Solved

Remote scanning Active Directory

Posted on 2008-11-03
1
192 Views
Last Modified: 2010-04-11
Hey

I'm having alittle problem. The firm that I work for is supporting a company network that we won of a  competitor. The old support company in an effort to win them back, keeps sending reports through claiming the network is not running correctly and there are security patches missing etc...

I know that the reports are rubbish because they are very inaccurate, plus I have removed the software from the domain that they were using to perform the scans in the first place, however it is still worrying the client!.

How do I prove the reports are fake?? Is there a way they are getting in that im not aware off??

Thx
0
Comment
Question by:bostonste
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 5

Accepted Solution

by:
rexxus earned 500 total points
ID: 22866848
Does the competitor have a static address range assigned to them that you can find out?

Check the firewall and see if that IP address/range is allowed through, if so deny it.

Check the companies internal routing table for a route to the competitors range, they may have installed a back door connection somewhere.

You could spend a lot of time on this, but the thing is, ask the company you are now supporting if they view what the other company is doing as ethical as they're not supposed to have access anymore.  Quite honestly what the old support company is doing is highly unethical.

Tell the company that you now support that if the old company has left a back door for themselves what else have they left in place????  May be time to do a full network audit and see how badly things really are.

All else fails, do some social hacking, ring up the old company and ask how they perform their monitoring, may give you some hints to what they've "left" in place.
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Although a lot of people devote their energy toward marketing for specific industries, there are some basic principles that can be applied to any sector imaginable. We’ll look at four steps to take and examine how those steps were put into action fo…
When it comes to security, close monitoring is a must. According to WhiteHat Security annual report, a substantial number of all web applications are vulnerable always. Monitis offers a new product - fully-featured Website security monitoring and pr…
Viewers will get an overview of the benefits and risks of using Bitcoin to accept payments. What Bitcoin is: Legality: Risks: Benefits: Which businesses are best suited?: Other things you should know: How to get started:
This tutorial demonstrates how to identify and create boundary or building outlines in Google Maps. In this example, I outline the boundaries of an enclosed skatepark within a community park.  Login to your Google Account, then  Google for "Google M…

622 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question