Security Basics mailing list archives

Re: Analyzing Suspicious Attachment


From: "Ali, Saqib" <docbook.xml () gmail com>
Date: Thu, 17 Jan 2008 09:53:02 -0800

Outside of the obvious policy and training issues, what is the best way to
determine what if any damage has been done to the network?  What tools do I
need to analysis the attachment to see what it is and how it works?

i would backup just the "data" files from the computers, re-image the
machine, and then restore the data files.

you can never fully determine the extent of the damage, so it is
better to re-image the machine.....

saqib
http://www.quantumcrypto.de/dante/


Current thread: