How to catch a hacker | JamiiForums | The Home of Great Thinkers

Dismiss Notice
You are browsing this site as a guest. It takes 2 minutes to CREATE AN ACCOUNT and less than 1 minute to LOGIN

How to catch a hacker

Discussion in 'Tech, Gadgets & Science Forum' started by Absolute, Sep 23, 2008.

  1. Absolute

    Absolute JF-Expert Member

    Sep 23, 2008
    Joined: Jan 19, 2007
    Messages: 335
    Likes Received: 1
    Trophy Points: 0
    Once a hacker does gain access to your computer, he will purposefully leave a little file or two, that will give him easy access in the future. These files are usually referred to as "trojans." This is one of the facts about hackers that is not very comforting. Even after you take precautions to prevent further attacks, unless you thoroughly clean off the hacker's little access files - he can still easily access your system. Another not so nice fact is that, unless you really learn (or already know) about computer systems, you probably will not either be able to detect, or stop the hacker. You can, however, get help. This is when you need to say, "I need an IP specialist, to catch a hacker".
    Tracing The Hacker's IP Address

    A number of software programs are available now - through the Internet, that will enable you to trace a hacker's IP address to a geographical address. Remember, though, that hackers often borrow other computers (usually unknown to the owner), and do their computer crimes hacking from there. So, before you take any action against someone you think it might be, it is better to let the proper authorities handle it.

    Catching Them Red-Handed
    Basically once there is a hacker attack, you have two options. The first is to shut your system down, and give your computer to a lab to be able to collect the necessary evidence. Apart from the aforementioned programs, if you do much to the computer yourself - you could be destroying the very evidence you need to track a hacker. Of course, if you have not already backed up your data elsewhere, this option may not be available to you. Remember that a hacker can only be prosecuted using the evidence on other people's computers. A second course of action would be to act as if nothing had taken place, and move your sensitive data to another computer. By leaving it alone, and letting the hacker continue, more evidence can be collected against him until there is a solid case. Knowing this fact about how to catch a hacker is very important.

    Besides needing an IP address, you must also learn the ISP from which the attack comes. Port 43 will give you data about the IP and the ISP. Software is available that can tell you these things, and you can also learn about it by going to a whois directory. Then, with this information, you can contact the Webmaster of the ISP, and hopefully, get it stopped.

    Each of us needs to take some serious precautions about preventing our own computers from being broken into (as much as possible). With the software and firewalls that are currently available, perhaps you will never need to be one who cries out, "I need a specialist, to catch a hacker". After you get the necessary programs to make your computer safer, be sure to keep it updated, and prevent computer crimes hacking.
  2. Freelancer

    Freelancer JF-Expert Member

    Sep 24, 2008
    Joined: Sep 22, 2008
    Messages: 2,650
    Likes Received: 1,165
    Trophy Points: 280
    Computer security is a big issue. Are you talking of those things in american context or Africa? IP addresses can be spoofed very easily. legitimate TCP/IP connections can be hijacked. There is also an issue of DHCP, for example i do plug in my laptop on a university LAN and i get the ip dynamically. once iam out that IP will be free available to somebody else. Also what if iam connecting through a firewall which means the visible IP address is not actually the ip address of the computer iam using which means things becomes much more complicated. Also i have my malicious game on the internet people comes and download it. The program act as server by listening to some socket ports and i use it to conect to your PC remotely. How are you going to know if iam hacking your computer or not. Hacking doesn't mean altering of information. Even to see the information you are not entitled to see is hacking. So i can do my stuff and leave no trail. Computer security is not a joke. We need more professionals in this area. By the way you should distinguish between cracking and hacking. For computer scientists hacking means exploring vulnerabilities and suggest or give advice on how to encounter them. Basically what you talking about is cracking. The approach you have used could be called hacking