Results 1 to 25 of 25

Thread: HELP!!!! Son's computer was hacked....

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Join Date
    Jan 2006
    Location
    Houston
    Posts
    4,225
    Quote Originally Posted by ErectileTissue View Post
    I'm pretty experienced with hacking. I actually have my own website but I can't give a link to it here because everyone in my "real life" will know I'm on steroids.

    Step 1 of hacking a computer over a network connection is to perform a "port scan" on the victim computer. A port scan will give you a list of "open ports" on the computer being targeted.

    Typically, a port scan on a fresh install of Microsoft Windows will reveal about 3 open ports. That's 3 ways you have of f***ing around with the computer and trying to gain access to it.

    Once you've figured out which ports are open, you can run a piece of software such as "fast track" which automatically performs hacking attempts on the victim computer. When it has gained access, it will tell you, and you will have a choice of what way to control and interact with the victim computer.

    Now here's the thing... if you port scan a default installation of Linux or Mac OS (which are both derived from the original Unix operating system), then there will be no open ports. This is the most important thing in preventing hacking of your system.

    But let's say you need to have an open port on your computer because you have enabled something like File Sharing. On a Microsoft Windows computer, this leaves you WIDE OPEN for attack... and a diligent attacker will sooner or later gain access.

    There are other ways of hacking a computer across a network, such as "client side" attacks. One common strategy is to place yourself between the victim computer and the router so that all traffic gets passed through your own computer. You can alter the traffic and change it to say stuff like "Your Flash player is too old to play this YouTube video, you need to upgrade" and then you can let the poor user download a trojan horse program to their PC.

    Linux happens to be the operating system of choice for use by hackers... and who knows more about hacking than hackers? They are a close community who work together to ensure that their operating system is secure.

    When an operating system, (or even just a normal program), has a flaw in it that allows it to be taken control of, its known in hacking as a vulnerability.Microsoft Windows has had several thousand vulnerabilities over the years, and more are discovered daily. I'm not exaggerating, they are discovered DAILY.
    Linux, on the other hand, gets a vulnerability discovered about once a year, and it's Big Newswhen a vulnerability gets discovered because it happens so rarely.

    Also, zimmy, you make a good point about Linux being "less attacked" than Microsoft Windows. All the trojan horses bouncing around the internet are designed to manipulate a Microsoft Windows machine. These trojan horse programs won't even run on Linux, nor an Apple Mac.

    Linux is secure because it's secure, plain and simple, not simply because it hasn't been targeted as much by hackers.



    This is false, and I know it's false because I tested it out myself with my own hacking tools. When I installed Ubuntu onto my laptop about 6 months back, I got a friend to come around with this computer and I tried everything I could to hack my Linux machine. First thing I did was port scan my laptop... and my laptop didn't even reply... it didn't even reply to say that ports were closed... it simply sat there silently and refused to communicate.

    So let's say you want to hack my Linux laptop by using a "client side" attack... well you're gonna have to go find a trojan horse program that will actually run on Linux, and then you'll also have to be able to fool me into downloading and running an executable file.

    Microsoft Windows has proven itself over two decades to be an insecure operating system. This is why Linux is by far the dominant operating system in security-critical fields; most internet web servers are running Linux.

    I use Ubuntu and I love it. It's user-friendly, it's easy, and it's got everything I need and I want (I can type documents, do spreadsheets, burn DVD's, watch YouTube, download movies by BitTorrent).

    Not gonna bother correcting all the inacuracies. There are way more than 3 open ports on windows default installs and about 5 on linux which btw is not unix at all. I'm glad you found something you like ...great. Glad you have a "hacking" web site. Not gonna tell you or anyone else my credentials. You think you are right, and I know I'm right. I graduated from script kiddie to in the know along time ago.

  2. #2
    Join Date
    Sep 2009
    Location
    R.I.P T
    Posts
    5,244
    I would install the firewall that zimmy recommended and also to remove spyware you can use this

    http://download.cnet.com/Malwarebyte...html?tag=mncol

    its free and should get the spyware

  3. #3
    Join Date
    Jan 2006
    Location
    Houston
    Posts
    4,225
    Quote Originally Posted by MaNiCC View Post
    I would install the firewall that zimmy recommended and also to remove spyware you can use this

    http://download.cnet.com/Malwarebyte...html?tag=mncol

    its free and should get the spyware
    I love that one. It's free and usually gets what most of the other pay for programs miss.

  4. #4
    Join Date
    Jul 2009
    Location
    UK
    Posts
    993
    Quote Originally Posted by zimmy View Post
    Not gonna bother correcting all the inacuracies.
    So that's the end of the debate?!

    If I'd know it was that easy to end a debate I would have just replied to your previous post with "I'm not gonna bother correcting you".

    There are way more than 3 open ports on windows default installs
    You say that as if it's something to boast about.

    Open ports = Possible ways of getting hacked

    An operating system should have no open ports at all until the user explicitly opens one.

    and about 5 on linux which btw is not unix at all.
    Give me a second and I'll do a port scan on my own laptop. Here's the results:

    Code:
    Starting Nmap 5.00 ( http://nmap.org ) at 2010-05-06 20:53 ICT
    Interesting ports on localhost (127.0.0.1):
    Not shown: 999 closed ports
    PORT     STATE SERVICE
    22/tcp   open  ssh
    
    Nmap done: 1 IP address (1 host up) scanned in 0.35 seconds
    The only reason port 22 is open is because I opened it myself!

    Both Linux and Mac OS are direct descendants of the Unix operating system. If you don't believe me then educate yourself:

    http://en.wikipedia.org/wiki/*nix

    Linux and Mac OS have the same simple command line programs (stuff like cp mv whoami pwd find ls) because the were inherited from Unix.

    I started out as a Microsoft Windows user, I had the first version ever of Windows on my PC. Soon afterwards I had Windows 3.11 for Workgroups. Then Windows 95. Then Windows 98. Then Windows Millenium. Then Windows XP.

    Microsoft Windows XP was the last ever Microsoft operating system I used, because I discovered Linux and made the switch.

    Having been using Linux for about 2 years now, I'm glad I abandoned Microsoft software.

    I'm glad you found something you like ...great.
    Thanks, yeah, Linux is pretty cool.

    Glad you have a "hacking" web site. Not gonna tell you or anyone else my credentials. You think you are right, and I know I'm right. I graduated from script kiddie to in the know along time ago.
    "In the know"???! You're using Microsoft software buddy. Go to any PC security specialist and tell him that you're relying on Microsoft to keep your company secure.... they'll probably have a stroke.

  5. #5
    Quote Originally Posted by ErectileTissue View Post
    So that's the end of the debate?!

    If I'd know it was that easy to end a debate I would have just replied to your previous post with "I'm not gonna bother correcting you".

    You say that as if it's something to boast about.

    Open ports = Possible ways of getting hacked

    An operating system should have no open ports at all until the user explicitly opens one.

    Give me a second and I'll do a port scan on my own laptop. Here's the results:

    Code:
    Starting Nmap 5.00 ( http://nmap.org ) at 2010-05-06 20:53 ICT
    Interesting ports on localhost (127.0.0.1):
    Not shown: 999 closed ports
    PORT     STATE SERVICE
    22/tcp   open  ssh
    
    Nmap done: 1 IP address (1 host up) scanned in 0.35 seconds
    The only reason port 22 is open is because I opened it myself!

    Both Linux and Mac OS are direct descendants of the Unix operating system. If you don't believe me then educate yourself:

    http://en.wikipedia.org/wiki/*nix

    Linux and Mac OS have the same simple command line programs (stuff like cp mv whoami pwd find ls) because the were inherited from Unix.

    I started out as a Microsoft Windows user, I had the first version ever of Windows on my PC. Soon afterwards I had Windows 3.11 for Workgroups. Then Windows 95. Then Windows 98. Then Windows Millenium. Then Windows XP.

    Microsoft Windows XP was the last ever Microsoft operating system I used, because I discovered Linux and made the switch.

    Having been using Linux for about 2 years now, I'm glad I abandoned Microsoft software.

    Thanks, yeah, Linux is pretty cool.

    "In the know"???! You're using Microsoft software buddy. Go to any PC security specialist and tell him that you're relying on Microsoft to keep your company secure.... they'll probably have a stroke.
    my dude knows how to download and run a port scanner.. such a hacker... seriously though, i'm glad you know how to use wikipedia homie. ur 5 page essay on linux was a bit unnecessary.

    anyway back to the original topic, i agree with what everyone else said. zonealarm and malware bytes are both awesome programs and should keep you safe.
    Last edited by obvikid334; 05-08-2010 at 02:41 AM.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •