Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Remote scanning Active Directory

Posted on 2008-11-03
1
Medium Priority
?
195 Views
Last Modified: 2010-04-11
Hey

I'm having alittle problem. The firm that I work for is supporting a company network that we won of a  competitor. The old support company in an effort to win them back, keeps sending reports through claiming the network is not running correctly and there are security patches missing etc...

I know that the reports are rubbish because they are very inaccurate, plus I have removed the software from the domain that they were using to perform the scans in the first place, however it is still worrying the client!.

How do I prove the reports are fake?? Is there a way they are getting in that im not aware off??

Thx
0
Comment
Question by:bostonste
1 Comment
 
LVL 5

Accepted Solution

by:
rexxus earned 2000 total points
ID: 22866848
Does the competitor have a static address range assigned to them that you can find out?

Check the firewall and see if that IP address/range is allowed through, if so deny it.

Check the companies internal routing table for a route to the competitors range, they may have installed a back door connection somewhere.

You could spend a lot of time on this, but the thing is, ask the company you are now supporting if they view what the other company is doing as ethical as they're not supposed to have access anymore.  Quite honestly what the old support company is doing is highly unethical.

Tell the company that you now support that if the old company has left a back door for themselves what else have they left in place????  May be time to do a full network audit and see how badly things really are.

All else fails, do some social hacking, ring up the old company and ask how they perform their monitoring, may give you some hints to what they've "left" in place.
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Without even knowing it, most of us are using web applications on a daily basis.  In fact, Gmail and Yahoo email, Twitter, Facebook, and eBay are used by most of us daily—and they are web applications. We generally confuse these web applications to…
A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
Viewers will get an overview of the benefits and risks of using Bitcoin to accept payments. What Bitcoin is: Legality: Risks: Benefits: Which businesses are best suited?: Other things you should know: How to get started:
The viewer will learn how to dynamically set the form action using jQuery.

782 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question