Security Basics mailing list archives
Re: IIS 6 exploited
From: Radmilo Racic <rracic () gmail com>
Date: Thu, 13 Aug 2009 09:24:01 -0700
If the breach was severe and you decide to take legal action you may have to make 2 copies - one to be the primary copy that can be used as evidence and another copy that you can work on and discover the attack vector(s). Before proceeding take and document the digital fingerprint of the media (via hashing or other methods). Always a good idea: maintain integrity of all evidence and establish a chain of custody. On Tue, Aug 11, 2009 at 10:01 AM, Aarón Mizrachi<unmanarc () gmail com> wrote:
On Martes 11 Agosto 2009 11:20:27 asai ajith escribió:Hi, One of our web server IIS 6 has been exploited, C:/inetpub/www/cats.txt was modified.In order to know how was happened, you need to examine your: - Logs. - Folder permissions - Scripts running on server (ASP/ASP.NET/PHP/JSP/CGI/whatever...) - System policy (update policy, password policy, ...) - Processes Running - Time/Owner/... of cats.txt - Other useful information. My first recommendation that how to start. 1. DON'T DELETE THE FILE. Most people delete the file and destroy the evidence. 2. Create a HardDrive Image. I suggest you to use something like helix with dcfldd with an external hard drive. but, my personal recommendation: call an expert to do it. Some things could fail and destroy/damage the evidence and your site itself. ---------- Why a forensic study are required? I'm not implying that a forensic study means a police prosecution to the attacker. Maybe you don't want to. A forensic study could determine how the attack was possible, and maybe even: who.I would like to know how this is possible and what are corrective measures, thanks.After the forensic image of the hard drive to determine how it happened... I suggest you: 1. Microsoft Updates. 2. Review the security policies at NTFS (enforce the permissions) 3. Review the security policies at IIS (CGI Folders, memory protections, ...) 4. Review the security policies at your scripting engine 5. Update any internal software (by example: asp websites). 6. Review the security policies at your OS 7. Firewall Review 8. ?Regards, Asai Yahoo! recommends that you upgrade to the new and safer Internet Explorer 8. http://downloads.yahoo.com/in/internetexplorer/ ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f72 7d1 -------------------------------------------------------------------------- Ing. Aaron G. Mizrachi P. http://www.unmanarc.com Mobil 1: + 58 416-6143543 Mobil 2: + 58 424-2412503 BBPIN: 0x 247066C1
------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
Current thread:
- IIS 6 exploited asai ajith (Aug 11)
- Re: IIS 6 exploited Aarón Mizrachi (Aug 11)
- Re: IIS 6 exploited Israel Junior (Aug 11)
- Re: IIS 6 exploited Federico Maggi (Aug 11)
- RE: IIS 6 exploited Murda Mcloud (Aug 13)
- Re: IIS 6 exploited Radmilo Racic (Aug 13)
- Re: IIS 6 exploited Israel Junior (Aug 11)
- Re: IIS 6 exploited Ali, Saqib (Aug 11)
- Re: IIS 6 exploited Venkatesh Selvaraju (Aug 11)
- Re: IIS 6 exploited Aarón Mizrachi (Aug 11)