Security Basics mailing list archives
RE: Network Compromised
From: "Murda Mcloud" <murdamcloud () bigpond com>
Date: Fri, 1 Aug 2008 06:32:50 +1000
How do you know that the network was compromised and that 'the same attacker' got onto your home system? As Mike says, getting a competent team will be expensive and whether you choose to go down that path depends on many things, not least how seriously you/your company take the breach and what the attacker may have gained from it. Proprietary info? Client data? First thing would be to try and move as quickly as possible because if people are still using the breached systems and/ or the attacker still has access then what is potentially disappearing is evidence/data. Obviously, trying to get the balance between things like imaging drives or taking systems down with the need to keep working is a tough call, in any company. If the attacker is an outsider and is potentially doing huge damage, pulling the plug on external connections may be an idea for a short period of time. This is probably a worst case scenario though. If he/she/them is an insider, then it's imperative that you find out who it is asap. Last thing, just reinstalling the OS at home may not give you any clues as to what happened and whether it could re-occur. How confident are you that they still can't get access? Which way round did it happen? From your machine to the office network or from your office network to you home machine. Ie, where did he compromise first. Apologies for only having more questions for you but that's what starts to run through my head when I think an incident(s) has taken place. That way I can concentrate on what facts I need to gather and where I can get them from.
-----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Mike Hale Sent: Friday, August 01, 2008 1:24 AM To: Evan D. Blackmore Cc: security-basics () securityfocus com Subject: Re: Network Compromised If you're going to attempt to present it as evidence, you don't do it yourself as it sounds like you have no experience in this arena. You need to contact someone local who's done these things before. As Craig Wright lives in Australia, he may have some recommendations for you if he's not too busy at the moment. Unfortunately, it will be expensive; competent security services don't come cheap. On Wed, Jul 30, 2008 at 10:22 PM, Evan D. Blackmore <evan.blackmore () advproj com au> wrote:Hi all Recently the network at my place of employment was compromised the only evidence I could easily recovery was the attackers dhcp lease on our network. This same attacker also got onto my network at home and ontomypersonal machine (teach me for not keeping my firewall up to date) I took the easy option at home and just reinstalled the operating system. I can't do that at work however........the thing is I'm not sure if he did anything while on my work network. I thought that he may havegottenmy logon when he compromised my machine (I use a vpn from home) but the date of the dhcp lease indicates that he was on my employers network first. I rang the cops (computer crime) and they told me that I would have to investigate it myself so I'm posting to get some advice on how I might go about this or if it is even necessary. I'm familiar with forensicsonLinux boxes as I did it at uni but we run a Windows based network here. Regards, Evan Blackmore Advanced Project Solutions Office - +61 8 9441 5700 Direct - +61 8 9441 5773-- 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0
Current thread:
- Network Compromised Evan D. Blackmore (Jul 31)
- Re: Network Compromised Mike Hale (Jul 31)
- RE: Network Compromised Murda Mcloud (Jul 31)
- Re: Network Compromised Mike Hale (Jul 31)