Security Incidents mailing list archives

Re: cuebot-d infection method


From: Harlan Carvey <keydet89 () yahoo com>
Date: Fri, 26 Aug 2005 04:51:02 -0700 (PDT)

Jayson,

One other possibility is that the attacker went
straight through the
firewall using an atypical packet....... unlikely,
but should be placed
on an all-inclusive roster of post-mortem
investigations. 

I'm a forensic analyst/engineer, and would be very
interested to know more about your above statement.  I
think that knowing where to look during a post-mortem
investigation for evidence of an "atypical packet"
would be extremely valuable.  

Can you elaborate on this, providing specific
information?  How about examples?

Thanks,

Harlan


Current thread: