[27192] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Compromised boxes

daemon@ATHENA.MIT.EDU (jlewis@lewis.org)
Wed Feb 9 23:51:52 2000

Date: Wed, 9 Feb 2000 23:29:35 -0500 (EST)
From: jlewis@lewis.org
To: Sean Donelan <sean@donelan.com>
Cc: lucifer@lightbearer.com, nanog@merit.edu
In-Reply-To: <20000210014513.6803.cpmta@c004.sfo.cp.net>
Message-ID: <Pine.LNX.4.10.10002092326270.25904-100000@redhat1.mmaero.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


On 9 Feb 2000, Sean Donelan wrote:

> But if anyone does have a compromised box involved in the current round
> of DDOS, please don't "scorch" it.  Assuming you don't mind losing your
> equipment for a while, give your local FBI office a call and ask if they
                                   ^^^^^^^^^^^^^^^^
> want to look at it.  They'll tell you whether to leave it running, shut it
> down gracefully, or just yank the power cord.

But first you'll have to explain to them what a computer is, what unix is,
what cracking means, etc.  I've dealt with the FBI before in cracking
incidents.  It wasn't until I got in touch with someone from the computer
crimes division in DC that I found an agent with even the smallest
fraction of a clue.  The local and regional offices were useless.

----------------------------------------------------------------------
 Jon Lewis *jlewis@lewis.org*|  Spammers will be winnuked or 
 System Administrator        |  nestea'd...whatever it takes
 Atlantic Net                |  to get the job done.
_________http://www.lewis.org/~jlewis/pgp for PGP public key__________



home help back first fref pref prev next nref lref last post