Security Basics mailing list archives
RE: IIS 6 exploited
From: "Murda Mcloud" <murdamcloud () bigpond com>
Date: Thu, 13 Aug 2009 11:29:03 +1000
I have to second Aaron's advice to investigate BEFORE taking the 'nuke it' path. I have seen servers and workstations re-infected via the same mechanism(once within hours) after having been reformatted and reloaded. Depending on how critical your server is, I'd suggest you do the utmost to discover what the problem was so that it can be fixed. Aaron's suggestion to image the drive is a good one; also keep any remote syslogs and such that you have for the machine or logs showing access to the machine(eg firewall logs). Be wary that any backup you use to restore may also have the problem. How far back does the problem go? When was it 'installed'? If I don't know I'll tend to err on the side of caution and not reload a backup until I do know.
-----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Aarón Mizrachi Sent: Wednesday, August 12, 2009 3:01 AM To: security-basics () securityfocus com Cc: asai ajith Subject: Re: IIS 6 exploited On Martes 11 Agosto 2009 11:20:27 asai ajith escribió:Hi, One of our web server IIS 6 has been exploited, C:/inetpub/www/cats.txtwasmodified.In order to know how was happened, you need to examine your: - Logs. - Folder permissions - Scripts running on server (ASP/ASP.NET/PHP/JSP/CGI/whatever...) - System policy (update policy, password policy, ...) - Processes Running - Time/Owner/... of cats.txt - Other useful information. My first recommendation that how to start. 1. DON'T DELETE THE FILE. Most people delete the file and destroy the evidence. 2. Create a HardDrive Image. I suggest you to use something like helix with dcfldd with an external hard drive. but, my personal recommendation: call an expert to do it. Some things could fail and destroy/damage the evidence and your site itself. ---------- Why a forensic study are required? I'm not implying that a forensic study means a police prosecution to the attacker. Maybe you don't want to. A forensic study could determine how the attack was possible, and maybe even: who.I would like to know how this is possible and what are correctivemeasures,thanks.After the forensic image of the hard drive to determine how it happened... I suggest you: 1. Microsoft Updates. 2. Review the security policies at NTFS (enforce the permissions) 3. Review the security policies at IIS (CGI Folders, memory protections, ...) 4. Review the security policies at your scripting engine 5. Update any internal software (by example: asp websites). 6. Review the security policies at your OS 7. Firewall Review 8. ?Regards, Asai Yahoo! recommends that you upgrade to the new and safer Internet Explorer 8. http://downloads.yahoo.com/in/internetexplorer/ ------------------------------------------------------------------------Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs anSSLcertificate. We look at how SSL works, how it benefits your companyandhow your customers can tell if a site is secure. You will find out howtotest, purchase, install and use a thawte Digital Certificate on yourApacheweb server. Throughout, best practices for set-up are highlighted tohelpyou ensure efficient ongoing management of your encryption keys anddigitalcertificates.http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f 727d1 ------------------------------------------------------------------------ -- Ing. Aaron G. Mizrachi P. http://www.unmanarc.com Mobil 1: + 58 416-6143543 Mobil 2: + 58 424-2412503 BBPIN: 0x 247066C1
------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
Current thread:
- IIS 6 exploited asai ajith (Aug 11)
- Re: IIS 6 exploited Aarón Mizrachi (Aug 11)
- Re: IIS 6 exploited Israel Junior (Aug 11)
- Re: IIS 6 exploited Federico Maggi (Aug 11)
- RE: IIS 6 exploited Murda Mcloud (Aug 13)
- Re: IIS 6 exploited Radmilo Racic (Aug 13)
- Re: IIS 6 exploited Israel Junior (Aug 11)
- Re: IIS 6 exploited Ali, Saqib (Aug 11)
- Re: IIS 6 exploited Venkatesh Selvaraju (Aug 11)
- Re: IIS 6 exploited Aarón Mizrachi (Aug 11)