN Hopping 419 Private VLAN Hopping 420 Makine Unidirectional Attacks Bidirectional 421 VTP Exploitation VLAN Query Protocol (VQP) Attacks 423 Lateral Means of Bypassing VLAN Segmentation 426 Cisco EAP-LEAP Cracking J" EAP-LEAP Basics 432 EAP-LEAP Cracking 432
7 Contents Attacking CDP 438 A Sneaky CDP Attack HSRP, GRE, Firewalls, and VPN Penetration 443 HSRP Exploitation 444 GRE Exploitation 447 An MTU-Based Attack Against GRE 447 GRE Packet Injection 448 Cisco Firewall Penetration 453 Attacking PIX Protocol Fixups 453 Attacking PIX MailGuard 453 Attacking PIX FTP Fixup 454 TCP RESET Attacks Against PIX Firewalls 456 Cisco VPN Hacking 459 IPSec-Related Attacks 460 Cisco PPTP Hacking Routing Protocols Exploitation 471 Introduction to Routing Attacks 472 Setting Up a Rogue Router 474 Attacking Distance-Vector Routing Protocols 474 Attacking RIP 475 Malicious Route Insertion via RIP 475 RIP Downgrading Attack 481 RIP MD5 Hash Cracking Attack 482 Attacking 1GRP 486 Malicious Route Insertion via IGRP 487 Attacking EIGRP 488 Malicious Route Insertion via EIGRP 488 DoS Attacks Against EIGRP Networks 492 Attacking Authenticated EIGRP 494 Attacking Link State Routing Protocols 498 Malicious Route Insertion via OSPF 499 Becoming a Designated or Backup Designated OSPF Router 504 OSPF MD5 Hash Cracking Attack 506 Direct Attack Against an OSPF Router: The OoopSPF Exploit 507 Possible DoS Attacks Against OSPF 509 Attacking BGPv4 512 Malicious BGP Router Reconfiguration 513 Attack Scenarios for Malicious BGP Router Reconfiguration 516 BGP Router Masquerading Attack 519
8 Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions Man-in-the-Middle Attacks Against BGP Routers 520 Cracking BGP MD5 Authentication 522 Blind DoS Attacks Against BGP Routers 523 Appendixes A Case Study: The Epic Battle Network Appliance Security Testing Template B Lab Router Interactive Cisco Auto Secure Configuration Example 539 C Undocumented Cisco Commands Index
Network Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :
Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh Written Exam in Network Security ANSWERS May 28, 2009. Allowed aid: Writing material. Name (in block letters)
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Cisco ASA, PIX, and FWSM Firewall Handbook
Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
Troubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
Specialized Programme on Internetworking Design and LAN WAN Administration
Specialized Programme on Internetworking Design and LAN WAN Administration A. NAME OF INSTITUTE Centre For Development of Advanced Computing B. NAME/TITLE OF THE COURSE C. COURSE DATES WITH DURATION IN
Tim Bovles WILEY. Wiley Publishing, Inc.
Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5
Cconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
Course Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
Securing end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security
Executive Summary. AUGUST 2002 Secure Use of VLANs: An @stake Security Assessment
R e s e a r c h R e p o r t @stake consultants David Pollino and Mike Schiffman, CISSP, conducted the testing and analysis. Mr. Pollino is the Director of the Wireless Center of Excellence at @stake. He
ASM Educational Center (ASM) Est. 1992
Cisco CCNP Routing and Switching Certification Course outline ROUTE v2.0 - Implementing Cisco IP Routing Module 1: Basic Network and Routing Concepts Lesson 1: Differentiating Routing Protocols Lesson
- Introduction to PIX/ASA Firewalls -
1 Cisco Security Appliances - Introduction to PIX/ASA Firewalls - Both Cisco routers and multilayer switches support the IOS firewall set, which provides security functionality. Additionally, Cisco offers
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
CCIE Security Written Exam (350-018) version 4.0
CCIE Security Written Exam (350-018) version 4.0 Exam Description: The Cisco CCIE Security Written Exam (350-018) version 4.0 is a 2-hour test with 90 110 questions. This exam tests the skills and competencies
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149
Table of Contents. Introduction
viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification
Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems
Course Overview Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router s IPSec 3002 IKE 515 CA s Intrusion Detection Systems 4210 VPNs Routers 2 The security threats section will cover
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Networking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
General Network Security
4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Securing E-Commerce. Agenda. The Security Problem IC Security: Key Elements Designing and Implementing. 3203 1346_06_2000_c1_sec3
Securing E-Commerce 1 Agenda The Security Problem IC Security: Key Elements Designing and Implementing 2 The Security Dilemma Internet Business Value Internet Access Corporate Intranet Internet Presence
Cisco Certified Network Expert (CCNE)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Network Expert (CCNE) Program Summary This instructor- led program with a combination
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Understanding Security Testing
Understanding Security Testing Choosing between vulnerability assessments and penetration testing need not be confusing or onerous. Arian Eigen Heald, M.A., Ms.IA., CNE, CISA, CISSP I. Introduction Many
8 steps to protect your Cisco router
8 steps to protect your Cisco router Daniel B. Cid [email protected] Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention
Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )
CCNA Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie ) Inform about ccna its basic course of networking Emergence
Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs
Network Security Ola Lundh [email protected] Schedule/ time-table: landris.hh.se/ (NetwoSec) Course home-page: hh.se/english/ide/education/student/coursewebp ages/networksecurity cisco.netacad.net Packet
IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow
IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication
COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking
COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Cisco Networking Professional-6Months Project Based Training
Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Blended Security Assessments
Blended Security Assessments Combining Active, Passive and Host Assessment Techniques October 12, 2009 (Revision 9) Renaud Deraison Director of Research Ron Gula Chief Technology Officer Table of Contents
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This
IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA
IPv6 Security Scott Hogg, CCIE No. 5133 Eric Vyncke Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Contents Introduction xix Chapter 1 Introduction to IPv6 Security 3 Reintroduction
(d-5273) CCIE Security v3.0 Written Exam Topics
(d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Why Is MPLS VPN Security Important?
MPLS VPN Security An Overview Monique Morrow Michael Behringer May 2 2007 Future-Net Conference New York Futurenet - MPLS Security 1 Why Is MPLS VPN Security Important? Customer buys Internet Service :
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
Juniper / Cisco Interoperability Tests. August 2014
Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper
IMPLEMENTING CISCO SWITCHED NETWORKS V2.0 (SWITCH)
IMPLEMENTING CISCO SWITCHED NETWORKS V2.0 (SWITCH) COURSE OVERVIEW: Implementing Cisco Switched Networks (SWITCH) v2.0 is a five-day instructor-led training course developed to help students prepare for
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
C)PTC Certified Penetration Testing Consultant
C)PTC Certified Penetration Testing Consultant Course Details Course Code: Duration: Notes: C)PTC 4 days This course syllabus should be used to determine whether the course is appropriate for the students,
NetBrain Workstation Professional Edition 2.3 Release notes
NetBrain Workstation Professional Edition 2.3 Release notes Major Features...1 Known Issues*...5 NetBrain Workstation Support Site...7 Recommended System Requirements...7 Installation Notes...7 Major Features
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208
Testing Network Security Using OPNET
Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:
Network Security: Introduction
Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has
VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION
VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION copyright 2003 securitymetrics Security Vulnerabilities of Computers & Servers Security Risks Change Daily New
Cyber Essentials. Test Specification
Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.
NSFOCUS Web Application Firewall White Paper
White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Who is Watching You? Video Conferencing Security
Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative
Troubleshooting an Enterprise Network
Troubleshooting an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 9 Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco
Configuring the Transparent or Routed Firewall
5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing
Working knowledge of TCP/IP protocol Suite IPX/SPX protocols Suite, MCSE or CNE or experienced in supporting a LAN environment.
Cisco Certified Network Associate (640-802) Overview & Objectives This course will lead to a CISCO Certification (CCNA). This is the CISCO: Fundamental of Internetworking and WAN Configuration but with
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
IPv6 Security Best Practices. Eric Vyncke [email protected] Distinguished System Engineer
IPv6 Best Practices Eric Vyncke [email protected] Distinguished System Engineer security 2007 Cisco Systems, Inc. All rights reserved. Cisco CPub 1 Agenda Shared Issues by IPv4 and IPv6 Specific Issues
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
