where can I find documentation on Identification of hack, stop gap measures, mitigation of a compromised network?
Posted on 2009-04-11
I have a client that has clearly been penetrated and hopped to multiple servers. I can identify many of the servers and desktops that have been compromised.
My client also has an extranet/portal service for many of their customers which is the lifeblood of the business. The network is not properly secured, and I suspect that the customers of my client have been penetrated as well.
I have identified rootkits, dameware miniremote installed into the systemroot, and many other typical penetrations. Due to the nature of the business of my client, there is a possibility that it is linked to corporate espionage, as the typical low grade hacker typically sets up FTP sites for distribution of files, etc... In this case, there do not appear to be this kind of materials.
My question is whether anyone is aware of documents that address post-hack stop gap measures, steps for detection of and identification of the level of penetration and mitigation.
While I know myself what to do, I need to provide documents for the client to begin the data gathering sessions and move forward with collecting the information on their extranets, as well as their LAN and WAN penetration so that I can begin addressing the issues. It is extremely important that we identify if the extranet was breached.
But even as a consultant, I cannot engage in the information gathering on a large network that seems to be penetrated so completely and I need to quickly educate them on how to identify and stop the hacks. I need a starting point.
Any documentation you know of is appreciated. (I do not need information on how to secure a network, I am looking for post hack documents. All I find are snippets, nothing comprehensize.)
Thank you in advance.