Results 1 to 1 of 1
Thread: How to catch/monitor Hackers.
-
08-05-2013, 10:11 AM #1
How to catch/monitor Hackers.
This is just for educational purposes, and will rely on your own experience, and Computing educational background, and continuing education.
Problem: Notice it is taking more milliseconds to browse, computer seems to be slower than normal. Notice it is now taking 2-3 blinks for my browser to react. Plus strange things happen, seems like system has a sticky key, what?
Educational Solution: Have a second Computer, preferably one with good processing power, and loaded with the max memory.
1) You can use Linux OS. Or another OS that I will not mention at this time.
2) Fully,Wipe out the hard-drive fully re-partition, format, etc.
3) Add a floppy drive to your system, DVD/CD, be sure to have USB ports available if needed.
4) Load your OS into a virtual hard drive (Memory). Your physical HD is deactivated, or removed. Use a script so your OS, can reload on boot, using a floppy, or flash drive. Note have your OS boot device READ ONLY.
4_sub_note) Go into CMOS deactivate/Activate your physical drives as needed....Your experience is required in these steps, and it depends on the OS, and mounting procedures. Setup the floppy, usb, or dvd/cd as your boot device.
Rem, it is very important to have your boot media read only, DVD/CD works very well for this. Only one boot device is needed....keep it simple.
6) Have your own port sniffers, and port traps ready to install on your virtual machine, alarms, flashy lights---alert systems.
Now just listing some notes, the procedure/steps will vary due to a lot of variables. Experience/research is required.
You want your system tweaked, do this in CMOS, and do not have unnecessary programs in the background, cut all the fat.
Make your system out to be a very sophisticated, and very very interesting system.....Keep in mind your virtual HD will be looking as a primary. So go ahead mount some more virtual drives.
If you want add a virtual server, do so because if your system does not look interesting they will not hack you anyway, this is getting very educational.
Even add a DVD/CD server with a lot of volumes, you can use junk files encrypt them with some crappy program...Get it interesting....rem add files directories, and have all this load on boot up......as you make changes to your boot media, be sure to make saves along the way.
Build it as you go along, adding more, and more virtual devices.....even virtual within Virtual.....Making it interesting....Curiosity. Rem, you are building a Educational Super System, that is a virtual Fake. To catch the evil Hackers. You will be adding all this to your boot media as you build on it....A DVD will work the best, unless you really just want to stay small.
You will need your Port Traps. This is a program, It looks like a hard-drive (HD) smells like a HD, they think it is a physical drive.
Your virtual devices will look like the real deal, CMOS will help you with this......Unless they read your memory, but then thats another area.
You should also make sure your cmos is set for read only....check out the manufacturers specs for your motherboard jumpers....do not rely, you check it out.
Here is the scenario: Group of young hackers, trying to be cool, waiting on momma/daddy to fall asleep. The worse kind of hackers is the wanna be type that invades your privacy, steals info/data, and does damage.
They attempt to hack your virtual system. Your port visual/audio alarms go off, your logs are activated, and written to a hidden file on a hidden physical flash-drive.
They immediately try to hack into your primary HD to gain access to the root....Your Port trap opens up the virtual window for the fake drive....You now can visually see every command they are keying in, Attempting to gain access.
Their IP is written to the logs. Although this may not be their true IP.
This is just a educational scenario, just some stuff I read that they teach in college computer security courses.
Do not be like the hackers....no one likes a hacker that steals, invades privacy, and does any type of damage.
This is just a tool to see if anyone is hacking you, so that you can install, and test for a good firewall to keep them out.
Thread Information
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
Zebol 50 - deca?
12-10-2024, 07:18 PM in ANABOLIC STEROIDS - QUESTIONS & ANSWERS