Solved

gateway address

Posted on 2007-11-19
4
233 Views
Last Modified: 2010-04-12
Hello,
I found a software config document online that gives the user the gateway address, port number, gateway key, liscence key for this product. Im trying to perform risks analysis on what risks have been created by leaking this document online. Can you add your thought so I no I have got them all?
0
Comment
Question by:pma111
  • 2
  • 2
4 Comments
 
LVL 3

Author Comment

by:pma111
ID: 20334251
bump
0
 
LVL 19

Expert Comment

by:SteveH_UK
ID: 20337571
Can you indicate what product you are using?  Is this the gateway address for your ISP, etc?
0
 
LVL 3

Author Comment

by:pma111
ID: 20337856
Hi,

The product is a remote support solution

Yes appears to be the ISP
0
 
LVL 19

Accepted Solution

by:
SteveH_UK earned 250 total points
ID: 20337999
Then I would consider it a security risk.  You should:

1)  notify the ISP and get new credentials issued
2)  review all logs (or let the ISP do so) to ensure you haven't already been hacked
3)  find out how the document came to be public, and make sure it doesn't happen again
4)  assess possible impact on other systems and repeat the same process.  For example, do the credentials give access to other system passwords?
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now