Incidents
Compromised Windows Server Jun 05 2006 07:27PM
Patrick Beam (patrick beam gmail com) (8 replies)
Re: Compromised Windows Server Jun 07 2006 02:19AM
Macleonard Starkey (macleonard auscert org au)
Re: Compromised Windows Server Jun 06 2006 03:20PM
Isaac Perez (suscripcions tsolucio com)
After cleaning it you should be sure that it will not happen again, and
the better way is to know how it happened this time.
So you need to do a little forensic analysis to avoid have the same
problem in the future or in other servers now.
After cleaning you can monitor the system with sniffers, explore the
system to search things that shouldn't be there, monitor the filesystem,
etc... to be shure is really clean.
If you have other systems to compare, will be great, or if you know what
is exactly what must be in the server.
The list of things you should do in this case, in my opinion, is too
large to be explained in an email.
This book will be very helpful:
http://www.amazon.com/gp/product/0321200985/sr=8-2/qid=1149607087/ref=sr
_1_2/104-4503193-3407931?%5Fencoding=UTF8

El lun, 05-06-2006 a las 14:27 -0500, Patrick Beam escribió:
> Came in this morning to find a windows 2003 server I manage scanning the
> Internet for machines listening on tcp 139 and 445. While looking at the
> machine I noticed the following processes running.
>
>
>
>
> Mwvsta.exe found in c:\windows\system32
>
> rundll16.exe c:\windows\system23
>
> Ponoas.exe c:\windows\system32
>
>
>
> I believe that the ponoas.exe is some sort of rootkit although searching on
> google for this file name returns nothing. Also searching
> mwvsta.exereturns nothing. At this point I have removed these files
> from the system
> and registry but am weary that the server will get hit again. Has anyone
> had an experience with the following file or have any idea what rookkit of
> virus they are associated with?
>
>
>
> Thanks,
>
>
>
> Patrick
>
> ------------------------------------------------------------------------
------
> This List Sponsored by: Black Hat
>
> Attend the Black Hat Briefings & Training USA, July 29. August 3 in Las Vegas.
> World renowned security experts reveal tomorrow.s threats today. Free of
> vendor pitches, the Briefings are designed to be pragmatic regardless of your
> security environment. Featuring 36 hands-on training courses and 10 conference
> tracks, networking opportunities with over 2,500 delegates from 40+ nations.
>
> http://www.blackhat.com
> ------------------------------------------------------------------------
------

------------------------------------------------------------------------
------
This List Sponsored by: Black Hat

Attend the Black Hat Briefings & Training USA, July 29. August 3 in Las Vegas.
World renowned security experts reveal tomorrow.s threats today. Free of
vendor pitches, the Briefings are designed to be pragmatic regardless of your
security environment. Featuring 36 hands-on training courses and 10 conference
tracks, networking opportunities with over 2,500 delegates from 40+ nations.

http://www.blackhat.com
------------------------------------------------------------------------
------

[ reply ]
Re: Compromised Windows Server Jun 06 2006 03:09PM
Patrick Beam (patrick beam gmail com) (1 replies)
Re: Compromised Windows Server Jun 07 2006 02:10PM
Kees Leune (C J Leune uvt nl)
Re: Compromised Windows Server Jun 06 2006 11:32AM
Harlan Carvey (keydet89 yahoo com)
Re: Compromised Windows Server Jun 06 2006 08:09AM
Axel Pettinger (api worldonline de)
Re: Compromised Windows Server Jun 06 2006 02:39AM
Jason Ross (algorythm gmail com)
Re: Compromised Windows Server Jun 06 2006 02:38AM
pauls utdallas edu
Re: Compromised Windows Server Jun 06 2006 02:12AM
Jamie Riden (jamesr europe com)


 

Privacy Statement
Copyright 2010, SecurityFocus