Results 1 to 25 of 25

Thread: HELP!!!! Son's computer was hacked....

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Join Date
    Jul 2009
    Location
    UK
    Posts
    993
    Quote Originally Posted by zimmy View Post
    As far as Erectile there...i'm pretty tired of people preaching anti microsoft. Fact of the matter is the only reason why there are less virus's and hacks for linux based os's is because of the simple fact that they are less popular. Ubuntu and other linux flavor's installed are VERY weak with default installation. But because someone isn't going to spend hours writing a hack for an OS used by very few (comparitively to microshit), it is seen as stronger.
    I'm pretty experienced with hacking. I actually have my own website but I can't give a link to it here because everyone in my "real life" will know I'm on steroids.

    Step 1 of hacking a computer over a network connection is to perform a "port scan" on the victim computer. A port scan will give you a list of "open ports" on the computer being targeted.

    Typically, a port scan on a fresh install of Microsoft Windows will reveal about 3 open ports. That's 3 ways you have of f***ing around with the computer and trying to gain access to it.

    Once you've figured out which ports are open, you can run a piece of software such as "fast track" which automatically performs hacking attempts on the victim computer. When it has gained access, it will tell you, and you will have a choice of what way to control and interact with the victim computer.

    Now here's the thing... if you port scan a default installation of Linux or Mac OS (which are both derived from the original Unix operating system), then there will be no open ports. This is the most important thing in preventing hacking of your system.

    But let's say you need to have an open port on your computer because you have enabled something like File Sharing. On a Microsoft Windows computer, this leaves you WIDE OPEN for attack... and a diligent attacker will sooner or later gain access.

    There are other ways of hacking a computer across a network, such as "client side" attacks. One common strategy is to place yourself between the victim computer and the router so that all traffic gets passed through your own computer. You can alter the traffic and change it to say stuff like "Your Flash player is too old to play this YouTube video, you need to upgrade" and then you can let the poor user download a trojan horse program to their PC.

    Linux happens to be the operating system of choice for use by hackers... and who knows more about hacking than hackers? They are a close community who work together to ensure that their operating system is secure.

    When an operating system, (or even just a normal program), has a flaw in it that allows it to be taken control of, its known in hacking as a vulnerability.Microsoft Windows has had several thousand vulnerabilities over the years, and more are discovered daily. I'm not exaggerating, they are discovered DAILY.
    Linux, on the other hand, gets a vulnerability discovered about once a year, and it's Big Newswhen a vulnerability gets discovered because it happens so rarely.

    Also, zimmy, you make a good point about Linux being "less attacked" than Microsoft Windows. All the trojan horses bouncing around the internet are designed to manipulate a Microsoft Windows machine. These trojan horse programs won't even run on Linux, nor an Apple Mac.

    Linux is secure because it's secure, plain and simple, not simply because it hasn't been targeted as much by hackers.

    Ubuntu and other linux flavor's installed are VERY weak with default installation.
    This is false, and I know it's false because I tested it out myself with my own hacking tools. When I installed Ubuntu onto my laptop about 6 months back, I got a friend to come around with this computer and I tried everything I could to hack my Linux machine. First thing I did was port scan my laptop... and my laptop didn't even reply... it didn't even reply to say that ports were closed... it simply sat there silently and refused to communicate.

    So let's say you want to hack my Linux laptop by using a "client side" attack... well you're gonna have to go find a trojan horse program that will actually run on Linux, and then you'll also have to be able to fool me into downloading and running an executable file.

    Microsoft Windows has proven itself over two decades to be an insecure operating system. This is why Linux is by far the dominant operating system in security-critical fields; most internet web servers are running Linux.

    I use Ubuntu and I love it. It's user-friendly, it's easy, and it's got everything I need and I want (I can type documents, do spreadsheets, burn DVD's, watch YouTube, download movies by BitTorrent).

  2. #2
    Join Date
    Jan 2006
    Location
    Houston
    Posts
    4,225
    Quote Originally Posted by ErectileTissue View Post
    I'm pretty experienced with hacking. I actually have my own website but I can't give a link to it here because everyone in my "real life" will know I'm on steroids.

    Step 1 of hacking a computer over a network connection is to perform a "port scan" on the victim computer. A port scan will give you a list of "open ports" on the computer being targeted.

    Typically, a port scan on a fresh install of Microsoft Windows will reveal about 3 open ports. That's 3 ways you have of f***ing around with the computer and trying to gain access to it.

    Once you've figured out which ports are open, you can run a piece of software such as "fast track" which automatically performs hacking attempts on the victim computer. When it has gained access, it will tell you, and you will have a choice of what way to control and interact with the victim computer.

    Now here's the thing... if you port scan a default installation of Linux or Mac OS (which are both derived from the original Unix operating system), then there will be no open ports. This is the most important thing in preventing hacking of your system.

    But let's say you need to have an open port on your computer because you have enabled something like File Sharing. On a Microsoft Windows computer, this leaves you WIDE OPEN for attack... and a diligent attacker will sooner or later gain access.

    There are other ways of hacking a computer across a network, such as "client side" attacks. One common strategy is to place yourself between the victim computer and the router so that all traffic gets passed through your own computer. You can alter the traffic and change it to say stuff like "Your Flash player is too old to play this YouTube video, you need to upgrade" and then you can let the poor user download a trojan horse program to their PC.

    Linux happens to be the operating system of choice for use by hackers... and who knows more about hacking than hackers? They are a close community who work together to ensure that their operating system is secure.

    When an operating system, (or even just a normal program), has a flaw in it that allows it to be taken control of, its known in hacking as a vulnerability.Microsoft Windows has had several thousand vulnerabilities over the years, and more are discovered daily. I'm not exaggerating, they are discovered DAILY.
    Linux, on the other hand, gets a vulnerability discovered about once a year, and it's Big Newswhen a vulnerability gets discovered because it happens so rarely.

    Also, zimmy, you make a good point about Linux being "less attacked" than Microsoft Windows. All the trojan horses bouncing around the internet are designed to manipulate a Microsoft Windows machine. These trojan horse programs won't even run on Linux, nor an Apple Mac.

    Linux is secure because it's secure, plain and simple, not simply because it hasn't been targeted as much by hackers.



    This is false, and I know it's false because I tested it out myself with my own hacking tools. When I installed Ubuntu onto my laptop about 6 months back, I got a friend to come around with this computer and I tried everything I could to hack my Linux machine. First thing I did was port scan my laptop... and my laptop didn't even reply... it didn't even reply to say that ports were closed... it simply sat there silently and refused to communicate.

    So let's say you want to hack my Linux laptop by using a "client side" attack... well you're gonna have to go find a trojan horse program that will actually run on Linux, and then you'll also have to be able to fool me into downloading and running an executable file.

    Microsoft Windows has proven itself over two decades to be an insecure operating system. This is why Linux is by far the dominant operating system in security-critical fields; most internet web servers are running Linux.

    I use Ubuntu and I love it. It's user-friendly, it's easy, and it's got everything I need and I want (I can type documents, do spreadsheets, burn DVD's, watch YouTube, download movies by BitTorrent).

    Not gonna bother correcting all the inacuracies. There are way more than 3 open ports on windows default installs and about 5 on linux which btw is not unix at all. I'm glad you found something you like ...great. Glad you have a "hacking" web site. Not gonna tell you or anyone else my credentials. You think you are right, and I know I'm right. I graduated from script kiddie to in the know along time ago.

  3. #3
    Join Date
    Sep 2009
    Location
    R.I.P T
    Posts
    5,244
    I would install the firewall that zimmy recommended and also to remove spyware you can use this

    http://download.cnet.com/Malwarebyte...html?tag=mncol

    its free and should get the spyware

  4. #4
    Join Date
    Jan 2006
    Location
    Houston
    Posts
    4,225
    Quote Originally Posted by MaNiCC View Post
    I would install the firewall that zimmy recommended and also to remove spyware you can use this

    http://download.cnet.com/Malwarebyte...html?tag=mncol

    its free and should get the spyware
    I love that one. It's free and usually gets what most of the other pay for programs miss.

  5. #5
    Join Date
    Jul 2009
    Location
    UK
    Posts
    993
    Quote Originally Posted by zimmy View Post
    Not gonna bother correcting all the inacuracies.
    So that's the end of the debate?!

    If I'd know it was that easy to end a debate I would have just replied to your previous post with "I'm not gonna bother correcting you".

    There are way more than 3 open ports on windows default installs
    You say that as if it's something to boast about.

    Open ports = Possible ways of getting hacked

    An operating system should have no open ports at all until the user explicitly opens one.

    and about 5 on linux which btw is not unix at all.
    Give me a second and I'll do a port scan on my own laptop. Here's the results:

    Code:
    Starting Nmap 5.00 ( http://nmap.org ) at 2010-05-06 20:53 ICT
    Interesting ports on localhost (127.0.0.1):
    Not shown: 999 closed ports
    PORT     STATE SERVICE
    22/tcp   open  ssh
    
    Nmap done: 1 IP address (1 host up) scanned in 0.35 seconds
    The only reason port 22 is open is because I opened it myself!

    Both Linux and Mac OS are direct descendants of the Unix operating system. If you don't believe me then educate yourself:

    http://en.wikipedia.org/wiki/*nix

    Linux and Mac OS have the same simple command line programs (stuff like cp mv whoami pwd find ls) because the were inherited from Unix.

    I started out as a Microsoft Windows user, I had the first version ever of Windows on my PC. Soon afterwards I had Windows 3.11 for Workgroups. Then Windows 95. Then Windows 98. Then Windows Millenium. Then Windows XP.

    Microsoft Windows XP was the last ever Microsoft operating system I used, because I discovered Linux and made the switch.

    Having been using Linux for about 2 years now, I'm glad I abandoned Microsoft software.

    I'm glad you found something you like ...great.
    Thanks, yeah, Linux is pretty cool.

    Glad you have a "hacking" web site. Not gonna tell you or anyone else my credentials. You think you are right, and I know I'm right. I graduated from script kiddie to in the know along time ago.
    "In the know"???! You're using Microsoft software buddy. Go to any PC security specialist and tell him that you're relying on Microsoft to keep your company secure.... they'll probably have a stroke.

  6. #6
    Quote Originally Posted by ErectileTissue View Post
    So that's the end of the debate?!

    If I'd know it was that easy to end a debate I would have just replied to your previous post with "I'm not gonna bother correcting you".

    You say that as if it's something to boast about.

    Open ports = Possible ways of getting hacked

    An operating system should have no open ports at all until the user explicitly opens one.

    Give me a second and I'll do a port scan on my own laptop. Here's the results:

    Code:
    Starting Nmap 5.00 ( http://nmap.org ) at 2010-05-06 20:53 ICT
    Interesting ports on localhost (127.0.0.1):
    Not shown: 999 closed ports
    PORT     STATE SERVICE
    22/tcp   open  ssh
    
    Nmap done: 1 IP address (1 host up) scanned in 0.35 seconds
    The only reason port 22 is open is because I opened it myself!

    Both Linux and Mac OS are direct descendants of the Unix operating system. If you don't believe me then educate yourself:

    http://en.wikipedia.org/wiki/*nix

    Linux and Mac OS have the same simple command line programs (stuff like cp mv whoami pwd find ls) because the were inherited from Unix.

    I started out as a Microsoft Windows user, I had the first version ever of Windows on my PC. Soon afterwards I had Windows 3.11 for Workgroups. Then Windows 95. Then Windows 98. Then Windows Millenium. Then Windows XP.

    Microsoft Windows XP was the last ever Microsoft operating system I used, because I discovered Linux and made the switch.

    Having been using Linux for about 2 years now, I'm glad I abandoned Microsoft software.

    Thanks, yeah, Linux is pretty cool.

    "In the know"???! You're using Microsoft software buddy. Go to any PC security specialist and tell him that you're relying on Microsoft to keep your company secure.... they'll probably have a stroke.
    my dude knows how to download and run a port scanner.. such a hacker... seriously though, i'm glad you know how to use wikipedia homie. ur 5 page essay on linux was a bit unnecessary.

    anyway back to the original topic, i agree with what everyone else said. zonealarm and malware bytes are both awesome programs and should keep you safe.
    Last edited by obvikid334; 05-08-2010 at 03:41 AM.

  7. #7
    Quote Originally Posted by ErectileTissue View Post
    I'm pretty experienced with hacking. I actually have my own website but I can't give a link to it here because everyone in my "real life" will know I'm on steroids.

    Step 1 of hacking a computer over a network connection is to perform a "port scan" on the victim computer. A port scan will give you a list of "open ports" on the computer being targeted.

    Typically, a port scan on a fresh install of Microsoft Windows will reveal about 3 open ports. That's 3 ways you have of f***ing around with the computer and trying to gain access to it.

    Once you've figured out which ports are open, you can run a piece of software such as "fast track" which automatically performs hacking attempts on the victim computer. When it has gained access, it will tell you, and you will have a choice of what way to control and interact with the victim computer.

    Now here's the thing... if you port scan a default installation of Linux or Mac OS (which are both derived from the original Unix operating system), then there will be no open ports. This is the most important thing in preventing hacking of your system.

    But let's say you need to have an open port on your computer because you have enabled something like File Sharing. On a Microsoft Windows computer, this leaves you WIDE OPEN for attack... and a diligent attacker will sooner or later gain access.

    There are other ways of hacking a computer across a network, such as "client side" attacks. One common strategy is to place yourself between the victim computer and the router so that all traffic gets passed through your own computer. You can alter the traffic and change it to say stuff like "Your Flash player is too old to play this YouTube video, you need to upgrade" and then you can let the poor user download a trojan horse program to their PC.

    Linux happens to be the operating system of choice for use by hackers... and who knows more about hacking than hackers? They are a close community who work together to ensure that their operating system is secure.

    When an operating system, (or even just a normal program), has a flaw in it that allows it to be taken control of, its known in hacking as a vulnerability.Microsoft Windows has had several thousand vulnerabilities over the years, and more are discovered daily. I'm not exaggerating, they are discovered DAILY.
    Linux, on the other hand, gets a vulnerability discovered about once a year, and it's Big Newswhen a vulnerability gets discovered because it happens so rarely.

    Also, zimmy, you make a good point about Linux being "less attacked" than Microsoft Windows. All the trojan horses bouncing around the internet are designed to manipulate a Microsoft Windows machine. These trojan horse programs won't even run on Linux, nor an Apple Mac.

    Linux is secure because it's secure, plain and simple, not simply because it hasn't been targeted as much by hackers.



    This is false, and I know it's false because I tested it out myself with my own hacking tools. When I installed Ubuntu onto my laptop about 6 months back, I got a friend to come around with this computer and I tried everything I could to hack my Linux machine. First thing I did was port scan my laptop... and my laptop didn't even reply... it didn't even reply to say that ports were closed... it simply sat there silently and refused to communicate.

    So let's say you want to hack my Linux laptop by using a "client side" attack... well you're gonna have to go find a trojan horse program that will actually run on Linux, and then you'll also have to be able to fool me into downloading and running an executable file.

    Microsoft Windows has proven itself over two decades to be an insecure operating system. This is why Linux is by far the dominant operating system in security-critical fields; most internet web servers are running Linux.

    I use Ubuntu and I love it. It's user-friendly, it's easy, and it's got everything I need and I want (I can type documents, do spreadsheets, burn DVD's, watch YouTube, download movies by BitTorrent).
    buddy first off your an idiot and dont know the first thing about hacking,

    The reason people port scan isnt to run a bullshit kiddie script you scan with Nmap to find open ports and see what services are running then you either A) go through the source of the service and see if you can segfault the it with a BOF - off bye one or download some 0day, and get root on the box. tcp session hijacking is also a huge issue, allot of linux unix hpux bsd sun solaris boxes get rooted because they are running a vuln version of SSH telenetd canot be exploited if you know anything about math your brain would be able to comprehend that services like that which are forwarded cant be exploited do to random sequence numbers, go look up sequences and series in math,
    2nd micro$haft is a bullshit OS i agree but insecure not so much, NULL SESSIONS are a big issue netbios - morons downloading trojans.
    A none server operating system like XP home is only going to be vuln is you have your NET USERS ****ed up or you have filesharing - remote access wide open. hes not going to be running a linux box if he cant figure out why his childs comp got wtf pwnd,

    Heres a quick tip to fix your issue
    go into cmd.exe type in format C:
    reinstall windows change all your passwords on facebook etc etc etc.

    tell your kid to stop downloading child porn off bittorrent and he wont have problems again
    Last edited by prodomino; 05-11-2010 at 02:11 AM.

  8. #8
    Join Date
    Jan 2010
    Location
    Chico CA
    Posts
    181
    Quote Originally Posted by prodomino View Post
    buddy first off your an idiot and dont know the first thing about hacking,

    The reason people port scan isnt to run a bullshit kiddie script you scan with Nmap to find open ports and see what services are running then you either A) go through the source of the service and see if you can segfault the it with a BOF - off bye one or download some 0day, and get root on the box. tcp session hijacking is also a huge issue, allot of linux unix hpux bsd sun solaris boxes get rooted because they are running a vuln version of SSH telenetd canot be exploited if you know anything about math your brain would be able to comprehend that services like that which are forwarded cant be exploited do to random sequence numbers, go look up sequences and series in math,
    2nd micro$haft is a bullshit OS i agree but insecure not so much, NULL SESSIONS are a big issue netbios - morons downloading trojans.
    A none server operating system like XP home is only going to be vuln is you have your NET USERS ****ed up or you have filesharing - remote access wide open. hes not going to be running a linux box if he cant figure out why his childs comp got wtf pwnd,

    Heres a quick tip to fix your issue
    go into cmd.exe type in format C:
    reinstall windows change all your passwords on facebook etc etc etc.

    tell your kid to stop downloading child porn off bittorrent and he wont have problems again
    I think that sums it up. Like he said, why would this guy care about running linux when he doesn't know how to simply reformat. If I get the slightest idea that I have any malware/spyware/ trojan ect.. I instantly reformat. I have had my new pc for 6 months now downloading cracked programs, music, movies and anything I want and have only got 2 virus's so far, both for some crappy rap music my gf downloaded when I wasn't there off kickasstorrents. He is obviously new to this and suggesting what IT pros use is like suggesting heart surgery for the janitor at the hospital.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •