Discovery, Eradication and Analysis of an attack on an open system: Welcome to the Jungle
In February 2003, the computing system of a small school in the Midwest was compromised by the installation of a root kit. My role in the incident was as the Senior Network Administrator and operations manager. Section one of this paper begins with a picture of the school, its history, and its...