Thread: I feel sorry for...

  1. #1
    _B-L-U-E_ Betazep's Avatar
    Join Date
    Aug 2001
    Posts
    1,412

    I feel sorry for...

    204.210.153.72

    This person will be receiving a nasty letter from his/her ISP for forbidden activities.

    Then again Roadrunner services only warns you once... so it might be bye bye cable modem and back to slow internet.

    People just shouldn't **** with me... especially when I am not in the mood.
    Blue

  2. #2
    Registered User dirkduck's Avatar
    Join Date
    Aug 2001
    Posts
    428
    what'd they do?

  3. #3
    &TH of undefined behavior Fordy's Avatar
    Join Date
    Aug 2001
    Posts
    5,793
    >>so it might be bye bye cable modem and back to slow internet.


    Yeah....smoke dat kiddie!!!.......

  4. #4
    Registered User Null Shinji's Avatar
    Join Date
    Oct 2001
    Posts
    80
    what did he/she do?
    Null Shinji The Sorcerer is here
    Evangelion Quotes:
    "If youre gonna do it, dont waste time. Otherwise, leave", Gendo
    "Release the final safety lock, Evangelion Unit One, Lift Off!!", Misato
    "Syncrograph has reversed, pulses are flowing back!!!", Maya
    streamload id= nullshinji icq= 12944337; E-M@IL= [email protected]; aim= mayeba
    msn= [email protected]

  5. #5
    _B-L-U-E_ Betazep's Avatar
    Join Date
    Aug 2001
    Posts
    1,412
    I had my firewall down to do some stuff, and I got a trojan dropped on my door.

    I noticed I had a connection and ran a netstat. Yup connected. Ran my firewall to block access and files came up trying to connect to the internet.

    Ran virus scanner and removed trojans (X2). Received over 40 TCP probes to different ports over the course of the day. Reviewed my logs and found over 25 hits from the same person over the past month.

    Normally I do not care, especially if they are somewhat sneaky about it and don't do it often. (My logs are full of suspicious activity beyond stray network traffic, but I do not care mostly.) But that ........ed me off. Stumbling in like a drunk bastard without even covering his tracks....

    Que sera sera...
    Blue

  6. #6
    /dev/null
    Guest
    bah he might have bounced thru another comp iffected with the trojan...

    isp's usually dont give a damn unless you say something like this guy keeps sending me child porn...

    lol anywyas damn lammers arround here with their little scripts bah...

  7. #7
    Former Member
    Join Date
    Oct 2001
    Posts
    955
    how can you do that? I mean, execute a program from the other side of a network? Just curious, because I thought that trojans are meant to be ran explicitly by the server("victim") computer.

    I think that you just have to be careful, you don't need to have a firewall to prevent hacking into your computer, or do you?

    Oskilian

  8. #8
    /dev/null
    Guest
    "how can you do that? I mean, execute a program from the other side of a network? Just curious, because I thought that trojans are meant to be ran explicitly by the server("victim") computer."

    correct unless your computer has been hacked and the attacker has execution rights on your box...

    firewalls are really useless in my opinnion they just make people paranoid and if someone wants in to your box they will get in... no little software firewall is gonna stop them...

  9. #9
    &TH of undefined behavior Fordy's Avatar
    Join Date
    Aug 2001
    Posts
    5,793
    >>firewalls are really useless in my opinnion they just make people paranoid and if someone wants in to your box they will get in... no little software firewall is gonna stop them...

    Yeah...ok if a wise hacker targetted me,he'd get in ...eventually.... but proggiez like zone alarm ect do offer some protection, and most of the time thats sufficient.....

    The principal of dismissing something utterly because it isnt 100% foolproof is a joke....

  10. #10
    of Zen Hall zen's Avatar
    Join Date
    Aug 2001
    Posts
    1,007
    firewalls are really useless in my opinnion they just make people paranoid and if someone wants in to your box they will get in... no little software firewall is gonna stop them...
    But, they'll deter casual interest.
    zen

  11. #11
    Former Member
    Join Date
    Oct 2001
    Posts
    955
    as far as I know, if you want a hacker to be able to do this you must share a resource with execution permission.. aaand, allow this resource to be shared within the network (internet), you can un-share everything for the internet in Windows. or is there any other way for a hacker to come into your computer (without trojans or tools like trojans)?

    Oskilian

  12. #12
    &TH of undefined behavior Fordy's Avatar
    Join Date
    Aug 2001
    Posts
    5,793
    >>or is there any other way for a hacker to come into your computer

    Lots of ways......mostly by trickery...... Your right about difficulties of executing stuff remotely, but often hackers trick people into running the code themselves......

  13. #13
    Former Member
    Join Date
    Oct 2001
    Posts
    955
    tat's what I'm talking about, you have to be careful!. how can a hacker trick you into executing their own code? I don't get it!

    Oskilian

  14. #14
    _B-L-U-E_ Betazep's Avatar
    Join Date
    Aug 2001
    Posts
    1,412
    >>>bah he might have bounced thru another comp iffected with the trojan...

    isp's usually dont give a damn unless you say something like this guy keeps sending me child porn...

    lol anywyas damn lammers arround here with their little scripts bah...<<<

    LOL... yeah never thought of that one (the child porn part).


    As far as bouncing... that isn't my concern. I am a firm believer that you are responsible for all actions from your computer whether it is your child, an outside hacker, or you.

    And I assure you that Roadrunner looks into it and takes it very seriously.

    First they check the validity of the logs. Then they scan both computers in question to check for obvious exploits. Then they send a nice letter... (want me to read mine to you) that states that you are responible for the actions on your computer (like I said... I certainly believe in that) and even though scanning isn't illegal, it does violate the terms of use.

    I got a letter while I was tracking down a hacker. I found a nix server that was wide open so I emailed the box owner. He thanked me and said that he thought that Unix was secure right out of the box... which should have made me realize he was dumb. I guess he looked into his logs (I am suprised he could find them...) and he saw my scan and reported ME to my ISP!

    Last time I help someone...
    Blue

  15. #15
    _B-L-U-E_ Betazep's Avatar
    Join Date
    Aug 2001
    Posts
    1,412
    >>>tat's what I'm talking about, you have to be careful!. how can a hacker trick you into executing their own code? I don't get it!

    Oskilian<<<

    Easy. Send you a picture of a naked girl. You open it... you get infected. The program writes an entry into the winstartup or Autoexec.bat file so that your computer starts the program for them.

    Or use any number of the millions of exploits in computers on people that do not upgrade their software with critical patches.

    Run sendmail in unix and not know what you are doing (or set uid with permissions).

    It isn't hard. Once you are exploited, you can have a port bleeding into the web....

    Run netstat on your computer every now and then. You can tell if you are connected at least (unless netstat is compromised or the trojan is hidden).
    Blue

Popular pages Recent additions subscribe to a feed

Similar Threads

  1. When you don't feel like reading\programming..
    By Brain Cell in forum A Brief History of Cprogramming.com
    Replies: 21
    Last Post: 03-03-2005, 06:32 PM
  2. Feel Like An Idiot
    By golfinguy4 in forum A Brief History of Cprogramming.com
    Replies: 22
    Last Post: 07-04-2003, 12:45 PM
  3. Feel Guilty..
    By vasanth in forum A Brief History of Cprogramming.com
    Replies: 11
    Last Post: 01-22-2003, 03:00 PM
  4. feel free to laugh at my code!
    By JimJamJovi in forum C Programming
    Replies: 4
    Last Post: 01-11-2002, 04:40 AM