General discussion


PC Access

By gforce44 ·
How does a hacker gain access to your PC and how would I know if he/she is trying to access my PC?

This conversation is currently closed to new comments.

Thread display: Collapse - | Expand +

All Comments

Collapse -

by BFilmFan In reply to PC Access

Usually it is accomplished via creating a back door in a service or program through any manner of well known exploits.

There are a number of articles here on TR and other sites on these.

Collapse -

by dmiles In reply to PC Access

Windows machines:
Suspiciously high outgoing network traffic. If you are on a dial-up account or using ADSL and notice an unusually high volume of outgoing network (traffic especially when you computer is idle or not necessarily uploading data), then it is possible that your computer has been compromised. Your computer may be being used either to send spam or by a network worm which is replicating and sending copies of itself. For cable connections, this is less relevant - it is quite common to have the same amount of outgoing traffic as incoming traffic even if you are doing nothing more than browsing sites or downloading data from the Internet.
Increased disk activity or suspicious looking files in the root directories of any drives. After hacking into a system, many hackers run a massive scan for any interesting documents or files containing passwords or logins for bank or epayment accounts such as PayPal. Similarly, some worms search the disk for files containing email addresses to use for propagation. If you notice major disk activity even when the system is idle in conjunction with suspiciously named files in common folders, this may be an indication of a system hack or malware infection.
Large number of packets which come from a single address being stopped by a personal firewall. personal firewalls and IDSs have such a feature built in.
Your resident antivirus suddenly starts reporting that backdoors or trojans have been detected, even if you have not done anything out of the ordinary. Although hacker attacks can be complex and innovative, many rely on known trojans or backdoors to gain full access to a compromised system.

Collapse -

by sgt_shultz In reply to PC Access

they need to run code to get in.
they can run code in gobs of ways.
lots of windows security patches plug holes made by windows routines that don't properly for error conditions. hackers can write code that trips a routine into error and 'tricks' it into running their code.
there are lots of other ways. simplest way is to get the user to actually execute your code for you, like by installing and running a free download of a screensaver.
Consider installing a firewall product such as Zone Alarm or Symantec. you can configure to monitor the likely hacker traffic in 'verbose' mode, then you can see 'who' and what is talking in and out.
you will only have an ip address. it doesn't take much to 'hide' behide an anonymous ip address.
if you wish to take action, see this website for the steps required:

Collapse -

by sgt_shultz In reply to

one of the best articles i've ever read, an exective overview of hacking is a geez maybe 12 years old now: How Hackers get in and How they are caught. i remember its authored by a woman but i am sorry i don't remember the name.
I keep copies and if management wants to get a good feel for what hacking is, I ask them to read it. a well done and not too long article.

Collapse -

by sgt_shultz In reply to

from Scientific American Magazine.
How Hackers Get In and How the are Caught.
I think you can download it from the sciam website (for small fee)
a good book is Hacking Revealed

Collapse -

by wlbowers In reply to PC Access

You run an unprotected computer. Or one that is not up to date on its def's.

You go to the wrong site. Click on the wrong link. Open the wrong email.

They also run port crawlers. Looking for unprotected open machines.

The only way you will know they are there is to find their tracks or have software detect their presence.

I had one customer on roadrunner with no av or firewall. A hacker had repartitioned her hard drive and was living on 60gig of her 80gig drive.


Collapse -

by catfish182 In reply to PC Access

Here is the process. This is basic random one and unless you irk someone to target you and only you this is how it happens. this is assuming that the person is doing all the work and is on his/her own.

Scanning: they scan a ip range ie for a port. that port hosts a service that might be exploited. they take the results from the scan and move to trying to hack it.

Hacking: 90% of them nowadays are "scriptkiddies" Most do not know much if anything at all and they have scripts that test the ip vs the exploit. some will auto root the computer. Here the hacker will see if the exploited system is worth anything to him.

From here the hacker can set up a warez ftp or just take stuff or delete things.

You can stop this by being aware. Update your apps and OS!! have a firewall if you have broadband. Have not one but 2 spyware scanners.
Update antivirus def also. Techrepublic has some great papers on safeguarding your system.

The key is for the user to be aware. Dont assume anything, if you dont know what a process is, google it.

Collapse -

by catfish182 In reply to

There are other ways but the thing to remember his spyware isnt allways from a hacker. Virus makers and spyware makers are not allways hackers. They are annoying but there is a differance.

Related Discussions

Related Forums