On Mon, 2003-09-22 at 21:36, Steve Phillips wrote:
> At 09:17 p.m. 22/09/2003 -0400, you wrote:
> >
> >Yup.  Not to mention that rebooting is a red flag to hackers.  The idea
> >here is to run diagnostics while trying to stay off their radar, else
> >you risk losing the evidence (and possibly your filesystem).
> 
> Actually, if you suspected the system that much that you needed to take it 
> offline for analysis - you would _NEVER_ boot off the medium again until it 
> had been verified clean.

I've never suggested booting off any media at all... Benjamin did.  I
suggested downloading the source, downloading trusted binaries, and
running it in the existing state.  I then went on to mention that a
compromised system should be isolated.  It was not my intention to
escalate the email into a full-blown forensics HOWTO.

> The first step is to make a 1:1 identical copy of the system then store the 
> hardware away as evidence, powering off should also be via the wall, rather 
> than triggering a reboot.

See above.

> you can then work off the image you created and mount that under a system 
> that is in a _known_ good state, that way you cant be accused of tampering 
> with data and you can do all your investigations without the potential 
> attacker(s) influencing your results.

See above.

> In a large enterprise scenario I would also suspect that you would have 
> spare boxes to act as a backup incase this happens - if not then I would 
> suggest you go get some.

See above.

> In a small environment you would probably never convict as the cost to do 
> so would outweigh the benefits, so why bother, if you suspect infection 
> then simply re-install and harden. (or slap that spare box into operation 
> after ensuring it is hardened)
>
> Basic forensics 101 - there are good tutorials available via google search.

I'm happy that you consider yourself an expert in forensics.  I don't. 
When I need an expert to perform forensics work for me, I subcontract
out to Raven.  You may have met her... her team came in 2nd place at
this year's Defcon CTF.

-- 
Jason Dixon, RHCE
DixonGroup Consulting
http://www.dixongroup.net


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to