Link to home
Start Free TrialLog in
Avatar of FriendlyIT
FriendlyITFlag for United Kingdom of Great Britain and Northern Ireland

asked on

Investigating a Windows hack

Hi,

One of our domain controllers appears to have been accessed without authorisation and I would welcome any resources you can point me to or guidance about investigating exactly to what extent we have been compromised.

We have locked down inbound and outbound access to the server network whilst we investigate.

I can see that our SAM appears to have been dumped and some files added as services, so assume that there is a rootkit at least.  These are 2012 DC's so surprised that this has happened.  I thought things were pretty tight from a security standpoint.

This follows on from a Shellshock exploit and so the two may be linked somehow.

Any pointers you can give me would be much appreciated.


Jon
Avatar of Dave Baldwin
Dave Baldwin
Flag of United States of America image

Shellshock affects Unix/Linux 'bash' shells which Windows servers do not use.

http://en.wikipedia.org/wiki/Shellshock_%28software_bug%29
ASKER CERTIFIED SOLUTION
Avatar of Lee W, MVP
Lee W, MVP
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of FriendlyIT

ASKER

Hi Dave,

Yes, I appreciate that Shellshock does not directly affect these machines, but given that it did allow someone to compromise some of our Linux boxes, it is highly likely that this was then the jumping off point into the Windows network.

Jon
Hi Lee,

Thanks for the suggestions.  We are currently auditing all accounts and planning a password change before anything is allowed online again.

The concern is that one other DC also shows remote registry access and the only other DC we have is an older version of Windows and so cannot be promoted.


Jon
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
OK - my mistake.  Thanks.

Any resources for forensics to get to the bottom of anything else that may have been compromised?
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
btan just nipped in at the eleventh hour and stole some of the points.  Great information both.
I have another question about the FSMO role thing if you want to have a look at that?

https://www.experts-exchange.com/questions/28539455/Introducing-restored-Domain-Controller-into-environment.html
(amended to include the link!)