1. Don't Panic! Don't Switch the Machine Off

So your machine has got at — or could have been. You have two conflicting tasks:

Ideally, do as little as possible to disturb the bad guys — this way you will be able to get most information. (The last thing you want is for them to shut down operations and clean up, leaving you with no evidence of how they got in or what they were up to.)

Minimum Immediate Network-Related Checks

If, for example, CERT or others are breathing down your neck, try to do the following before removing the network cable from the machine — do not switch it off as you may lose a lot of information (about e.g., running processes, loaded kernel modules, listening daemons): determine and understand every TCP connection, determine and understand every open port and survey all network traffic, in that order.

...cont'snext...



About this document:

Produced from the SGML: /home/umits/public_html/_unix_security/_reml_grp/diagnostic_forensic_tools.reml
On: 23/10/2005 at 13:29:12
Options: reml2 -i noindex -l long -o html -p multiple