Solved

Remote scanning Active Directory

Posted on 2008-11-03
1
184 Views
Last Modified: 2010-04-11
Hey

I'm having alittle problem. The firm that I work for is supporting a company network that we won of a  competitor. The old support company in an effort to win them back, keeps sending reports through claiming the network is not running correctly and there are security patches missing etc...

I know that the reports are rubbish because they are very inaccurate, plus I have removed the software from the domain that they were using to perform the scans in the first place, however it is still worrying the client!.

How do I prove the reports are fake?? Is there a way they are getting in that im not aware off??

Thx
0
Comment
Question by:bostonste
1 Comment
 
LVL 5

Accepted Solution

by:
rexxus earned 500 total points
ID: 22866848
Does the competitor have a static address range assigned to them that you can find out?

Check the firewall and see if that IP address/range is allowed through, if so deny it.

Check the companies internal routing table for a route to the competitors range, they may have installed a back door connection somewhere.

You could spend a lot of time on this, but the thing is, ask the company you are now supporting if they view what the other company is doing as ethical as they're not supposed to have access anymore.  Quite honestly what the old support company is doing is highly unethical.

Tell the company that you now support that if the old company has left a back door for themselves what else have they left in place????  May be time to do a full network audit and see how badly things really are.

All else fails, do some social hacking, ring up the old company and ask how they perform their monitoring, may give you some hints to what they've "left" in place.
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
"In order to have an organized way for empathy mapping, we rely on a psychological model and trying to model it in a simple way, so we will split the board to three section for each persona and a scenario and try to see what those personas would Do,…
Viewers will get an overview of the benefits and risks of using Bitcoin to accept payments. What Bitcoin is: Legality: Risks: Benefits: Which businesses are best suited?: Other things you should know: How to get started:
The viewer will learn how to dynamically set the form action using jQuery.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now