Solved

where can I find documentation on Identification of hack, stop gap measures, mitigation of a compromised network?

Posted on 2009-04-11
4
367 Views
Last Modified: 2012-05-06
Hello everyone.
I have a client that has clearly been penetrated and hopped to multiple servers. I can identify many of the servers and desktops that have been compromised.

My client also has an extranet/portal service for many of their customers which is the lifeblood of the business. The network is not properly secured, and I suspect that the customers of my client have been penetrated as well.

I have identified rootkits, dameware miniremote installed into the systemroot, and many other typical penetrations. Due to the nature of the business of my client, there is a possibility that it is linked to corporate espionage, as the typical low grade hacker typically sets up FTP sites for distribution of files, etc... In this case, there do not appear to be this kind of materials.

My question is whether anyone is aware of documents that address post-hack stop gap measures, steps for detection of and identification of the level of penetration and mitigation.

While I know myself what to do, I need to provide documents for the client to begin the data gathering sessions and move forward with collecting the information on their extranets, as well as their LAN and WAN penetration so that I can begin addressing the issues. It is extremely important that we identify if the extranet was breached.

But even as a consultant, I cannot engage in the information gathering on a large network that seems to be penetrated so completely and I need to quickly educate them on how to identify and stop the hacks. I need a starting point.

Any documentation you know of is appreciated. (I do not need information on how to secure a network, I am looking for post hack documents. All I find are snippets, nothing comprehensize.)

Thank you in advance.
windowsmt
0
Comment
Question by:windowsmt
  • 2
4 Comments
 
LVL 12

Expert Comment

by:coredatarecovery
ID: 24127597
First off, Let me say I feel sorry for you. This is never a good position to be in, and I understand how frustrating it can be trying to remove the back door.

First, are all the computers involved windows?

Or are they linux?


So, If you need help, give a shout.

Chuck House
Core Data Security
0
 
LVL 12

Accepted Solution

by:
jahboite earned 500 total points
ID: 24128956
There's quite a few documents regarding incident handling at the SANS Institute which you may find helpful:
http://www.sans.org/reading_room/whitepapers/incident/

The "Windows Responders Guide" might be particularly helpful for the evidence gathering stage.

You might also try the library at FIRST: http://www.first.org/library/

and particularly the Best Practise guides: http://www.first.org/resources/guides/index.html

Finally there's CERT at http://www.cert.org who have a wealth of knowledge of information security.
0
 
LVL 5

Author Comment

by:windowsmt
ID: 24129398
They are Windows based. It is not my company, thank goodness. It is a second job I am consulting for. I am looking at the docs now.
0
 
LVL 12

Expert Comment

by:coredatarecovery
ID: 24129844
One of the biggest challenges is removing all of the root kits and/or removing all back doors left by the intruders.

Once your security has been breeched, you will have a difficult time getting them out of there.

Have you setup packet sniffers yet?

If you can trace the hacker back to his source, you may learn more about who has hacked you, and how professional they are in what they do. It's totally different dealing with a teen hacker than a professional thief.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Upgrade BIOS / EUFI at Scale 4 55
Scan Mac for security breach? 5 42
exchange, activesync 2 41
Windows Security Pop-Up 7 49
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question