Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Ways of getting caught?


ghost's Avatar
0 0

Can you guys please post some of the diffrent ways an attack can get traced back to you?


Mr_Cheese's Avatar
0 1

erm well pretty simple.

basically if anything you do and lead back to you.

you visit site = they have your IP you put "haxored by retarded hacker name" = they can find more info on you

etc, etc

even if you porxy they can leap frog back through the proxies you used.


ghost's Avatar
0 0

Oh, I already knew about those two. But what do you mean they can leap frog back through the proxies you used? Like, what does that mean?


ghost's Avatar
0 0

Using a proxy just shows whether the admin cares enough to trace it. If you really pissed them off then a proxy is pointless.

eg, you login as admin as mess up someones blog - odds are they won't care and might log your ip but not worth the hassle of getting through the proxies.

eg2, you upload a shell and drop the database of a company that has their corporate identity tarnished due to lack of security won't skip a heart beat before reporting you.


ghost's Avatar
0 0

Nevermind


ghost's Avatar
0 0

Ah well you didn't need to give that content.

And maybe you should of thought about just creating a new index and renaming the other one index–2.php

Tell them that in the new index and tell them how you did it. Otherwise they will have no sympathy for you.

Sorry - This is to show your site was vulnerable. Contact me @ email@domain.com for more information.

No damage was caused, index was renamed. If you need help changing back contact me also.

your leet hacking name.


ghost's Avatar
0 0

Nevermind


haklite's Avatar
Member
0 0

Another way is to underestimate the persons firewall capabilities eg trace event, proxies or bouncing dont always hide your identity. Ive had 168 attempts to access my machine in the last week or so but my firewall has a brilliant tracer and all their bouncing has been to no benefit.


haklite's Avatar
Member
0 0

Edit By The_Flash - Sorry double post


ghost's Avatar
0 0

This may be a little bit off topic, but I'm really confused with this IP thing. Why does some ppl keep saying that you can change your IP with DOS command: renew if it ain't possible to hide completely from some1 tracing you? So what does all this mean? What is possible and what's not? I would like some explanation on this so I could be sure about it if some1 tells me something that I think is not true. And btw what about dynamic IP or what was it? What does it have to do with this?


Mr_Cheese's Avatar
0 1

haklite wrote: but my firewall has a brilliant tracer and all their bouncing has been to no benefit.

you actually have a firewall that can trace back peoples bounces and reveal their true IP?

hmm i dont think you understand what a "bounce" actually is. :right:


haklite's Avatar
Member
0 0

Well if you say it mr cheese then Id take your word on it :) it seems to anyways, traced it right back to where it originated which was funny enough where I though the attack may have come from, although in saying that, maybe im just getting another false ID. True I dont really understand the ins and outs of bouncing I understand the basic concept but not any details, in fact, I meant to ask you this week If you had any articles on it or where would be a good place to read up?


haklite's Avatar
Member
0 0

Sorry to take away from your question nyyp. Dynamic addressing means that your IP is not permanent, it is assigned by DHCP server, static IP addressing is when you always have the same IP when connecting. You can renew your IP address by going to dos and typing: ipconfig /release -then ipconfig /renew


Mr_Cheese's Avatar
0 1

in very simple terms.. this is a "bounce".

attackers real ip –> proxy1 (a bounce) –> proxy2 (a bounce) –> victims comp

so if you wanna trace it back you get… proxy2 . but you cant then trace it back through other proxies unless you pay them to hand over logs.. which im sure a firewall cant do :p

all it can do is trace is to where your comp got its attack from, it cant trace it back any further.


haklite's Avatar
Member
0 0

ah, I see, not wasting any more time looking at the tracer then :). Thanks for clearing that up mr cheese. I think Ive alot to learn ;)


ghost's Avatar
0 0

Okay two more things. Isn't it so that if you have static IP you can't renew IP? and another one if you have dynamic wouldn't you then be untraceable?


ghost's Avatar
0 0

No, because even if your IP has changed your ISP can go through its logs and find you….


Mr_Cheese's Avatar
0 1

[edit] opps posted same time as mozzer [/edit]

yeah thats correct mozzer, beacuse then your ISP just looks up the IP and who / what time it was used.


ghost's Avatar
0 0

Ok thanks for answer I thought that there must be some way to trace so that's why I asked :)


ghost's Avatar
0 0

The only way of not getting traced is using a public computer, a computer of somebody else and nobody knows you where there.


ghost's Avatar
0 0

Yer, library computers. The only problem with that is that once they have got to that computer the can see what you took from it etc (Files copied to sticks etc)


ghost's Avatar
0 0

use somebody elses computer and screw him up? very nice…NOT