Security Basics mailing list archives

RE: IIS 6 exploited


From: "Murda Mcloud" <murdamcloud () bigpond com>
Date: Thu, 13 Aug 2009 11:29:03 +1000

I have to second Aaron's advice to investigate BEFORE taking the 'nuke it'
path.
I have seen servers and workstations re-infected via the same mechanism(once
within hours) after having been reformatted and reloaded. Depending on how
critical your server is, I'd suggest you do the utmost to discover what the
problem was so that it can be fixed.

Aaron's suggestion to image the drive is a good one; also keep any remote
syslogs and such that you have for the machine or logs showing access to the
machine(eg firewall logs).

Be wary that any backup you use to restore may also have the problem.
How far back does the problem go? When was it 'installed'? If I don't know
I'll tend to err on the side of caution and not reload a backup until I do
know.



-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Aarón Mizrachi
Sent: Wednesday, August 12, 2009 3:01 AM
To: security-basics () securityfocus com
Cc: asai ajith
Subject: Re: IIS 6 exploited

On Martes 11 Agosto 2009 11:20:27 asai ajith escribió:
Hi,

One of our web server IIS 6 has been exploited, C:/inetpub/www/cats.txt
was
modified.

In order to know how was happened, you need to examine your:

- Logs.
- Folder permissions
- Scripts running on server (ASP/ASP.NET/PHP/JSP/CGI/whatever...)
- System policy (update policy, password policy, ...)
- Processes Running
- Time/Owner/... of cats.txt
- Other useful information.

My first recommendation that how to start.

1. DON'T DELETE THE FILE. Most people delete the file and destroy the
evidence.
2. Create a HardDrive Image. I suggest you to use something like helix
with
dcfldd with an external hard drive.

but, my personal recommendation: call an expert to do it. Some things
could
fail and destroy/damage the evidence and your site itself.

----------
Why a forensic study are required?

I'm not implying that a forensic study means a police prosecution to the
attacker. Maybe you don't want to. A forensic study could determine how
the
attack was possible, and maybe even: who.


I would like to know how this is possible and what are corrective
measures,
thanks.

After the forensic image of the hard drive to determine how it
happened...

I suggest you:

1. Microsoft Updates.
2. Review the security policies at NTFS (enforce the permissions)
3. Review the security policies at IIS (CGI Folders, memory protections,
...)
4. Review the security policies at your scripting engine
5. Update any internal software (by example: asp websites).
6. Review the security policies at your OS
7. Firewall Review
8. ?

Regards,
Asai



      Yahoo! recommends that you upgrade to the new and safer Internet
Explorer 8. http://downloads.yahoo.com/in/internetexplorer/

-----------------------------------------------------------------------
-
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an
SSL
certificate.  We look at how SSL works, how it benefits your company
and
how your customers can tell if a site is secure. You will find out how
to
test, purchase, install and use a thawte Digital Certificate on your
Apache
web server. Throughout, best practices for set-up are highlighted to
help
you ensure efficient ongoing management of your encryption keys and
digital
certificates.


http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f
72
7d1 --------------------------------------------------------------------
----

--
Ing. Aaron G. Mizrachi P.

http://www.unmanarc.com
Mobil 1: + 58 416-6143543
Mobil 2: + 58 424-2412503
BBPIN: 0x 247066C1


------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


Current thread: