[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: security



FYI

Hacking Exposed is in it's fouth edition Third Edition. The Windows books
are out there all on their own, but note some of the hacks for windows
will also work on linux.  Social engineering is still the best way to get
into a system.

Regards

Andy Browne


"Brian T. Brunner" wrote:

> This term 'kiddies' has always bothered me.
>
> There are individuals and groups with dark souls that need anonymity
> to cover the movement of funds and information.  Compromised systems
> are to them a 'data safehouse' and a 'forward position asset' for
> further ops.
> Compromised systems with funds are 'unknowing donors' to their cause,
> or are
> safe places to launder money.
>
> Not all crooks are young, dumb, or nice.
>
> I'd treat a compromised system this seriously.
>
> > Checking `pstree'... INFECTED
> > Checking `login'... INFECTED
> > Checking `ifconfig'... INFECTED
> >
> > How can I correct this? Pls advice.
>
> Back up user data (config files too) and then format, re-install,
> change
> all user names and password information (including root), and put up a
> secure firewall and harden the system (including all servers)
> intensively.
> Then go and check every other machine on the network, including
> accounting
> systems or any system used for Internet transactions. You may want to
> review all credit card transactions for the past few months in case
> they
> trapped your keystrokes. The kiddie got in once, he/she will try
> again.
>
> A good book is Hacking Linux Exposed, it will show you some of the
> favorite attacks used by kiddies.
>
> ***there should be a similar book for Win98 and WinNT based systems.
> ***I don't know how many volumes it would be...
>
> Do NOT mess around with this. There are no safe shortcuts, sorry.
>
> ***depending on what information was on the compromised system(s),
> ***I'd recommend an audit of the money and equipment as well.
>
> --
> Keith Mastin
> BeechTree Information Technology Services Inc.
> Toronto, Canada
> (416)696 6070
>
> _______________________________________________
> Valhalla-list mailing list
> Valhalla-list redhat com
> https://www.redhat.com/mailman/listinfo/valhalla-list
>
> Brian Brunner (brian t brunner gai-tronics com)
>
> **********************************************************************
> This email and any files transmitted with it are confidential and
> intended solely for the use of the individual or entity to whom they
> are addressed. If you have received this email in error please notify
> the system manager.
>
> This footnote also confirms that this email message has been swept
> for the presence of computer viruses.
>
> www.hubbell.com - Hubbell Incorporated
> **********************************************************************
>
> _______________________________________________
> Valhalla-list mailing list
> Valhalla-list redhat com
> https://www.redhat.com/mailman/listinfo/valhalla-list




[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]