Solved

Remote scanning Active Directory

Posted on 2008-11-03
1
191 Views
Last Modified: 2010-04-11
Hey

I'm having alittle problem. The firm that I work for is supporting a company network that we won of a  competitor. The old support company in an effort to win them back, keeps sending reports through claiming the network is not running correctly and there are security patches missing etc...

I know that the reports are rubbish because they are very inaccurate, plus I have removed the software from the domain that they were using to perform the scans in the first place, however it is still worrying the client!.

How do I prove the reports are fake?? Is there a way they are getting in that im not aware off??

Thx
0
Comment
Question by:bostonste
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 5

Accepted Solution

by:
rexxus earned 500 total points
ID: 22866848
Does the competitor have a static address range assigned to them that you can find out?

Check the firewall and see if that IP address/range is allowed through, if so deny it.

Check the companies internal routing table for a route to the competitors range, they may have installed a back door connection somewhere.

You could spend a lot of time on this, but the thing is, ask the company you are now supporting if they view what the other company is doing as ethical as they're not supposed to have access anymore.  Quite honestly what the old support company is doing is highly unethical.

Tell the company that you now support that if the old company has left a back door for themselves what else have they left in place????  May be time to do a full network audit and see how badly things really are.

All else fails, do some social hacking, ring up the old company and ask how they perform their monitoring, may give you some hints to what they've "left" in place.
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
CTAs encourage people to do something specific to show interest in your company, product or service. Keep reading to learn why CTAs should always be thought of as extremely important, albeit small, sections of websites.
This tutorial demonstrates how to identify and create boundary or building outlines in Google Maps. In this example, I outline the boundaries of an enclosed skatepark within a community park.  Login to your Google Account, then  Google for "Google M…
This tutorial walks through the best practices in adding a local business to Google Maps including how to properly search for duplicates, marker placement, and inputing business details. Login to your Google Account, then search for "Google Mapmaker…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question