Jump to content
xisto Community

Spurious

Members
  • Content Count

    16
  • Joined

  • Last visited

Posts posted by Spurious


  1. Take a look at Asta Host. They got a theme redesign about the same time Xisto did. At first look their theme might look really pretty, and you might want something like that for this forum. But if you spend some time there reading the topics and posting, the theme begins to look too busy; it's a breath of fresh air to come back to Xisto and view its nice clean look. Flashy themes may first make you think "oooh pretty", but when it comes down to it, functionality and readability are the most important parts of a theme. Also, if you think this theme is boring, take a look at what Xisto used to look like using the wayback machine.

    I actually prefer the default Invision Power Board themes. They are quick, fast and secure.
    I was actually a member of T17 in those days. God knows where my account has gone must of been lost in time and space :lol:

  2. finally. a new one, even with a tight budget. :(

    OS - Windows 7 and upgraded memory to 3GB. Was planning for Intel processor but it only comes with a 64MB graphics, so I have chosen this because it has 512. :lol: Of course I wont use it for gaming I will use my PC instead :P

    • Windows 7 Operating System• AMD Turion X2 Dual-Core Processor for Notebook PCs RM-72
    • 2.10GHz, 1 MB L2 Cache, Up to 3600 MT/s system bus running at AC/DC mode 35 watt
    • 1024 MB Standard Memory
    • DDR2 667MHz (Memory Type)
    • 1 x 1024 MB (Memory Layout)
    • Supports up to 8 GB DDR2 memory
    • 250 GB Internal Storage
    • 5400 rpm HDD Speed
    • SuperMulti 8X DVDąR/RW with Double Layer Support
    • 14.1” Diagonal WXGA High-Definition HP BrightView Widescreen Display
    • ATI Radeon HD 3200 Graphics
    • 3 USB 2.0, 1 HDMI, 1 VGA, 1 RJ-11, 1 RJ-45, 1 Stereo headphone-out, 1 Microphone in
    • Altec LansingŽ speakers
    • Integrated 10/100BASE-T Ethernet LAN (RJ-45 connector)
    • High speed 56K modem
    • Wireless LAN 802.11b/g
    • 33.4 cm (L) x 23.7 cm (W) x 3.3 cm (min H) / 4.0 cm (max H)
    • 2.29 kg
    • 65 W AC Power Adapter
    • 6-cell Lithium-Ion (Li-Ion) battery



  3. I've recently started playing Wofenstein, the game seems good so far it almost has the quality feel like COD4/5 with a little bit of Medal of Honor type feel.I have yet to complete the game but once I've done so I will update this post and let you know what I think of the game overall.If you are playing the game or have finished the game please let me know what you think about it and what rating would you give it from 1-10 (1 being really bad and 10 being super awesome)Thanks y'all!


  4. Hello all at Xisto!
    I thought I best stay out of the way from the moderator's after learning my lesson.

    Today I was reading the news about Chelsea, Before you say no I don't support them I support the Gunners!
    Oh yes the one and only Gunners.

    Here is where I read this from. Fifa who gave the ban.

    After reading it, Yes I do read also :lol: . I saw that Manchester United could be next if they dont buck up there way of buying a player.
    Now, Chelsea are appealing against this decision strongly. Personally I think they deserved it. But I didn't think it should come on that player.

    What do you think?

    // Gunners = Arsenal


  5. I prefer to use Gmail simply because its fast and secure.

    I don't tend to use Operating System Software to check me emails or even add email accounts.

     

    Although over the past few weeks it has been having alot of downtime, Im not sure you have experienced this yourself.

    Here is a Link to why and how long it went down.

    Gmail said it went down for a couple of hours but I think more like 5!

     

    on yahoo for some reason i always end up having my "good stuff" in the spam box o_0

    Same, Yahoo does take some time care and attention to set it up to your standards. I just don't have time to do that.

     

    Spurious


  6. I have a PayPal account like many of us.
    I am not verified on PayPal but you can still receive and send money.

    Is It Necessary To Have Online Banking Enabled To Withdraw From Paypal?

    No it does not have to be enabled. There are two different ways.

    Requesting an Electronic Funds Transfer
    Withdrawing Funds by Check

    Each of these methods require that you have a bank account associated with your PayPal account. All others you dont.
    I have a source here from PayPal to explain a bit more.

  7. I began working for Target at the end of September 2009 about 3 weeks later my Dad's health took a turn for the worst and I had to miss a few days of work. From there everything with him went wrong and my manager knew what was going on. I received compliments from a few of my supervisors but one supervisor in particular found it necessary to give me a hard time, I guess just because. I never had any troubles with anyone or any complaints about anything except for the nights she was supervising. One night my friend who lives over seas called me to tell me his grandmother (she also was like my grandmother, I've known them for years) passed away I was very late for coming back from my lunch finding out this news on top of the health and state of Father sent me into hysteria it never crossed my mind to call work I could barely speak straight once I pulled it together I returned to work to speak with my current sup. she asked me if I wanted to go home and I said no I'll try to make it through the night. She sent me to help over in a different department and I went over there to help, my mind was fogged a little so did sort of forget what to do in that dept. but I managed it as well as I could mid-way into my time over there I heard the person I was helping call for the supervisor to switch to a private channel all of a sudden I get told to switch to a private channel and I get ridiculed ... I was doing my work properly and I did not run off as he had accused me of doing. Throughout the night all I did was help out in places where I was needed without any hesitations -- in fact it was this way throughout my entire time at my job. My 2nd week at Target I received recognition for outstanding work and taking initative and this was during holiday season. I had the entire electric dept. in shape and within 1 hour I began getting the Halloween isle in tip-top condition, towards the end of that a co-worker did come and assist me in touching it up to ensure it was perfect. Whenever I completed my duties I set out to see if there was something else, if not I would help a co-worker. I never complained, ever.
    So fast forward a little bit to Christmas, I told one of the other managers that I would not be able to stay and work late on Christmas Eve she said ok the reasons were my Father Christmas Eve and Christmas Day were his favorite and he wanted me with him fearing it may be our last Christmas, naturually I said ok. So I reminded them that day that I had to leave at 4pm to be with my family. When I returned to work the following Saturday it was time for my evaluation ... surprise, surprise guess who wrote out the eval? The very supervisor who seemed to get herself off with giving me a hard time but the only thing was she asked one of the decent sup. to give me the evaluation. When reading through my evaluation she even seemed shocked, each one was 'Very Dissatisfied' with work, helping co-workers, following dress code, etc up until attendence and I received a 'Somewhat satisfied' ... we all know my attendence had some flaws because of my Father's constant hospitalizations and requirement for care. A few weeks prior to my evaluation I did inform them that I may be leaving in two weeks (it was best because of the family situation) the evalation happened about 1 week before it would have made the two weeks.

    So my eval ::
    Work ; very dissatisfied. . . my work was always done correctly except for a maybe 3 nights where it was just a catastrophe because of the amount of customers and lack of help. And believe me there was always a lack of help. In fact I also requested the supervisor or team lead's show me how to do certain things like properly labeling merchandise and how to put in applications for credit cards for customers wanting a Target card.

    Helping co-workers; very dissatisfied. . . i always helped when i could and none of the co-workers expressed dissatisfaction with me, there was one old lady who just loved drama. I even helped the supervisor do her job once.

    Following dress code; very dissatisfied/spoke with employee twice. . . I could have walked around this way or I could have slipped on a jacket. A month later it was freezing inside and all I had was a gray sweater in my locker, I put that on and I told her I was cold if I could wear the sweater for a little bit. She just looked at me and nodded. All day I heard about how you're suppose to only wear red tops and khaki bottoms, I had the sweater on for maybe 30 min. then tossed it into a cart. Mind you one of the employees there was wearing a navy sweater completely concealing the red shirt and has worn it like that for the entire time I was working there! I didn't point that out because to say "Well she's doing it" is kind of 2nd grade to me.

    Attendence and being on time; somewhat satisfied. . . ok I did not miss a great deal of time but for someone who just began I did miss more then I should haved however the manager and supervisors were all understanding of the situation at home. To say my attendence was better then my work was a huge stab because I know good and well that's *BLEEP*.

    It might of been a blessing I was let go because the next few months were much worse with my Father and in April I lost him.

    With the funeral expenses and paying off some of the rest of his bills I'm without a lot of money and I need a job, even part-time. But now I don't even know what to put on an application when it asks if I've been terminated before. There were times at my job where I could have pushed a little harder, we all do a little better but the evaluation was by far very unfair and the girl having to read it to me even sounded upset. I can't explain to you how much the one sup put me through unfairly.

    I don't know what I should do here now. What do I say and should I inform corporate about the problem I had even though it was 6 months ago? I am a great worker and even the temp I was hired through applauded my workmanship. This is why it's very hard on me and because I am only freshly 19 I can't imagine how this looks. But it isn't correct at all.


    Notice from rvalkass:


  8. Thats a good question!

     

    As of now I'm using SMF to power my fledgling forum. With the hope that it will grow soon, I'm planning to purchase a paid forum package as it gives more control and optimizations. I don't know how many paid forum packages are there but I know that the two biggies are vBulletin(vB) and Invision Power Board(IPB). There seems to be equal praise for both of them and so I'm a bit confused as to which one to take. I've got a year to decide but there's nothing wrong in planning from now :P

    Well most of the company's I have owned on the forums I have used Invision Power Board. Now in most ways that is better.

     

    I've seen IPB on Xisto and on another forum which I frequent and it seems impresssive, though after all these years I've gotten bored of the look and all! The price of a license is $150, which I may be able to afford next year. Then there's vB which I haven't seen a lot but it seems equally good but costs $180. This is where I'm stuck and need some advice from the experienced users. I don't need all those fancy stuff like galleries and blogs - just a plain forum which is in my control!

    If I was for you I would go for Invision Power Board for the following reasons:

     

    1. Security

    2. Look & Feel

    3. Modifications

    4. Skins

    5. Ease

     

    I would also suggets downloading a 8 hour IPB demo of their site.

    Below is a a about Invision Power Board.

     

    As the very core of our Community Suite package, we've made sure that IP.Board is an outstanding bulletin board system. The result of of over seven years experience in developing bulletin board software, IP.Board brings powerful and practical features while remaining intuitive and flexible - and it's now blazing fast too

     

    Brand new default theme

     

    IP.Board 3 ships with an all-new default theme for the front end and admin control panel.

     

    Report center

     

    Reported content is now gathered in one central location for easy handling by moderators.

    Reputation system

     

    Posts can now be rated, earning the author reputation points which can be highlighted with titles and badges.

    Personal Conversations

     

    Users can now create private topics, accessible only to themselves and anyone else they choose to invite.

     

    Friendly URLs

     

    Links throughout IP.Board 3 now use natural language URLs - friendly for humans and search engines.

     

    Applications & Hooks

     

    Install new applications to IP.Board 3, or make use of the new Hooks system to add new functionality to your board.

     

    CSS Driven

     

    IP.Board 3 makes full use of CSS and tableless markup, so you can accomplish most style changes simply with some CSS tweaks - everything from a color change, to a whole new look.

     

    CSS Integrated Template Editor

     

    Markup changes can be made right within IP.Board 3 itself with our innovative template editor. Integrated tabs enable you to work on several templates and CSS files at once!

     

    Multiple Skins

     

    Allow users to customize their own experience by offering multiple skins for them to choose from. You can even specify which skin should be used based on the device being used to access your community.

     

    CSS Emoticons

     

    IP.Board 3 ships with our distinctive emoticons, but you aren't restricted to these alone. Download and install other emoticon packs, and really let users express themselves ;)

     

    Mobile Skin

     

    If users access your community with a smartphone or other mobile device, they'll see a lofi version of your community that's slimmed down and designed especially for small screens.

    CSS Language

     

    Speak the user's language, by installing additional language packs for them to choose from. Language packs translate every aspect of the IP.Board interface, except user-generated content.


  9. Below is some more news about how to stop hacking.
    Im also going to create a tutorial based on this one aswell as my other topic.

    ATTACKS on corporate computer systems from hackers on the Internet pose a serious risk to businesses. The advent of digital economies and the increase in the number of transactions being conducted over the Internet on a daily basis exposes companies to continued security risks, says Eric Levenstein, partner at Werksmans Attorneys.
    "Attacks on corporate data come from some surprising quarters," he says. "Teenage hackers, usually blamed for compromised security, account for just 7% of reported violations, while infiltration by a company's competition peaks at 39%. Even more surprising is that most of the hacking on a network is done by trusted employees. In addition, the potential for private and confidential information being intentionally or inadvertently distributed to the outside world is a real possibility."

    The better approach is to secure access from the Internet to the internal network of a company. Here access control devices include firewalls, which can take a number of forms.

    Advanced firewalls provide detailed logs of incoming and outgoing traffic and have the ability to control this traffic per individual user. Once the network access has been controlled, the content flowing into a network must be controlled.

    Often legitimate traffic may contain illegitimate content in the form of viruses or software. This can allow an external hacker to pass a program into the network so that an attack can be staged from the inside. It is relatively easy for hackers to eavesdrop on Internet traffic and obtain passwords and confidential information. Encryption, where data is scrambled using complex algorithms, can be used to solve this problem.

    "In many cases the Internet is safer than private networks because these networks rely on being hidden from hackers," says Levenstein. "This is not always true and should a hacker connect to a private network via dial-up connections, the barriers that prevent penetration are limited."

    a terrorist group was all the more embarrassing.

    Many technology experts welcomed the intrusion as proof that governments should get more involved in monitoring the Internet.

    What is clear is that businesses and companies carrying out trade on the Internet will not only have to contend with technical issues and security fears, but will also run the risk of surfing into national, and in some instances international, legal problems.



    Souce | With permission

  10. Hi Xisto.

    I found this information on the net :P

    I have actually found it very useful.

    Please leave your comments below ;)

    I will also be creating my own tutorial about this soon (This one isnt really a tutorial)

     

    Sometimes, it's just not enough to simply know that there's a Trojan or Virus onboard. Sometimes you need to know exactly why that file is onboard, how it got there - but most importantly, who put it there.

     

    By enumerating the attacker in the same way that they have enumerated the victim, you will be able to see the bigger picture and establish what you're up against. But how can you do this? Read on...

     

    ## Connections make the world go round ##

     

    The computer world, at any rate. Every single time you open up a website, send an email or upload your webpages into cyberspace, you are connecting to another machine in order to get the job done. This, of course, presents a major problem, because this simple act is what allows malicious users to target a machine in the first place.

     

    # How do these people find their victim?

     

    Well, first of all, they need to get hold of the victim's IP Address. Your IP (Internet Protocol) address reveals your point of entry to the Internet and can be used in many ways to cause your online activities many, many problems. It may not reveal you by name, but it may be uniquely identifiable and it represents your digital ID while you are online (especially so if you're on a fixed IP / DSL etc).

     

    With an IP address, a Hacker can find out all sorts of weird and wonderful things about their victim (as well as causing all kinds of other trouble, the biggest two being Portnukes/Trojans and the dreaded DoS ((Denial of Service)) attack). Some Hackers like to collect IP AddressesPosted Image like badges, and like to go back to old targets, messing them around every so often. An IP address is incredibly easy to obtain - until recently, many realtime chat applications (such as MSN) were goldmines of information. Your IP Address is contained as part of the Header Code on all emails that you send and webpages that you visit can store all kinds of information about you. A common trick is for the Hacker to go into a Chatroom, paste his supposed website address all over the place, and when the unsuspecting victim visits, everything about your computer from the operating system to the screen resolution can be logged...and, of course, the all important IP address. In addition, a simple network-wide port scan will reveal vulnerable target machines, and a war-dialler will scan thousands of lines for exposed modems that the hacker can exploit.

     

    So now that you know some of the basic dangers, you're probably wondering how these people connect to a victim's machine?

     

    ## Virtual and Physical Ports ##

     

    Everything that you recieve over the Internet comes as a result of other machines connecting to your computer's ports. You have two types; Physical are the holes in the back of your machine, but the important ones are Virtual. These allow transfer of data between your computer and the outside world, some with allocated functions, some without, but knowing how these work is the first step to discovering who is attacking you; you simply MUST have a basic knowledge of this, or you won't get much further.

     

    # What the phrases TCP/UDP actually mean

     

    TCP/IP stands for Transmission Control Protocol and Internet Protocol, a TCP/IP packet is a block of data which is compressed, then a header is put on it and it is sent to another computer (UDP stands for User Datagram Protocol). This is how ALL internet transfers occur, by sending packets. The header in a packet contains the IP address of the one who originally sent you it. Now, your computer comes with an excellent (and free) tool that allows you to see anything that is connected (or is attempting to connect) to you, although bear in mind that it offers no blocking protection; it simply tells you what is going on, and that tool is NETSTAT.

     

    ## Netstat: Your first line of defence ##

     

    Netstat is a very fast and reliable method of seeing exactly who or what is connected (or connecting) to your computer. Open up DOS (Start/Programs/MS-DOS Prompt on most systems), and in the MSDOS Prompt, type:

     

    netstat -a

     

    (make sure you include the space inbetween the "t" and the "a").

     

    If you're connected to the Internet when you do this, you should see something like:

     

    Active Connections

     

    Proto Local Address Foreign Address State

    TCP macintosh: 20034 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED

    TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT

    TCP macintosh MACINTOSH: 0 LISTENING

    TCP macintosh MACINTOSH: 0 LISTENING

    TCP macintosh MACINTOSH: 0 LISTENING


    Now, "Proto(col)" simply means what kind of data transmission is taking place (TCP or UDP), "Local address" is your computer (and the number next to it tells you what port you're connected on), "Foreign Address" is the machine that is connected to you (and what port they're using), and finally "State" is simply whether or not a connection is actually established, or whether the machine in question is waiting for a transmission, or timing out etc.

     

    Now, you need to know all of Netstat's various commands, so type:

     

    netstat ?

     

    You will get something like this:

     

    Displays protocol statistics and current TCP/IP network connections.

     

    NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

     

    -a Displays all connections and listening ports.

    -e Displays Ethernet statistics. This may be combined with the -s option.

    -n Displays addresses and port numbers in numerical form.

    -p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP. If used with the -s option to display per-protocol statistics, proto may be TCP, UDP, or IP.

    -r Displays the routing table.

    -s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the -p option may be used to specify a subset of the default.

     

    Have a play around with the various options, but the most important use of these methods is when you combine them. The best command to use is

     

    netstat -an

     

    because this will list all connections in Numerical Form, which makes it a lot easier to trace malicious users....Hostnames can be a little confusing if you don't know what you're doing (although they're easily understandable, as we shall see later). Also, by doing this, you can also find out what your own IP address is, which is always useful.

     

    Also,

     

    netstat -b

     

    will tell you what ports are open and what programs are connecting to the internet.

     

    ## Types of Port ##

     

    It would be impossible to find out who was attacking you if computers could just access any old port to perform an important function; how could you tell a mail transfer from a Trojan Attack? Well, good news, because your regular, normal connections are assigned to low, commonly used ports, and in general, the higher the number used, the more you should be suspicious. Here are the three main types of port:

     

    # Well Known PortsThese run from 0 to 1023, and are bound to the common services that run on them (for example, mail runs on channel 25 tcp/udp, which is smtp (Simple Mail Transfer Protocol) so if you find one of these ports open (and you usually will), it's usually because of an essential function.

     

    # Registered Ports These run on 1024 to 49151. Although not bound to a particular service, these are normally used by networking utilities like FTP software, Email client and so on, and they do this by opening on a random port within this range before communicating with the remote server, so don't panic (just be wary, perhaps) if you see any of these open, because they usually close automatically when the system that's running on them terminates (for example, type in a common website name in your browser with netstat open, and watch as it opens up a port at random to act as a buffer for the remote servers). Services like MSN Messenger and ICQ usually run on these Ports.

     

    # Dynamic/Private PortsRanging from 49152 to 65535, these things are rarely used except with certain programs, and even then not very often. This is indeed the usual range of the Trojan, so if you find any of these open, be very suspicious. So, just to recap:

     

    Well Known Ports 0 to 1023 Commonly used, little danger.

    Registered Ports 1024 to 49151 Not as common, just be careful.

    Dynamic/Private Ports 49152 to 65535 Be extremely suspicious.


    ## The hunt is on ##

     

    Now, it is essential that you know what you're looking for, and the most common way someone will attack your machine is with a Trojan. This is a program that is sent to you in an email, or attempts to bind itself to one of your ports, and when activated, it can give the user your passwords, access to your hard drive...they can even make your CD Tray pop open and shut. At the end of this Document, you will find a list of the most commonly used Trojans and the ports they operate on. For now, let's take another look at that first example of Netstat....

     

    Active Connections

     

    Proto Local Address Foreign Address State

    TCP macintosh: 27374 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED

    TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT

    TCP macintosh MACINTOSH: 0 LISTENING

    TCP macintosh MACINTOSH: 0 LISTENING

    TCP macintosh MACINTOSH: 0 LISTENING

     

    Now, straight away, this should make more sense to you. Your computer is connected on two ports, 80 and 27374. Port 80 is used for http/www transmissions (ie for all intents and purposes, its how you connect to the net, although of course it's a lot more complicated than that). Port 27374, however, is distinctly suspicious; first of all, it is in the registered port range, and although other services (like MSN) use these, let's assume that you have nothing at all running like instant messengers, webpages etc....you're simply connected to the net through proxy. So, now this connection is looking even more troublesome, and when you realise that 27374 is a common port for Netbus (a potentially destructive Trojan), you can see that something is untoward here. So, what you would do is:

     

    1) run Netstat , and use:

     

    Netstat -a

     

    then

     

    Netstat -an

     

    So you have both Hostnames AND IP addresses.

     

    ## Tracerouting ##

     

    Having the attacker's IP is all well and good, but what can you do with it? The answer is, a lot more! It's not enough to have the address, you also need to know where the attacker's connections are coming from. You may have used automated tracerouting tools before, but do you jknow how they work?

     

    Go back to MSDOS and type

     

    tracert *type IP address/Hostname here*

     

    Now, what happens is, the Traceroute will show you all the computers inbetween you and the target machine, including blockages, firewalls etc. More often than not, the hostname address listed before the final one will belong to the Hacker's ISP Company. It'll either say who the ISP is somewhere in there, or else you run a second trace on the new IP/hostname address to see who the ISP Company in question is. If the Hostname that you get back doesn't actually seem to mention an actual geographical location within its text, you may think all is lost. But fear not! Suppose you get a hostname such as

     

    http://haha.com/

     

    Well, that tells us nothing, right? Wrong....simply enter the hostname in your browser, and though many times you will get nothing back, sometimes it will resolve to an ISP, and from there you can easily find out its location and in what areas they operate. This at least gives you a firm geographical location to carry out your investigations in.

     

    If you STILL have nothing, as a last resort you COULD try connecting to your target's ISP's port 13 by Telnet, which will tell you how many hours ahead or behind this ISP is of GMT, thus giving you a geographical trace based on the time mentioned (although bear in mind, the ISP may be doing something stupid like not having their clocks set correctly, giving you a misleading trace. Similarly, a common tactic of Hackers is to deliberately have their computer's clock set to a totally wrong time, so as to throw you off the scent). Also, unless you know what you're doing, I wouldn't advise using Telnet (which is outside the parameters of this tutorial).

     

    ## Reverse DNS Query ##

     

    This is probably the most effective way of running a trace on somebody. If ever you're in a chatroom and you see someone saying that they've "hacked into a satellite orbiting the Earth, and are taking pictures of your house right now", ignore them because that's just bad movie nonsense. THIS method is the way to go, with regard to finding out what country (even maybe what State/City etc) someone resides, although it's actually almost impossible to find an EXACT geographical location without actually breaking into your ISP's Head Office and running off with the safe.

     

    To run an rDNS query, simply go back to MS-DOS and type

     

    netstat

     

    and hit return. Any active connections will resolve to hostnames rather than a numerical format.

     

    # DNS

     

    DNS stands for Domain Name Server. These are machines connected to the Internet whose job it is to keep track of the IP Addresses and Domain Names of other machines. When called upon, they take the ASCII Domain Name and convert it to the relevant numeric IP Address. A DNS search translates a hostname into an IP address....which is why we can enter "https://login.live.com/jsDisabled.srf?mkt=EN-US&lc=1033; and get the website to come up, instead of having to actually remember Hotmail's IP address and enter that instead. Well, Reverse DNS, of course, translates the IP Address into a Hostname (ie - in letters and words instead of numbers, because sometimes the Hacker will employ various methods to stop Netstat from picking up a correct Hostname).

     

    So, for example,

     

    298.12.87.32 is NOT a Hostname.

    mail6.bol.net.au IS a Hostname.

     

    Anyway, see the section at the end? (au) means the target lives in Australia. Most (if not all) hostnames end in a specific Country Code, thus narrowing down your search even further. If you know your target's Email Address (ie they foolishly sent you a hate mail, but were silly enough to use a valid email address) but nothing else, then you can use the Country codes to deduce where they're from as well. You can also deduce the IP address of the sender by looking at the emails header (a "hidden" line of code which contains information on the sender)...on Hotmail for example, go to Preferences, and select the "Full Header's Visible" option. Alternatively, you can run a "Finger" Trace on the email address, at:

     

    http://www.samspade.org/

     

    Plus, some ISP's include their name in your Email Address with them too (ie Wanadoo, Supanet etc), and your Hacker may be using an email account that's been provided by a Website hosting company, meaning this would probably have the website host's name in the email address (ie Webspawners). So, you could use the information gleaned to maybe even hunt down their website (then you could run a website check as mentioned previously) or report abuse of that Website Provider's Email account (and thus, the Website that it goes with) to

     

    abuse@companynamegoeshere.com

     

    If your Hacker happens to reside in the USA, go to:

     

    https://www.usps.com/

     

    for a complete list of US State abbreviatons.

     

    ## List of Ports commonly used by Trojans ##

     

    Please note that this isn't a complete list by any means, but it will give you an idea of what to look out for in Netstat. Be aware that some of the lower Ports may well be running valid services.

     

    UDP: 1349 Back Ofrice DLL

    31337 BackOfrice 1.20

    31338 DeepBO

    54321 BackOfrice 2000

     

     

    TCP: 21 Blade Runner, Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash

    23 Tiny Telnet Server

    25 Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, Terminator, WinPC, WinSpy, Kuang2 0.17A-0.30

    31 Hackers Paradise

    80 Executor

    456 Hackers Paradise

    555 Ini-Killer, Phase Zero, Stealth Spy

    666 Satanz Backdoor

    1001 Silencer, WebEx

    1011 Doly Trojan

    1170 Psyber Stream Server, Voice

    1234 Ultors Trojan

    1243 SubSeven 1.0 - 1.8

    1245 VooDoo Doll

    1492 FTP99CMP

    1600 Shivka-Burka

    1807 SpySender

    1981 Shockrave

    1999 BackDoor 1.00-1.03

    2001 Trojan Cow

    2023 Ripper

    2115 Bugs

    2140 Deep Throat, The Invasor

    2801 Phineas Phucker

    3024 WinCrash

    3129 Masters Paradise

    3150 Deep Throat, The Invasor

    3700 Portal of Doom

    4092 WinCrash

    4567 File Nail 1

    4590 ICQTrojan

    5000 Bubbel

    5000 Sockets de Troie

    5001 Sockets de Troie

    5321 Firehotcker

    5400 Blade Runner 0.80 Alpha

    5401 Blade Runner 0.80 Alpha

    5402 Blade Runner 0.80 Alpha

    5400 Blade Runner

    5401 Blade Runner

    5402 Blade Runner

    5569 Robo-Hack

    5742 WinCrash

    6670 DeepThroat

    6771 DeepThroat

    6969 GateCrasher, Priority

    7000 Remote Grab

    7300 NetMonitor

    7301 NetMonitor

    7306 NetMonitor

    7307 NetMonitor

    7308 NetMonitor

    7789 ICKiller

    8787 BackOfrice 2000

    9872 Portal of Doom

    9873 Portal of Doom

    9874 Portal of Doom

    9875 Portal of Doom

    9989 iNi-Killer

    10067 Portal of Doom

    10167 Portal of Doom

    10607 Coma 1.0.9

    11000 Senna Spy

    11223 Progenic trojan

    12223 Hack´99 KeyLogger

    12345 GabanBus, NetBus

    12346 GabanBus, NetBus

    12361 Whack-a-mole

    12362 Whack-a-mole

    16969 Priority

    20001 Millennium

    20034 NetBus 2.0, Beta-NetBus 2.01

    21544 GirlFriend 1.0, Beta-1.35

    22222 Prosiak

    23456 Evil FTP, Ugly FTP

    26274 Delta

    30100 NetSphere 1.27a

    30101 NetSphere 1.27a

    30102 NetSphere 1.27a

    31337 Back Orifice

    31338 Back Orifice, DeepBO

    31339 NetSpy DK

    31666 BOWhack

    33333 Prosiak

    34324 BigGluck, TN

    40412 The Spy

    40421 Masters Paradise

    40422 Masters Paradise

    40423 Masters Paradise

    40426 Masters Paradise

    47262 Delta

    50505 Sockets de Troie

    50766 Fore

    53001 Remote Windows Shutdown

    54321 SchoolBus .69-1.11

    61466 Telecommando

    65000 Devil

     

     

    ## Summary ##

     

    I hope this tutorial is useful in showing you both how to secure yourself against unwanted connections, and also how to determine an attacker's identity. The Internet is by no means as anonymous as some people think it is, and although this is to the detriment of people's security online, this also works both ways....it IS possible to find and stop even the most determined of attackers, you just have to be patient and keep hunting for clues which will help you put an end to their exploits.

     

    > Tracing a hacker

    > Written by: Paperghost [paperghost@vitalsecurity.org]

    > http://sunbeltblog.blogspot.de/

    > Loyalty and Protection for All our Families

    > 24/02/2005

     

    Source BeepingComputer | With permission from owner.

    Spurious



  11. Thank-you for the tutorial much appreciated!

    haha. at my school the admins disabled .bats but they think that we don't know how to make a bat file out of a txt document.... one time a kid had shutdown one lab of computers by doing that and the admins freaked out. it was very funny

    There is an easy way to get around .bat without an RM error. I will post a tutorial soon.
    When we was at school we called them technicians. But things have changed ;).
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.