[27239] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Compromised boxes

daemon@ATHENA.MIT.EDU (dklindt@ordata.com)
Thu Feb 10 13:29:44 2000

Message-Id: <200002101815.KAA29400@cobra.ordata.com>
From: dklindt@ordata.com
To: nanog@merit.edu
Date: Thu, 10 Feb 2000 10:25:58 -0000
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Reply-To: dklindt@ordata.com
In-reply-to: <Pine.LNX.4.10.10002092326270.25904-100000@redhat1.mmaero.com>
Content-Transfer-Encoding: 7BIT
Errors-To: owner-nanog-outgoing@merit.edu


> > But if anyone does have a compromised box involved in the current round
> > of DDOS, please don't "scorch" it.  Assuming you don't mind losing your
> > equipment for a while, give your local FBI office a call and ask if they
>                                    ^^^^^^^^^^^^^^^^
> > want to look at it.  They'll tell you whether to leave it running, shut it
> > down gracefully, or just yank the power cord.
> 
> But first you'll have to explain to them what a computer is, what unix is,
> what cracking means, etc.  I've dealt with the FBI before in cracking
> incidents.  It wasn't until I got in touch with someone from the computer
> crimes division in DC that I found an agent with even the smallest
> fraction of a clue.  The local and regional offices were useless.

Not so true here in Eugene, OR. We have called the FBI and they came 
right over. She had a good crasp of the issues and ideas....The problem 
is that they will not do much if the amount of "damage" is less than 
$80,000.


home help back first fref pref prev next nref lref last post