[ale] Network security question

Mark Wright mpwright at speedfactory.net
Mon Apr 2 20:58:28 EDT 2007


Thanks for the input James.

I am with you right up to the "all systems need to be scanned" and  
the "serious Penetration testing".   Do you mean "scanned" as in a  
virus scan?  Is there a tool to scan for rootkits and such?   
Penetration testing also is a vague concept to me.  Are we just  
confirming with something like NMAP that there are no open ports?   
Maybe physically make sure there are no known or unknown wireless APs  
lurking on the net, no modems plugged into servers, etc?

I realize that there are books written on subject and I am no way  
asking to be schooled on how computers network.  I just want to be  
sure that I know exactly what you mean.

Thanks again,

Mark

On Apr 2, 2007, at 8:14 PM, James P. Kinney III wrote:

> On Mon, 2007-04-02 at 19:38 -0400, Mark Wright wrote:
>> Hi folks,
>>
>>
>> I have a problem my boss dumped in my lap.  He is going to let go our
>> network admin because he is dishonest.  He is also pretty good and  
>> has
>> bragged about how he hacked his former employer (hp) for mischief  
>> when
>> he was terminated.  My boss wants me to tell him what he should do
>> before he fires this guy to make sure this guy can't disrupt our
>> business after he's gone.  We don't know that he will but my boss
>> thinks so.
>>
>>
>> The office is in Chicago (me in Woodstock).  There are about 5  
>> windows
>> 03 servers and 5 AIX, a Cisco router and a Cisco firewall.  My  
>> boss is
>> not worried about the AIX as that is our expertise.  One of the
>> windows boxes hosts RDP and one is a webserver using Cold Fusion.
>> Those are the ones he worries about.  He had trouble before when he
>> tried to change the Cold Fusion password.  The web site stopped
>> working so he is afraid to do that even though he knows he needs to.
>
> The password will need to be changed simultaneously for both the  
> server
> and all the applications running from it. Create new users first on  
> the
> server then create the new users in the web applications. This  
> should be
> done initially offline and tested using the site mockup. Once the
> dismissal occurs, drop in the new app configs with the new users and
> restart.
>>
>>
>> I suggested to him that all the account passwords should be  
>> changed on
>> every box for every user and possibly disable email ports on any
>> system that doesn't need email.  I was wondering about root kits that
>> may have been left behind or code that could email out the new
>> passwords in a week or so.
>>
> I agree on the total password change. And disable ALL ports not  
> KNOWN to
> be used. Don't leave something open because you _think_ it is used.
>>
>> I know there are some excellent security experts out there.  Any tips
>> would be greatly appreciated.
>
>
> All systems will have to be scanned just before and again just  
> after the
> dismissal. There needs to be a "shadow admin" brought on  
> immediately to
> start the security sweeps. Once the dismissal occurs, the shadow  
> becomes
> the real admin.
>
> There will need to be some serious penetration testing done just prior
> to the dismissal (think same day). Basically, the systems will need to
> be locked down and secure first. Once that is done, the exiting admin
> has their passwords locked off on all machines.
>
> This is a seriously no fun process. The only potential upside to  
> this is
> the ones that brag about past exploits are not very dangerous. They
> typically did "something" with some script-kiddie tools (bad enough  
> but
> manageable.).
>
>>
> -- 
> James P. Kinney III
> CEO & Director of Engineering
> Local Net Solutions,LLC
> 770-493-8244
> http://www.localnetsolutions.com
>
> GPG ID: 829C6CA7 James P. Kinney III (M.S. Physics)
> <jkinney at localnetsolutions.com>
> Fingerprint = 3C9E 6366 54FC A3FE BA4D 0659 6190 ADC3 829C 6CA7
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://www.ale.org/mailman/listinfo/ale




More information about the Ale mailing list