This may be stating the obvious, but have you tried doing:
nbtstat -a x.x.x.x
on the users address to see who is logged in? If it is a windows box this
will tell you the name of the machine, the domain/workgroup, and how is
logged on.
Carric Dooley
COM2:Interactive Media
http://www.com2usa.com
On Fri, 23 Apr 1999, Chris Brenton wrote:
> David Taylor wrote:
> >
> > Before going on the offense, you may want to rethink your defense.
> >
> > If the alleged policy-violator is being issued a DHCP license, then you
> > have their MAC. With that, and depending upon the size of your network, you
> > can either create include or exclude entries within your DHCP config.
>
> Agreed. Attacking an internal host simply because you do not know who
> owns it is a dangerous game to play. I would suggest the following:
>
> 1) Perform a port scan against the machine and look for obvious port
> clues. For example if finger, Telnet, etc. are open. You can be pretty
> sure its a Unix box. If all you see is ports 135 & 139, its probably
> Windows.
>
> 2) Check banner screens
> If you find open services, Telnet the port to see if you get a banner
> which yields any clues. For example if you connect to port 25 and see a
> Sendmail banner, this is another clue its a Unix OS.
>
> 3) If finger is open, try checking some obvious addresses (like root).
> This may yield an some helpful info like the last remote IP connection
> for the account. This may help you hunt down the person who setup the
> machine.
>
> 4) Evaluate the MAC address to determine who makes the card. You can
> use:
> ftp://ftp.isi.edu/in-notes/iana/assignments/ethernet-numbers
>
> as a reference. Knowing the card vendor may help you determine what kind
> of system the NIC is attached to.
>
> 5) If you have determined its a Windows machine, try the following:
>
> nbtstat -A ip_address_of_host
>
> This will yield the machine name, domain/workgroup as well as the logon
> name of the person currently using the system.
>
> 6) If its an NT box, try running hunt.exe against it. The tool is
> available at:
> http://www.ntobjectives.com/
>
> (its part of JD Glaser's Forensic ToolKit) and you can read exactly how
> to use it at:
> http://www.geek-speak.net/products/ntaudit1.html
>
> Unless the machine has the correct registry hacks in place, hunt will
> give you a complete dump of all logon names and shares.
>
> So instead of trying to kick the machine off the wire (and take the
> chance of wasting other hosts in the process) you may want to try and
> identify who's running the offending system first.
>
> Happy hunting,
> Chris
> --
> **************************************
> [EMAIL PROTECTED]
>
> * Multiprotocol Network Design & Troubleshooting
> http://www.amazon.com/exec/obidos/ASIN/0782120822/geekspeaknet
> * Mastering Network Security
> http://www.amazon.com/exec/obidos/ASIN/0782123430/geekspeaknet
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
>
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]