Security Basics mailing list archives

Re: IIS 6 exploited


From: Radmilo Racic <rracic () gmail com>
Date: Thu, 13 Aug 2009 09:24:01 -0700

If the breach was severe and you decide to take legal action you may
have to make 2 copies - one to be the primary copy that can be used as
evidence and another copy that you can work on and discover the attack
vector(s). Before proceeding take and document the digital fingerprint
of the media (via hashing or other methods). Always a good idea:
maintain integrity of all evidence and establish a chain of custody.

On Tue, Aug 11, 2009 at 10:01 AM, Aarón Mizrachi<unmanarc () gmail com> wrote:
On Martes 11 Agosto 2009 11:20:27 asai ajith escribió:
Hi,

One of our web server IIS 6 has been exploited, C:/inetpub/www/cats.txt was
modified.

In order to know how was happened, you need to examine your:

- Logs.
- Folder permissions
- Scripts running on server (ASP/ASP.NET/PHP/JSP/CGI/whatever...)
- System policy (update policy, password policy, ...)
- Processes Running
- Time/Owner/... of cats.txt
- Other useful information.

My first recommendation that how to start.

1. DON'T DELETE THE FILE. Most people delete the file and destroy the evidence.
2. Create a HardDrive Image. I suggest you to use something like helix with
dcfldd with an external hard drive.

but, my personal recommendation: call an expert to do it. Some things could
fail and destroy/damage the evidence and your site itself.

----------
Why a forensic study are required?

I'm not implying that a forensic study means a police prosecution to the
attacker. Maybe you don't want to. A forensic study could determine how the
attack was possible, and maybe even: who.


I would like to know how this is possible and what are corrective measures,
thanks.

After the forensic image of the hard drive to determine how it happened...

I suggest you:

1. Microsoft Updates.
2. Review the security policies at NTFS (enforce the permissions)
3. Review the security policies at IIS (CGI Folders, memory protections, ...)
4. Review the security policies at your scripting engine
5. Update any internal software (by example: asp websites).
6. Review the security policies at your OS
7. Firewall Review
8. ?

Regards,
Asai



      Yahoo! recommends that you upgrade to the new and safer Internet
Explorer 8. http://downloads.yahoo.com/in/internetexplorer/

------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL
certificate.  We look at how SSL works, how it benefits your company and
how your customers can tell if a site is secure. You will find out how to
test, purchase, install and use a thawte Digital Certificate on your Apache
web server. Throughout, best practices for set-up are highlighted to help
you ensure efficient ongoing management of your encryption keys and digital
certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f72
7d1 ------------------------------------------------------------------------

--
Ing. Aaron G. Mizrachi P.

http://www.unmanarc.com
Mobil 1: + 58 416-6143543
Mobil 2: + 58 424-2412503
BBPIN: 0x 247066C1


------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


Current thread: