Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: Whack attack!  (Read 14450 times)

0 Members and 1 Guest are viewing this topic.

BC_Programmer


    Mastermind
  • Typing is no substitute for thinking.
  • Thanked: 1140
    • Yes
    • Yes
    • BC-Programming.com
  • Certifications: List
  • Computer: Specs
  • Experience: Beginner
  • OS: Windows 11
Re: Whack attack!
« Reply #15 on: April 08, 2010, 11:31:06 PM »
Quote
Black Ice Anti-hacker is great to go on the revenge if you or your server is being attacked or DDOSed by reflecting it back

That doesn't make sense. you can't "reflect" a DDOS and actually do anything. you'll just reflect the ping or SYN or ACK or whatever floods right back to the respective machines, most of which will probably just be zombie PCs in a bot-net. Also, this is worse because it adds more processing to each recieved packet during the attack, making the DDOS actually succeed.

Quote
Second, don't be paranoid? Yes be paranoid! It's only the foolish thinks they are safe. Where there's a will there's a way. So long you have a active connection, there's a way in. You can pretty much just slow them down or make it hard enough they give up.
Yawn. you bore me. I've seen the "work" these hackers do when they make their tools, IE, the source code. they make bloody awful programmers for the most part. and I highly doubt the ones that actually know what they're doing are "out in the wild" so to speak.

I'm going to assume "Pro hacker" means Proficient hacker, since there is no such thing as a "professional" hacker any more then there is a such thing as a professional Janitor.

Quote
Kaspersky can detect most keyloggers, however they use a stuffer over the file to make it invisible to most anti-virus scanners.

This sentence doesn't really make any sense. *censored* is a "stuffer"?

anyways,  one "detection" method was to simply see if the file contained the text "Software\Microsoft\Windows\CurrentVersion\Run" anywhere in it, and if it found it, it was flagged a keylogger. Yep that's state of the art detection right there. That was Mcaffee several years ago IIRC.


Quote

Thrid, where there's Microsoft there's a hole of exploits. It's the most targeted and the easiest to find holes in. Keep your software, security and OS up-to-date as much as possible.


yes, I'm quoting forwards and then backwards. oh well.

It's the most targeted but it's not easy to find holes in it, simply because it is targeted more and all the "good ones" were pretty much sealed around XP SP2.

At least Microsoft never by default had IIS set up to accept a backdoor password. Way to go redhat! And <That> was actually easy to find, they just had to look at the source code, it was right there, pretty much two if() statements.
I was trying to dereference Null Pointers before it was cool.

kpac

  • Web moderator


  • Hacker

  • kpac®
  • Thanked: 184
    • Yes
    • Yes
    • Yes
  • Certifications: List
  • Computer: Specs
  • Experience: Expert
  • OS: Windows 7
Re: Whack attack!
« Reply #16 on: April 09, 2010, 03:40:33 AM »
Compare that to people who actually know how to write Byte hashes to exploit certain vulnerable open services and know more than a dozen different languages in mastery including:

PHP, SQL, JavaScript, PERL, blablablabla ... server/client side whatever, you name it.
They're just freaks.
Oh yeah, it takes a lot for them to use milw0rm to find exploits. Most of them wouldn't hack their way out of a paper bag.

Treval

    Topic Starter


    Hopeful

    Thanked: 14
    Re: Whack attack!
    « Reply #17 on: April 09, 2010, 05:05:57 AM »
    Quote
    "If it doesn't it's not as good as everybody seems to think (short answer: yes)"
    I don't agree with that because a good attacker will first shut off both your av and firewall and let your OS believe they are still running while they aren't. Then, they go intrude.

    In my networking class, my prof said "the fact you are typing your password is a vulnerability. Somebody can come and see over your shoulder. This happened at a few work places". Also physical keyloggers etc. =P

    When I first scanned my system with Kaspersky, even my FIREWALL was fully exploitable (it was from 2005 the version I had). Next to that, I had 47 exploitable holes.. I believe if you take any noob's machine and you scan it for vulnerabilities, it will come up full of holes. Most people's JRE is also not up to date. =)

    Yes, milw0rm is .. ****. A paradise for hackers. Or noobs, to say. Anyway.

    Sometimes now and then when I launch MSN I get the message "behavior similar to PDM.Keylogger detected". So what am I supposed to think if it only happens sometimes?

    EEVIAC

    • Guest
    Re: Whack attack!
    « Reply #18 on: April 09, 2010, 06:07:52 AM »
    You know, every time scroll by the networking forum and see "Whack attack", it reminds me of the game I use to play in Show Biz Pizza (which is now Chuck e Cheese), called "Whack-A-Mole"         It's the game where you stand with a club and hammer down the moles when they pop up out of the machine...  ;D
    Not relevant, just had to say it.

    Treval

      Topic Starter


      Hopeful

      Thanked: 14
      Re: Whack attack!
      « Reply #19 on: April 09, 2010, 06:27:10 AM »
      Lmao. I'll try it. =P

      EEVIAC

      • Guest
      Re: Whack attack!
      « Reply #20 on: April 09, 2010, 06:44:05 AM »
      Quote
      Lmao


      I had to google this...  I'm not the most familiar with chat acronyms   ::)

      Treval

        Topic Starter


        Hopeful

        Thanked: 14
        Re: Whack attack!
        « Reply #21 on: April 09, 2010, 06:44:53 AM »
        Poor EEVIAC. I guess I'm just 26. =P

        Azzaboi



          Apprentice
        • Aaron's Game Zone
        • Thanked: 37
          • Aaron's Game Zone
        • Experience: Experienced
        • OS: Windows 7
        Re: Whack attack!
        « Reply #22 on: April 09, 2010, 11:55:34 AM »
        For your questions BC_Programmer

        About Black Ice, I actually agree with you. It was designed with a good idea for servers mostly and had optional features to reflect attacks, basically it was meant to crash the attacking computers but mostly bring down zombies (DDOS probably just be zombie PCs as you said - innocent infected computers) which will just can be setup more. Adding more to the network load for a short time. Like I said fails as a complete firewall.

        While most hackers might be kids playing around make crappy code (kiddy scripts) and making destruction/jokes, you haven't counted everyone in the world. What I meant by "Pro Hacker" or whatever you would like to call them, they spead their time on bigger targets, looking for faults and holes, then just addresses those either by exploiting them to their advantage, leaking the details out to others to mess with, or notifying the owner in their own way about the problem to be fixed. Basically no damage done (by themself but maybe by others), tracks cleaned up after themselves, and sometimes they are helpful. For example, the ex-hacker guy now working for World of Warcraft finding security holes, hacks and cheats - he doesn't write crappy code.

        A "EXE stuffer" is a program which pads over the top of a virus or trojan to make it more hidden from anti-virus scanners. It adds extra dummy code around and inbetween, also increases the filesize a bit. Anti-virus scanners have to then rely on different heuristic methods for detection which aren't as effective and slower.

        ps. They don't need to hide in the run, they could be injected into a service which windows runs in background or an application which the user starts up himself. Much smarter ways.

        I mentioned Microsoft because yes, it's the most targeted, most used and haves the most information about, it is also the most hated. As soon as a hole is found, it's available for everyone to find (information over the net), by the time they have patched it, another is found and it cycles around. Microsoft has a good history of digging holes to fill the others as well. Any OS or software will have it's issues, some are just more of a target. Millions of people finding the holes compared to a few programmers trying to fix them up, work out the math.

        Treval - Behavior similar to PDM.Keylogger detected by Kaspersky, you get in some games, virtual keyboards, security software like BestCrypt, etc, with this issue because that's what it's doing! If it reads your keyboard input in a virtual or direct bypassing way it will be detected. It's up to you to trust it or not. MSN can be accessed and with it's feature to it's basically file sharing all your computer can be exploited easily to take control of your computer files and send and receive data. I've never had the issue of Kaspersky detecting MSN as behavior similar to PDM.Keylogger, you might want to look into that or update to another version. It might be you just have the save msn chat turned on and it's recording what you type. If you tell Kaspersky to allow it, it will ignore it for a while then ask again, you have to tell it to trust, adding it to the Application Control > Threats and exclusions list for it not to check.
        Aaron's Game Zone
        The best free online flash games: http://azzaboi.weebly.com

        Play Games - Play free games at Play Games Arcade

        Treval

          Topic Starter


          Hopeful

          Thanked: 14
          Re: Whack attack!
          « Reply #23 on: April 09, 2010, 12:03:59 PM »
          Yes indeed pro hackers are often contracted as top security staff that work for the Pentagon etc.

          I know a pro hacker (security guy) who is really really really paranoia about things. His computer doesn't have a harddisk, it's wired to another server, if intrusion is detected, in the first few milliseconds the computer auto-shuts off, the connection is killed, etc etc... then he has another computer for the sole purpose of generating 2.000.000 (2 million!) different passwords per hour so that it's harder to break in. He has blast proof doors and walls and has camera's EVERYWHERE. Every door every corner everything. He has like 8 NICs working together as firewalls/distribution systems... it's just madness.

          Well at least he's safe. =P

          EEVIAC

          • Guest
          Re: Whack attack!
          « Reply #24 on: April 10, 2010, 02:20:39 AM »
          That's interesting.  Being a security specialist, you may become too well-known in the hacker world and may become a target, at risk for who-knows-what...  :P

          If I were a security specialist, I would prefer to stay anonymous, if possible.

          BC_Programmer


            Mastermind
          • Typing is no substitute for thinking.
          • Thanked: 1140
            • Yes
            • Yes
            • BC-Programming.com
          • Certifications: List
          • Computer: Specs
          • Experience: Beginner
          • OS: Windows 11
          Re: Whack attack!
          « Reply #25 on: April 10, 2010, 08:32:15 AM »
          Well at least he's safe. =P

          You should let him know that if he is ever under the influence of a mind control device all of his work will be for naught!

          I'd try to get him to wear a tin-foil hat or something like that, he seems like a edgy fellow that just needs a nudge in that direction.

          of course if you <like> him you mgiht nudge him towards a therapist. That sounds more like that mental illness (I forget the name) where you think everybody is out to get you.
          I was trying to dereference Null Pointers before it was cool.

          Treval

            Topic Starter


            Hopeful

            Thanked: 14
            Re: Whack attack!
            « Reply #26 on: April 10, 2010, 09:02:18 AM »
            BC_Programmer, do you live in fairytaleland? It's not an offense but you seem to act like it.
            If your job is to work from home and log into/transfer top secret FBI/government data, then yes, your house is best to be like that and your computer setup.

            BC_Programmer


              Mastermind
            • Typing is no substitute for thinking.
            • Thanked: 1140
              • Yes
              • Yes
              • BC-Programming.com
            • Certifications: List
            • Computer: Specs
            • Experience: Beginner
            • OS: Windows 11
            Re: Whack attack!
            « Reply #27 on: April 10, 2010, 09:04:24 AM »
            If your job is to work from home and log into/transfer top secret FBI/government data, then yes, your house is best to be like that and your computer setup.
            Yo unever said where he worked or what he did. You just said "Pro Hacker Security guy" which is rather vague.
            I was trying to dereference Null Pointers before it was cool.

            mroilfield



              Mentor
            • Thanked: 42
              • Yes
              • Yes
            • Computer: Specs
            • Experience: Experienced
            • OS: Windows 11
            Re: Whack attack!
            « Reply #28 on: April 10, 2010, 09:17:22 AM »
            BC_Programmer, do you live in fairytaleland? It's not an offense but you seem to act like it.
            If your job is to work from home and log into/transfer top secret FBI/government data, then yes, your house is best to be like that and your computer setup.

            I highly doubt that he will be working from home sending "Top Secret" government data from his home PC. I also highly doubt that he would be talking to you about it. It sounds to me like this guy feeding you a bunch of crap.
            You can't fix Stupid!!!

            kpac

            • Web moderator


            • Hacker

            • kpac®
            • Thanked: 184
              • Yes
              • Yes
              • Yes
            • Certifications: List
            • Computer: Specs
            • Experience: Expert
            • OS: Windows 7
            Re: Whack attack!
            « Reply #29 on: April 10, 2010, 11:23:26 AM »
            Quote
            It sounds to me like this guy feeding you a bunch of crap.
            Or maybe Treval is making up the bunch of crap. :D