What info does a hacker need to access my computer?
This is a question I've been trying to find out for a while. Every where I look I can't find a direct answer. What I have peiced together is this. If you know the true answer please post a comment.
Have you ever remotely accessed your computer? I don't want to get into explaining this, just look at Jon's blog (blog.rjmolesa.com). He has a big right up on it. Basically how a hacker gets into your system is by installing a server (similar to tight vnc, but one they usually make themselves that is invisible) when you visit a site created by a hacker or hacked by a hacker. It automatically downloads and installs itself on your computer. Then the information a hacker needs is your IP address (to the server they installed) and the password to the server they installed. Both of these are easy to get (they choose the password when they install the server, and you can remotely see a computers IP address).
This is just what I could peice together so, please let me know if you know the true answer. I believe if people knew how hackers were able to do this, they would be able to help protect themselves more.
Have you ever remotely accessed your computer? I don't want to get into explaining this, just look at Jon's blog (blog.rjmolesa.com). He has a big right up on it. Basically how a hacker gets into your system is by installing a server (similar to tight vnc, but one they usually make themselves that is invisible) when you visit a site created by a hacker or hacked by a hacker. It automatically downloads and installs itself on your computer. Then the information a hacker needs is your IP address (to the server they installed) and the password to the server they installed. Both of these are easy to get (they choose the password when they install the server, and you can remotely see a computers IP address).
This is just what I could peice together so, please let me know if you know the true answer. I believe if people knew how hackers were able to do this, they would be able to help protect themselves more.
1 Comments:
You've got the general gists of it. A "hacker" would so much need to install a server on your computer to gain access. There may already be a server running on your computer, that serves other purposes, that he could discover and try to access. Either way, there is a "discovery", "intrusion", and then "control". But yes, one method is for a server to be installed on your computer. It would then email him your IP address when you're online. In the old days subseven and back orface were popular. They were often distributed with other harmless programs through email and once a user ran the program they were silently installed in the background. Today exploits are installed via websites or self propagating worms. Have a look at http://packetstorm.linuxsecurity.com/ and http://astalavista.box.sk to wet your appetite. These days, someone will discover servers that you're running and try known exploits on them in order to gain access. The methods are different for each type of attack.
Post a Comment
Subscribe to Post Comments [Atom]
<< Home