RE: Waste, Fraud, Abuse

From: Matt D. Brei (Matt@acs-tech.net)
Date: Wed Jul 23 2003 - 10:44:15 PDT

  • Next message: Mark G. Spencer: "Decent Win32 utility for hash set creation, organization, and manipulation?"

    Could Snort or any NIDS for that matter, tapped in at the last cable
    between the users and firewall be substituted for a proxy?  I too am
    having this problem.  All of our users are allowed to use our training
    room PCs to surf the web while on lunch or break.  However they are all
    configured with roaming profiles which makes it near impossible to
    determine weather or not the cookies/history were created while the user
    was on a training PC or their production machine.
    
    Thanks,
    Matt
    
    -----Original Message-----
    From: Curt Purdy [mailto:purdyat_private] 
    Sent: Tuesday, July 22, 2003 4:57 PM
    To: 'JJ'; forensicsat_private
    Subject: RE: Waste, Fraud, Abuse
    
    The problem comes from someone cluefull enough to wipe cookies/history
    and
    not keep incriminating files.  The best best answer is a proxy server
    that
    logs all access and an email server that keeps a record of all mail.
    
    Curt Purdy CISSP, GSEC, MCSE+I, CNE, CCDA
    Information Security Engineer
    DP Solutions
    cpurdyat_private
    936.637.7977 ext. 121
    
    ----------------------------------------
    
    If you spend more on coffee than on IT security, you will be hacked.
    What's more, you deserve to be hacked.
    -- White House cybersecurity adviser Richard Clarke
    
    
    -----Original Message-----
    From: JJ [mailto:jjhorner@SAFe-mail.net]
    Sent: Monday, July 21, 2003 11:29 AM
    To: forensicsat_private
    Subject: Waste, Fraud, Abuse
    
    
    I'm in the process of updating our WFA analysis procedures.  If any of
    you
    have defined (or mostly defined) procedures for investigation WFA,
    please
    send them my way.  So far, we do the normal:
    
    1.  extract browser history
    2.  extract browser cache
    3.  extract all known information formats (pictures, word processing
    files,
    mp3s, wavs, etc)
    4.  extract cookies
    5.  extract activity as captured by NIDS
    
    Anything I need to add here?  Anyone got any good (sanitized) final WFA
    reports?  I'd also like to see if our format needs updating.
    
    I understand that a lot of this is based on company HR policy, but I'd
    like
    to see industry best practices, if I could.
    
    Thanks,
    JJ
    
    ---------------------
    J. J. Horner
    CISSP,CCNA,CHSS,CHP
    
    -----------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management
    and tracking system please see: http://aris.securityfocus.com
    
    
    
    -----------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    
    
    -----------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Thu Jul 24 2003 - 05:21:16 PDT