1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Another use of Ghost?

Discussion in 'Security and Privacy' started by sparrow, 2004/07/31.

Thread Status:
Not open for further replies.
  1. 2004/07/31
    sparrow

    sparrow Inactive Thread Starter

    Joined:
    2004/03/21
    Messages:
    2,282
    Likes Received:
    0
    Will you readers add your thoughts about an idea, born of a mistake I made this week?

    I restored my computer with an image file after it was attacked and the OS destroyed by unknown invaders from the web. Looking back now, it seems obvious that a Ghost image should have been made of the damaged partition. This could be used to identify the culprit by extracting individual files from the Ghost image and sending them to experts for evaluation. The Ghost image could even be restored to the computer for study, including trying various anti-malware processes to evaluate their effectiveness in getting rid of the dangerous programs.

    The Ghost image could also preserve data on the damaged partition that was lost when I restored the previous state with Ghost. Individual files can be restored, examined for the presence of malware, possibly cleaned if infected, and used again on the clean computer. Theoretically, that is. What do you think?

    What else could be done with the Ghost image of an infected partition?
     
  2. 2004/08/01
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    Well, I'd just delete it!.
    Seriously, yes, an image can be used for analysis of damaged systems.
     

  3. to hide this advert.

  4. 2004/08/01
    sparrow

    sparrow Inactive Thread Starter

    Joined:
    2004/03/21
    Messages:
    2,282
    Likes Received:
    0
    TonyT,

    Thanks for the response. I must have covered most possibilities. I thought of it too late this time, and so maybe this note will encourage folks to make a ghost file as well as restore from a ghost file when their computer is attacked. We need information about the attacker in case it's something new and unknown, and that was lost when I simply restored a clean image.
     
  5. 2004/08/01
    Christer

    Christer Geek Member Staff

    Joined:
    2002/12/17
    Messages:
    6,585
    Likes Received:
    74
    sparrow,
    I've had the same thoughts as You have but never shared them.

    Ghost users can (hopefully) hold off restoring and investigate a bit before rolling back. Finding the probable cause, identify a file to submit for the AV company to check.

    I never thought about actually imaging an infected system partition ...... :eek: ......

    Christer
     
  6. 2004/08/02
    sparrow

    sparrow Inactive Thread Starter

    Joined:
    2004/03/21
    Messages:
    2,282
    Likes Received:
    0
    Hi Christer,
    Not having any experience restoring an image, I was carried away by the thought of both rapidly eliminating the problem, and having an opportunity to use Ghost. However, I couldn't boot into XP at all, and having run into this kind of attack previously, and never being able to do anything but reinstall the OS to get back in business I didn't think I wanted to play with other options.

    I decided after the fact that I will make an image of the infected partition if this occurs again, and it should be safer and more illuminating to study the damage leisurely with all the tools of a fully intact Operating System. I did look at the partition timidly with my 98se, which no longer had a working antivirus program (an oversight now corrected) but I was, as I said, anxious to see how Ghost would work.
     
  7. 2004/08/02
    Christer

    Christer Geek Member Staff

    Joined:
    2002/12/17
    Messages:
    6,585
    Likes Received:
    74
    Hi sparrow!

    A friend of mine had problems which included a file called ETRE.EXE which tried to connect to the web. It was giving him a certain popup window but I no longer remember the details (? something about belgiandip ?).

    At that time, he didn't have Ghost and only a single partition on a single HDD so there was nothing much to do but get rid of the "thing" pronto. When I did the cleaning, there were further files which I got rid of.

    A search for ETRE.EXE on Google gave me an unwanted lesson in the french language but nothing on the mysterious file. I haven't done a renewed search in a while but I have found no relevant information on that file whatsoever.

    With "Your" Image of the infected partition, I could have extracted ETRE.EXE and the other files and submitted to Symantec. They would probably be able to tell what it is and does but I doubt that they give feedback.

    I haven't seen it since that single occasion and seemingly no one else ...... :confused: ...... !

    If it had been my own computer with a Ghost Image of a clean system, then I would not have to worry about things getting worse but could have investigated a bit more. I would have taken a detour to the registry to see what was pertaining to ETRE.EXE and/or the other files.

    Christer
     
    Last edited: 2004/08/02
  8. 2004/08/02
    sparrow

    sparrow Inactive Thread Starter

    Joined:
    2004/03/21
    Messages:
    2,282
    Likes Received:
    0
    Hi Christer,
    Thanks for your input.
    You're right, that's a case where investigation is possible, and I wonder if the investigation could be done better, as well, or less well on an image. In my case the OS refused to boot even to safe mode, so any study would be difficult and primitive, and dangerous to my other partition, which apparently was as yet uninfected.

    If several of us try out my thought and evaluate its helpfulness, it would be worthwhile. From one experience with Ghost, it's certainly nice to be back in business so fast. I'd like not to put off recovery if the same information is available in the image. Also remember all data added to the disk since the original ghost image is potentially available on the image of the infected partition.
     
  9. 2004/08/02
    Christer

    Christer Geek Member Staff

    Joined:
    2002/12/17
    Messages:
    6,585
    Likes Received:
    74
    I once said that Ghost users are lousy trouble shooters and I think it's true to at least some extent. There are exceptions from that rule of thumb but most people use it to get back to normal A.S.A.P.

    Ghost has assisted me in, above all, editing the registry, simply because I dared to go there backed up by Ghost and I no longer hesitate to try new software versions because if they aren't up to my expectations, I just roll back.

    Christer
     
  10. 2004/08/02
    sparrow

    sparrow Inactive Thread Starter

    Joined:
    2004/03/21
    Messages:
    2,282
    Likes Received:
    0
    I hope we can put an end to that! :)
     
  11. 2004/08/05
    RayH

    RayH Inactive

    Joined:
    2002/01/10
    Messages:
    740
    Likes Received:
    0
    I'm a Drive Image user. I'll be the first to admit that I'm a lousy troubleshooter. I just try and keep my images as sound as possible.
     
  12. 2004/08/05
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    Well, being familiar w/ ghost give me the opportunity to play around more with all parts of the system, knowing that at any time, all I need to do to restore things to proper is tpo pop in my ghost floppy or bootable cd.
     
  13. 2004/08/05
    Christer

    Christer Geek Member Staff

    Joined:
    2002/12/17
    Messages:
    6,585
    Likes Received:
    74
    I have played/fooled around too, confidence boosted by a fresh Ghost Image but I never thought along the same path as sparrow. When Third Party Disaster (not due to me or the system but coming from outside) strikes, we tend to suffer from Panic Mode Syndrom and anyone knows that whoever finds a cure for PMS will be a Nobel Prize winner.

    Christer
     
Thread Status:
Not open for further replies.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.