Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

gateway address

Posted on 2007-11-19
4
Medium Priority
?
244 Views
Last Modified: 2010-04-12
Hello,
I found a software config document online that gives the user the gateway address, port number, gateway key, liscence key for this product. Im trying to perform risks analysis on what risks have been created by leaking this document online. Can you add your thought so I no I have got them all?
0
Comment
Question by:pma111
  • 2
  • 2
4 Comments
 
LVL 3

Author Comment

by:pma111
ID: 20334251
bump
0
 
LVL 19

Expert Comment

by:SteveH_UK
ID: 20337571
Can you indicate what product you are using?  Is this the gateway address for your ISP, etc?
0
 
LVL 3

Author Comment

by:pma111
ID: 20337856
Hi,

The product is a remote support solution

Yes appears to be the ISP
0
 
LVL 19

Accepted Solution

by:
SteveH_UK earned 750 total points
ID: 20337999
Then I would consider it a security risk.  You should:

1)  notify the ISP and get new credentials issued
2)  review all logs (or let the ISP do so) to ensure you haven't already been hacked
3)  find out how the document came to be public, and make sure it doesn't happen again
4)  assess possible impact on other systems and repeat the same process.  For example, do the credentials give access to other system passwords?
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question