Advertise on Bikeforums.net



User Tag List

Results 1 to 9 of 9
  1. #1
    '05 NUEser EJ123's Avatar
    Join Date
    Aug 2005
    Posts
    3,374
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)

    Tracking hackers on your personal comps this way valid?

    So this article on eHow recommends this way of seeing if others are using your connection...something along those lines.
    http://www.ehow.com/how_4621489_track-hackers.html

    It states to open up cmd and type netstat -a, in which a rolling list appears listing local/foreign addresses if it's listening/active/time wait, etc. Just ran this and it looks like there are quite a few different addresses here and there for mine, but what is normal or expected when you run that command?

  2. #2
    Senior Member
    Join Date
    Apr 2012
    Location
    Chicagoland area
    My Bikes
    1995 Specialized design Full Force
    Posts
    80
    Mentioned
    2 Post(s)
    Tagged
    0 Thread(s)
    If you can log into your router, usually by typing your local IP into your browser, there should also be a way to check what else is connected to your internet... usually under "attached devices" or something along those lines. So far as I know you can't really track anybody through it, but it will tell you how many computers, phones, etc, are connected to your internet, and I believe with most you can block any unknown devices.

  3. #3
    Fredly
    Join Date
    Jun 2010
    My Bikes
    Surly Long Haul Trucker w/ SRAM Rival, & 36H 38's, Late 70's Santana Tandem w/ Double Diamond frame
    Posts
    452
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    netstat shows network connection statistics. As such it shows all connections to you computer and not just hackers. You'd have to know which are normal and which are not to get some use out of it.

    Traceroute is a tool that shows the path between your ip address and another. It can be used to get an idea of the geographical location that the endpoint ip address is in; however, to claim that it's a good tool for tracking hackers is laughable.

    Overall, whomever wrote that knows very little about hackers, their methodology, and how to track them down.

  4. #4
    Senior Member skiahh's Avatar
    Join Date
    Aug 2003
    Location
    CO Springs, CO
    My Bikes
    08 Stumpjumper FSR Expert, 02 Litespeed Tuscany, 04 Specialized S-Works Epic
    Posts
    1,034
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by iconicflux View Post
    Overall, whomever wrote that knows very little about hackers, their methodology, and how to track them down.
    Or, apparently, about how computers work in general.
    www.teamnavycycling.org
    2010 Pivot Mach 429
    09 Felt Nine Race
    03 Litespeed Tuscany

  5. #5
    Fredly
    Join Date
    Jun 2010
    My Bikes
    Surly Long Haul Trucker w/ SRAM Rival, & 36H 38's, Late 70's Santana Tandem w/ Double Diamond frame
    Posts
    452
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by skiahh View Post
    Or, apparently, about how computers work in general.
    That's hard to ascertain from the article.

    The issue with ip address & traceroute is that it shows you an ip address and possibly where that ip address is located but it wont show who is at that ip address. If it goes through a proxy or bounces through another server then the ip address shown is the last one a hacker was at. It's just mostly useless info when tracking hackers.

    You're better off to watch what the hacker is doing and see if they are exfiltrating data to a system. If you can find them exfiltrating data then the site they're exfiltrating to usually gives more information and is often easier to use for seeing where the hacker is connecting from.

  6. #6
    Look! My Spine! RubenX's Avatar
    Join Date
    Apr 2008
    Location
    Winter Springs, FL
    Posts
    619
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by EJ123
    what is normal or expected when you run that command?
    that depends on what you have running on your network
    "Hoy es un dia normal, pero yo voy a hacerlo intenso" ~ Juanes

  7. #7
    Senior Member
    Join Date
    Apr 2007
    Location
    Minneapolis, MN
    Posts
    176
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Haha eHow...I love their articles on music. My 4 year old can write more accurate articles on music.

  8. #8
    Riding Heaven's Highways on the grand tour ModoVincere's Avatar
    Join Date
    Aug 2006
    Posts
    1,676
    Mentioned
    4 Post(s)
    Tagged
    0 Thread(s)
    Set up a trojan on your pc....name it "download me".....and then let them have it.
    1 bronze, 0 silver, 1 gold

  9. #9
    Fredly
    Join Date
    Jun 2010
    My Bikes
    Surly Long Haul Trucker w/ SRAM Rival, & 36H 38's, Late 70's Santana Tandem w/ Double Diamond frame
    Posts
    452
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Except that's probably violating the law. What you could do is open up a word document, put some fake financial or bank account info in it, save it to word xml format, then edit the xml to include an <img src> tag pointed to a gif on your website. Most people don't know that word can parse img src tags and will connect to external sites. Then you just wait for the hits to your website and unless they're using a system-wide proxy that will show you where they're actually connecting from.


    Quote Originally Posted by ModoVincere View Post
    Set up a trojan on your pc....name it "download me".....and then let them have it.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •