Full Disclosure mailing list archives
Re: Break-in discovery and forensics tools
From: "Hotmail" <se_cur_ity () hotmail com>
Date: Wed, 23 Apr 2003 14:11:05 -0700
It would be quite simple for an attacker to modify or delete the logs on most operating systems. That being said, some organizations take steps to protect the integrity of their logs. A central syslog server is typically used and in some cases I have even seen logfiles on that central server digitally signed, encrypted and stored on some sort of write once/read only (ie: CDR) media. I have even seen some go as far as tunneling this traffic over SSH.
you can alter logs as simply as using a proxy to cache and inserting ann ip before it gets logged even on a syslog server. What I am saying is no electronic data capture evidence can be used.. period. It's not even "real" facts. Thats the isue here wood
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Re: Break-in discovery and forensics tools, (continued)
- Re: Break-in discovery and forensics tools Shawn McMahon (Apr 23)
- Re: Break-in discovery and forensics tools Hotmail (Apr 23)
- RE: Break-in discovery and forensics tools Richard M. Smith (Apr 23)
- RE: Break-in discovery and forensics tools Ron DuFresne (Apr 23)
- Re: Break-in discovery and forensics tools Valdis . Kletnieks (Apr 23)
- Re: Break-in discovery and forensics tools Tina Bird (Apr 23)
- Re: Break-in discovery and forensics tools Hotmail (Apr 23)
- Re: Break-in discovery and forensics tools Hotmail (Apr 23)
- RE: Break-in discovery and forensics tools batz (Apr 24)
- Re: Break-in discovery and forensics tools Hotmail (Apr 24)
- SPOOFED HOTMAIL ADDRESS --- http://www.security-hotmail.com/ morning_wood (Apr 26)