[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Full-Disclosure] Removing Fired admins



<html><div style='background-color:'><DIV class=RTE>
<P>Guys;</P>
<P>Thanks for the input and I love the philosophical debate about how this 
happened, what I can do in the future to prevent it, etc.</P>
<P>A little more info; I am being brought in to help consult on this project, 
the ex-admin is, well, let's just say the local and state law enforcement teams 
are being brought in today to assist, and therefore the problem is probably 
pretty deep. He has been a fully entrenched admin since the inception of the 
agency.</P>
<P>What I really am looking for is some kind of checklist/ information sheet so 
we don't forget anything major, at least to check.</P>
<P>&nbsp;</P>
<P>Depending on what we might find today, the decision is already on the table 
as to whether we should treat this as a total breech and scrub the whole plant 
and start over. That remains to be seen.</P>
<P>While an automated solution would be great to have, I don't have time to 
research them before we get to work. (I am of the belief that they won't work 
well&nbsp;anyway but that is another debate.)</P>
<P>Does anyone know of a SANS, or GIAC or any other security body who has a 
"minder" list of some sort? I know others have gone through this and have 
learned some lessons, both good and bad ones, that I hope they can share.</P>
<P>If not, I will try and document what we do and maybe look to publish 
something for future reference.</P>
<P>Thanks,<BR><BR></P></DIV>
<DIV></DIV>&gt;From: "James Patterson Wicks" <PWICKS@OXYGEN.COM>
<DIV></DIV>&gt;To: full-disclosure@lists.netsys.com 
<DIV></DIV>&gt;Subject: RE: [Full-Disclosure] Removing FIred admins 
<DIV></DIV>&gt;Date: Fri, 13 Feb 2004 08:06:57 -0500 
<DIV></DIV>&gt; 
<DIV></DIV>&gt;Only the senior administrator and the CTO have the root password 
to the 
<DIV></DIV>&gt;Unix systems.&nbsp;&nbsp;The senior admin does not "own" and 
servers, but is the 
<DIV></DIV>&gt;manager for all of the other admins.&nbsp;&nbsp;Could he get mad 
and make changes 
<DIV></DIV>&gt;to the interpreter, but the server "owner" would notice this and 
check 
<DIV></DIV>&gt;the changes against the change management log.&nbsp;&nbsp;Any 
unusual events would 
<DIV></DIV>&gt;be sent to the CTO. 
<DIV></DIV>&gt; 
<DIV></DIV>&gt;Like you said, there is no magic button to press and instantly 
remove an 
<DIV></DIV>&gt;admin's influence from an enterprise.&nbsp;&nbsp;BUT if you have 
a good process in 
<DIV></DIV>&gt;place that leverages existing technologies, you can do a good 
job of 
<DIV></DIV>&gt;protecting your enterprise.&nbsp;&nbsp;Admins leave companies 
all the time, but 
<DIV></DIV>&gt;enterprises continue to operate without a problem. 
<DIV></DIV>&gt; 
<DIV></DIV>&gt;If all else fails, make sure that the company lawyer is in the 
office 
<DIV></DIV>&gt;when you fire the admin.&nbsp;&nbsp;A good threat can go a long 
way. 
<DIV></DIV>&gt; 
<DIV></DIV>&gt;-----Original Message----- 
<DIV></DIV>&gt;From: full-disclosure-admin@lists.netsys.com 
<DIV></DIV>&gt;[mailto:full-disclosure-admin@lists.netsys.com] On Behalf Of 
Volker 
<DIV></DIV>&gt;Tanger 
<DIV></DIV>&gt;Sent: Friday, February 13, 2004 2:51 AM 
<DIV></DIV>&gt;To: full-disclosure@lists.netsys.com 
<DIV></DIV>&gt;Subject: Re: [Full-Disclosure] Removing FIred admins 
<DIV></DIV>&gt; 
<DIV></DIV>&gt;Hi! 
<DIV></DIV>&gt; 
<DIV></DIV>&gt; &gt; We are working on something called "The Button", which is 
nothing but 
<DIV></DIV>&gt; &gt; small script that activates a series of scripts that 
change all root, 
<DIV></DIV>&gt; &gt; local and domain administrator passwords on our Unix and 
Windows 
<DIV></DIV>&gt; &gt; servers when run. 
<DIV></DIV>&gt; 
<DIV></DIV>&gt;The ex-admin had ROOT access to "his" servers, right? So he can 
change 
<DIV></DIV>&gt;ANYTHING, right? Including the script, e.g. like NOT changing 
passwords 
<DIV></DIV>&gt;or adding secret admin-level accounts, right? 
<DIV></DIV>&gt; 
<DIV></DIV>&gt;You said "script", so it uses BASH, PERL or something. ROOT can 
change 
<DIV></DIV>&gt;anything, right? So he could have changed the BASH, PERL 
interpreter or 
<DIV></DIV>&gt;something, right? 
<DIV></DIV>&gt; 
<DIV></DIV>&gt;There is no technical solution to a social problem - well, 
except in 
<DIV></DIV>&gt;this case maybe reformatting the disks and reinstalling from 
scratch and 
<DIV></DIV>&gt;clean media. 
<DIV></DIV>&gt; 
<DIV></DIV>&gt;Sorry 
<DIV></DIV>&gt; 
<DIV></DIV>&gt;Volker Tanger 
<DIV></DIV>&gt;ITK-Security 
<DIV></DIV>&gt; 
<DIV></DIV>&gt;_______________________________________________ 
<DIV></DIV>&gt;Full-Disclosure - We believe in it. 
<DIV></DIV>&gt;Charter: http://lists.netsys.com/full-disclosure-charter.html 
<DIV></DIV>&gt; 
<DIV></DIV>&gt; 
<DIV></DIV>&gt;This e-mail is the property of Oxygen Media, LLC.&nbsp;&nbsp;It 
is intended only for the person or entity to which it is addressed and may 
contain information that is privileged, confidential, or otherwise protected 
from disclosure. Distribution or copying of this e-mail or the information 
contained herein by anyone other than the intended recipient is prohibited. If 
you have received this e-mail in error, please immediately notify us by sending 
an e-mail to postmaster@oxygen.com and destroy all electronic and paper copies 
of this e-mail. 
<DIV></DIV>&gt; 
<DIV></DIV>&gt; 
<DIV></DIV>&gt;_______________________________________________ 
<DIV></DIV>&gt;Full-Disclosure - We believe in it. 
<DIV></DIV>&gt;Charter: http://lists.netsys.com/full-disclosure-charter.html 
<DIV></DIV></div><br clear=all><hr> <a 
href="http://g.msn.com/8HMBENUS/2749??PS=";>Keep up with high-tech trends here 
at "Hook'd on Technology."</a> </html>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html