427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet160/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   156   157   158   159   160   161   162   163   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
Botnet Detection: Tools and Techniques • Chapter 5
191
427_Botnet_05.qxd 1/9/07 9:59 AM Page 191


ELEFANT. Searching through the university’s Web pages revealed a Web page
for the chemistry department’s lab network that touted ELEFANT as the
most important computer in their lab.The Web page also identified the lab
manager’s name, phone number, and e-mail address.
Once we are confident in the IP address associated with an attacker, the
help desk ticket is assigned to our networking group.The networking group
places the switch port associated with the attacker into a network jail,
although our kindler, gentler customer service interface calls it a “network
quarantine” when speaking to our customers.The networking group then
confirms the building and room information directly from the switch, to con-
firm the data base entries we posted earlier.
Once the computer’s location has been determined, the help desk ticket is
assigned to our desktop support techs, who arrange for it to be retrieved for
our quick forensic exam and reimaging. We had determined early in the pro-
cess that with this bot, reimaging was preferable to attempting to remove the
virus and chancing that we would miss something. Reimaging also gave us
the opportunity to remove the offending local administrator accounts.
As we processed systems, we realized that we needed to collect and corre-
late information about all the systems we had identified. For that we estab-
lished a spreadsheet that brings together all the relevant information.That
way, if we see a system in an event log two months from now, we can confirm
whether the system was reimaged since the time of the new sighting or if this
is a reinfection.
We are now experimenting with using a tool called NTSyslog, available
for download at http://sourceforge.net/projects/ntsyslog, to automatically for-
ward the Security Event logs to a central syslog server.The central syslog
server formats the data for an SQL database and then will run the above
query in near real time.This has the effect of turning this approach into an
early warning tool instead of a recovery tool.
Firewall Logs
In addition to the logs we’ve already discussed, you should gather any firewall
logs.The default location for Windows XP firewall logs is in
%WinDir%\pfirewall.log. By default, firewall logging is not turned on. It can
be and should be turned on by group policy and configured so the user can’t

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   156   157   158   159   160   161   162   163   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish