Moderator note: Compromised Windows Server thread



Hello list,

To save us from rehashing what comes up fairly frequently on Incidents, I ask that replies to this thread (and future incident response threads for that matter) focus specifically on details of the incident in question.

Two clashing schools of thought are, "wipe clean and reinstall from known-good sources" and those that oppose this, with the belief that proper disinfection is possible. There are plausible theoretical and practical arguments for both sides (and personally, I am an advocate of the former, which if proper backup/recovery procedures are in place as they should be, the expense incurred is relatively minimal), but these should not be introduced into every new thread. Perhaps if there is enough interest, a thread dedicated to sound incident handling procedures could be started.

For general incident response practices, I recommend the recent thread (Jan 2006), "REVIEW: Incident Reponse", Douglas Schweitzer", which discussed said book and eventually other books and resources as well.

Thanks!

-JG

------------------------------------------------------------------------------
This List Sponsored by: Black Hat

Attend the Black Hat Briefings & Training USA, July 29. August 3 in Las Vegas. World renowned security experts reveal tomorrow.s threats today. Free of vendor pitches, the Briefings are designed to be pragmatic regardless of your security environment. Featuring 36 hands-on training courses and 10 conference tracks, networking opportunities with over 2,500 delegates from 40+ nations.

http://www.blackhat.com
------------------------------------------------------------------------------



Relevant Pages

  • Re: [Full-Disclosure] Reacting to a server compromise
    ... Incident Response Procedures ... Computer security incidents are occurring at an ever-increasing rate on the ... Since we, Company XYZ, depend on the Internet for our livelihood, ...
    (Full-Disclosure)
  • RE: [Full-Disclosure] Reacting to a server compromise
    ... "Computer Security Incident Handling Step-by-Step," ... Incident Response Procedures ... Since we, Company XYZ, depend on the Internet for our livelihood, ...
    (Full-Disclosure)
  • NT/2K/XP Incident Response Training
    ... Look at the lists, for example. ... which a Unix admin had to respond to an incident. ... I've created a Incident Response ... BlackHat Windows Security conference. ...
    (Incidents)
  • RE: IDS Incident Escalation Procedure
    ... Incident Response, called "On Incident Handling and Response: ... Subject: IDS Incident Escalation Procedure ... The structure of the core Incident Response Team ...
    (Focus-IDS)
  • [Full-disclosure] Team Evil - Incident #2
    ... Beyond Security’s beSIRT released an incident response ... forensic analysis of a defacement attack by Team Evil [Team Evil Incident ... (Cyber-terrorism defacement analysis and response)]. ...
    (Full-Disclosure)