Find Public IP / Other for Intruder

Afternoon All -

My parents own a business and have had an employee working for them for about 15 years who was about my age (35) and that they treated like a son.  He decided to quit a few months ago for whatever reason.

Found out this morning that he just opened a new company which does exactly what he did before that will go in direct competition with my parents.  That's fine and all since competition is healty - however - he'd been trying to recruit some of my parent's current employees and was bragging about how he still remotes in and checks his email, has a copy of certain databases, as well as gets stuff from my father who gave him his password years ago.  I'm pissed.

I've already tightened security and changed everything.  Now gears have shifted to where I'm on the hunt.

I'm trying to find his public IP address / or may set a surprise for him the next time he logs in.  The problem is that the router is a consumer brand and logging is slim to none.  It's a Linksys E1500 which is connected to a Comcast Business Gateway.  I saw a list of all recent Incoming attempts on the E1500, but only showed about 15 events and most were WWW.

- If a user logs into Windows via RDP, does the security log show the source public IP?  
- Can I get further or more detailed logs by SSHing into router perhaps?
- Even though all is forwarded, think Comcast Gateway will have and logs?

Any ideas on what to check / look at to get this info or traps/honeypot to set?

Thanks Guys -
BzowKAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Patrick BogersDatacenter platform engineer LindowsCommented:
Hi

Traps and Honeypots are not things i want to get into because they are against any law but for identifying issues i would like to help.

Are you in a domain controller enviroment or have a local workgroup?

If the latter, below is applicable:
If someone RDP in a system it gets logged. If you filter the security event logs you should find the ip address under id 4648.  
Offcourse if there is a VPN tunnel created first you get to see an internal NAT ip address.
ID 4672 shows username used.
0
vivigattCommented:
All what comes to your "public" router has to have a "public IP address". It will then certainly be "his" address, but this address can change, if his ISP changes it for whatever reason. Some ISP do not provide the same IP addresses each time, some force changes.
However, everything that gets logged from "outside" will have a public IP address.

As Patricksr1972 mentioned, you will also find user names in the logs. I suggest that you enable success and failures in the security logs, then you will see who connects, when, etc. RDP (Terminal Server) has its own logs too.
0
jfer0x01Commented:
Modalot has best answer. Call the cops. When employees leave / quit, change all passwords, deactivate all of the users account. Too late now though.

- If a user logs into Windows via RDP, does the security log show the source public IP?
If he is doing this, odds are   your Router is doing port forwarding to a box inside the network. The log file in your router could have this, but is seems you already checked.
 
- Can I get further or more detailed logs by SSHing into router perhaps?
Yes. Most routers run some form of busybox, but ssh is usually disabled or unavailable in common routers. If you cannot enable it, then ssh cannot be done with out removing the original filesystem and thus your logs.

- Even though all is forwarded, think Comcast Gateway will have and logs?
Yes. The SMC device does have logs.

If you are serious about prosecution, hire a pro to do this. Get witnesses to do sworn statements about admitting intrusions after leaving job. This carries a lot a weight vs log files that a jude does not understand.

Good luck, hope this helps.

Jfer
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
BzowKAuthor Commented:
I'm not trying to cause damage or do illegal things, but do want to defend my information.  Thanks guys
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
OS Security

From novice to tech pro — start learning today.