Login/New-Account | Search | Submit a Story! | Greplaw!??
 
GrepLaw
- About
- FAQ
- Discussions
- Messages
- Topics
- Authors

- Preferences
- Older Stuff
- Past Polls
- Submit Story
- XML/RSS

GrepLaw
This site is a production of the Berkman Center for Internet & Society. Please email if you have questions, contributions, or ideas about improving this site.

F & F
Family

Friends

 
Hacking the Hacker
posted by scubacuda on Thursday August 21, @03:20AM
from the taste-of-own-medicine dept.
Security Tech Republic: Here is an interesting account of how one consultant shut down a malicious user on a client's FTP server: using Encase, he mirrored the drive of a rogue FTP server, added the drive to a Windows 2000 Server and mounted it read-only from a RH 9 box. Once he figured the intruder's IP, he nMapped him, logged on his public FTP site, d/led his tools (to figure out his methodology), and then reported his full name, birthday, hometown, e-mail, and photo to the client.

Linux a Threat In India | Economists Rule Down EU Software Patentability  >

 

 
GrepLaw Login
Nickname:

Password:

[ Create a new account ]

Related Links
  • Tech Republic
  • Encase
  • More on Security
  • Also by scubacuda
  • This discussion has been archived. No new comments can be posted.
    Hacking the Hacker | Login/Create an Account | Top | 1 comments | Search Discussion
    Threshold:
    The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
    legal part (Score:3, Interesting)
    by scubacuda (scubacudaNO@SPAMiname.com) on Thursday August 21, @03:47AM (#1052)
    User #483 Info | http://www.greplaw.org/
    [snip]

    The client's first concern was the potential correlation between the posting of messages/content to a site that housed illegal images and the distribution of large files from its FTP Server. Was an employee using their FTP server to distribute pornography?

    We advised the client that if it intended to prosecute, it would need to work within the legal framework of forensic investigations. Most notably, it would be critical for the forensic data to be authenticated as genuine.

    Many of the actions an individual might take, including rebooting the machine, copying files from the server, and reviewing security logs, can alter the drive data. The client's management was adamant about conducting the investigation in a manner that would provide the opportunity to prosecute if necessary. The client's lawyer also believed that by demonstrating due diligence, it would minimize the risk of a third party taking legal action against the organization as a result of the hack.

    A particularly important legal case, "Gates Rubber Co. vs. Bando Chemical Indus, Ltd," helped define the mandatory legal duty of a forensic investigator with regard to creating a mirror image copy of the hard drive in a manner that maintains chain of evidence and custody. In that case, the investigator's decision to perform logical "file-by-file" copying to preserve the evidence precluded legal use of the data because the copying might have resulted in lost information and the creation of new temporary files on the media.

    [/snip]

    There are a thousand forms of subversion, but few can equal the convenience and immediacy of a cream pie. Noel Godin

    Humanity has the stars in its future, and that future is too important to be lost under the burden of juvenile folly and ignorant superstition. - Isaac Asimov

    [ home | contribute story | older articles | past polls | faq | authors | preferences ]