TALKING TO USERS

Before you ever think about touching the subject system you should interview the users. Why? Because they know more about the situation than you will. You might be able to determine that it was all a false alarm very quickly by talking to the users. For example, perhaps it was a system administrator that put a network card in promiscuous mode and not malware or an attacker. It would be far better for everyone if you found this out by talking to the administrator now than after hours of investigating.

You should ask the users a series of questions. The first question you might ask is, “Why did you call me?” Was there an event that led to your being called in? Does the organization lack a qualified person to perform the investigation? Does the organization’s policy on possible incidents require an outside investigator?

The second question you might ask is, “Why do you think there is a problem or incident?” Did something strange happen? Is the network and/or machine slower than normal? Is there traffic on unusual ports? Unlike Windows users, most Linux users don’t just shrug off strange behavior and reboot.

Next you want to get as much information as you can about the subject (suspected victim) system. What is the system normally used for? Where did the system come from? Was it purchased locally or online, etc? As many readers are likely aware, it has come to light that certain government entities are not above planting parasitic devices inside a computer that has been intercepted during shipment. Has the computer been repaired recently? If so, by whom? Was it an old, trusted friend or someone new? Malicious software and hardware are easily installed during such repairs.

results matching ""

    No results matching ""