View Full Version : A little question
Ron
December 21st, 2005, 16:47
Hi guys,
I'm new here and have a little question...
I was wondering, how to Detect a Hacker Attack?
Thank you for your help
Woodmann
December 21st, 2005, 19:12
Howdy,
You have to look at your log files and other secret stuff.
Script attacks are easy to see. People peeking in the backdoor
take a little more effort.
Woodmann
SiGiNT
December 21st, 2005, 19:53
I have had the dubious "pleasure" of being at mu cpu while it was being hacked, behind both ZA and a hardware firewall, probably the best indication is your system resources being sucked down to a minimum - your mouse begins to move very slowly and somewhat jerky - after about 10 seconds I realized what was going on and hit the power switch - too late the damage had been done - I know eaxctly who it was - (a software company), they were busily disabling a product of theirs, I guess I can't complain turnabout is fairplay in an odd sort of way - I've also had another somehow hook me when I visited their PUBLIC ftp site - and basically opened a backdoor by forcing my computer to log into their ftp site every time i used IE's dropdown history bar - they never actually did anything though.
SiGiNT
LLXX
December 21st, 2005, 23:52
The best way to prevent attacks would be to close off all your ports and disable all services listening on them, so hackers don't have any ways of entering the system. I've never used a software or a hardware firewall, and have never been hacked because there is nothing to hack

Silver
December 22nd, 2005, 07:40
Quote:
The best way to prevent attacks would be to close off all your ports and disable all services listening on them |
Although that only helps prevent attacks initiated from the outside. If you're unlucky enough to initiate an attack yourself (malicious software, webpage etc) then you're out of luck. After all you can only close off all your ports in one direction - if you close outbound and inbound then you're not going to get particularly far

. Then the attack is part of an established session, therefore the external attacker doesn't need you to allow incoming connections...
Powered by vBulletin® Version 4.2.2 Copyright © 2018 vBulletin Solutions, Inc. All rights reserved.