> (the server was installed without security knowing about it).

  You have far worse problems than a defaced server!

  [I *wish* you were alone in that.  I worked for a while on a 
network where I was *supposed* to be responsible for security, but 
others could enable outside access to new servers.  Hardly a week 
went by that I didn't learn about a new server -- by having it turn 
up in some script-kiddie's portscan....]

David Gillett


On 27 May 2001, at 0:24, Bill Royds wrote:

> A newly installed server on our network was defaced with this (the
> server was installed without security knowing about it). On
> checking the firewall logs for that IP, I found that it was not
> defaced once, but 4 times. It was only the last version that was
> caught by the system's owners. One of those also added a NetBus
> Trojan but not the one that was finally reported to security. If
> you do not have a record of exactly the commands that were used to
> deface your site, you can not be sure that it did not have any
> thing else added. I would still do forensic analysis of the
> servers to ensure that the only changes were the ones you assume
> and then restore from backup (or in our case get Dell to
> re-install their mess WITH patches). 
> 
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of Young, Beth A.
> Sent: Friday, May 25, 2001 13:58
> To: [EMAIL PROTECTED]
> Subject: RE: f**k USA government f**k poizonbox
> 
> 
> >From personal experience here:
> 
> We had about 25 machine around the state defaced.  2 of those machines had
> backdoor programs installed.  All the defacements looked the same so don't
> assume anything.
> 
> Beth     
> 
> -----Original Message-----
> From: Eric Robinson [mailto:[EMAIL PROTECTED]]
> Sent: Friday, May 25, 2001 12:09 PM
> To: Elizabeth Zwicky; Jose Nazario
> Cc: [EMAIL PROTECTED]
> Subject: RE: f**k USA government f**k poizonbox
> 
> 
> Have you checked around to see what analysts in various places have said
> about the true nature of the attack? Have there been reports of different
> versions of the attack that do more than I stated?
> 
> Eric Robinson
> Network Architect
> edurus, Inc.
> www.edurus.com
> 
> -----Original Message-----
> From: Elizabeth Zwicky [mailto:[EMAIL PROTECTED]]
> Sent: Friday, May 25, 2001 10:05 AM
> To: 'Eric Robinson'; Jose Nazario
> Cc: [EMAIL PROTECTED]
> Subject: RE: f**k USA government f**k poizonbox
> 
> 
> 
> > There comes a point at which you have to ask yourself, "Was I
> > just one of
> > several thousand identical victims, or did some hacker want
> > to get into my
> > particular web server so badly that he timed his attack to
> > coincide with a
> > larger world-wide event as a cover?"
> 
> Or, of course, you could ask yourself "Hey, since I know that
> more than one person ran these attacks, is it possible that
> different people used slightly different variations of
> the attack, some of which left behind back doors?"
> You could answer this question "No, no hacker would ever
> take advantage of a political protest to hide back doors
> on machines, and every single attack in these thousands
> is from exactly the same software" but on the whole, I'd
> have to regard that as a strange thing to believe.
> 
>       Elizabeth Zwicky
>       [EMAIL PROTECTED]
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to