Solved

Remote scanning Active Directory

Posted on 2008-11-03
1
185 Views
Last Modified: 2010-04-11
Hey

I'm having alittle problem. The firm that I work for is supporting a company network that we won of a  competitor. The old support company in an effort to win them back, keeps sending reports through claiming the network is not running correctly and there are security patches missing etc...

I know that the reports are rubbish because they are very inaccurate, plus I have removed the software from the domain that they were using to perform the scans in the first place, however it is still worrying the client!.

How do I prove the reports are fake?? Is there a way they are getting in that im not aware off??

Thx
0
Comment
Question by:bostonste
1 Comment
 
LVL 5

Accepted Solution

by:
rexxus earned 500 total points
ID: 22866848
Does the competitor have a static address range assigned to them that you can find out?

Check the firewall and see if that IP address/range is allowed through, if so deny it.

Check the companies internal routing table for a route to the competitors range, they may have installed a back door connection somewhere.

You could spend a lot of time on this, but the thing is, ask the company you are now supporting if they view what the other company is doing as ethical as they're not supposed to have access anymore.  Quite honestly what the old support company is doing is highly unethical.

Tell the company that you now support that if the old company has left a back door for themselves what else have they left in place????  May be time to do a full network audit and see how badly things really are.

All else fails, do some social hacking, ring up the old company and ask how they perform their monitoring, may give you some hints to what they've "left" in place.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I've been asked to discuss some of the UX activities that I'm using with my team. Here I will share some details about how we approach UX projects.
Boost your ability to deliver ambitious and competitive web apps by choosing the right JavaScript framework to best suit your project’s needs.
The viewer will learn how to count occurrences of each item in an array.
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now