Hacked, Best monitoring for prevention/detection

Posted on 2008-11-03
Last Modified: 2012-05-05
ok, One of our web servers got hacked this morning. A quick restore of the backup resolved the issue. They where able to get in because this server was not up2date. However, I want to be able to monitor/view attempts. I'm sure this is not the first time and I've never really worried about it much. Now I want to keep a very close eye on things. Our environment is mixed with windows/linux. What would you all suggest I could use to monitor all the servers?
Question by:cebrooks03
  • 2

Expert Comment

ID: 22870697
For the *nix boxes, you can generally look under /var/log/ for the security logs and scan for failed attempts.  You can potentially write a script to pull back that information to some central repository if that is what you need.

For Windows you can use the event log viewer to inspect for security events.  Instructions for doing this can be found here:

More specific details would help in pinpointing a solution.

Hope this helps,
Good luck
LVL 38

Accepted Solution

Rich Rumble earned 500 total points
ID: 22880990
Snort, plain and simple, you can see the what the actual attack is classified as. You'll want to setup a snort box with 2 nic's, one to administer snort with, the other to sniff traffic with. No need to IP the sniffing NIC, but you do need to send all the traffic comming into your web-servers to it. Cisco switches call this a span port, other switch makers call it port mirroring.
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 500 total points
ID: 22881123
Snort can act as an IPS as well, intrusion prevention system, if you use it inline. When an attack packet is found, snort can drop the packer, or send a rst packet back to the attacker to drop the connection on the fly. It's best to start with just monitoring, then if you feel you've eliminated the false positives, you can move to an "inline" snort IPS system.

Author Comment

ID: 22881198

thank you. this is exactly what I needed.

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringin…
Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now