[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <42EF79C6.2000301@csuohio.edu>
Date: Tue Aug 2 14:50:42 2005
From: michael.holstein at csuohio.edu (Michael Holstein)
Subject: Hosting Provider Refuses to Share Server Logs -
How to Proceed?
> I've never dealt with an intrusion before, but I am the tech for the
That's all you need to say.
The server logs probably won't tell you exactly what happened, and it
doesn't matter anyway. ANYTIME you have a hack, regardless of how
trivial, you rebuild from scratch.
Why? Because you'll never know what was left behind. I've been doing
post-mortum analysis of hacked boxes for years, and I still don't trust
my own abilities to find everything -- thus they all get rebuilt
offline, and nothing that's executable (directly or otherwise), and no
config files get restored.
More specifics on the exact config, and we can give links on how to
secure the next install (eg: what httpd, what O/S, etc.).
Cheers,
Michael Holstein CISSP GCIA
Cleveland State University
Powered by blists - more mailing lists