MIG33 Pantura Community
Would you like to react to this message? Create an account in a few clicks or log in to continue.

How to Detect a Hacker Attack

+3
il_lupo
en-cuk2an
++me2d++
7 posters

Go down

How to Detect a Hacker Attack Empty How to Detect a Hacker Attack

Post by ++me2d++ Sun Sep 28, 2008 12:14 am



Most computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exploits at the same time, a misconfiguration in one of the system components or even a backdoor from an earlier attack.

Due to this, detecting hacker attacks is not an easy task, especially for an inexperienced user. This article gives a few basic guidelines to help you figure out either if your machine is under attack or if the security of your system has been compromised. Keep in mind just like with viruses, there is no 100% guarantee you will detect a hacker attack this way. However, there's a good chance that if your system has been hacked, it will display one or more of the following behaviours.
Windows machines:

* Suspiciously high outgoing network traffic. If you are on a dial-up account or using ADSL and notice an unusually high volume of outgoing network (traffic especially when you computer is idle or not necessarily uploading data), then it is possible that your computer has been compromised. Your computer may be being used either to send spam or by a network worm which is replicating and sending copies of itself. For cable connections, this is less relevant - it is quite common to have the same amount of outgoing traffic as incoming traffic even if you are doing nothing more than browsing sites or downloading data from the Internet.
* Increased disk activity or suspicious looking files in the root directories of any drives. After hacking into a system, many hackers run a massive scan for any interesting documents or files containing passwords or logins for bank or epayment accounts such as PayPal. Similarly, some worms search the disk for files containing email addresses to use for propagation. If you notice major disk activity even when the system is idle in conjunction with suspiciously named files in common folders, this may be an indication of a system hack or malware infection.
* Large number of packets which come from a single address being stopped by a personal firewall. After locating a target (eg. a company's IP range or a pool of home cable users) hackers usually run automated probing tools which try to use various exploits to break into the system. If you run a personal firewall (a fundamental element in protecting against hacker attacks) and notice an unusually high number of stopped packets coming from the same address then this is a good indication that your machine is under attack. The good news is that if your personal firewall is reporting these attacks, you are probably safe. However, depending on how many services you expose to the Internet, the personal firewall may fail to protect you against an attack directed at a specific FTP service running on your system which has been made accessible to all. In this case, the solution is to block the offending IP temporarily until the connection attempts stop. Many personal firewalls and IDSs have such a feature built in.
* Your resident antivirus suddenly starts reporting that backdoors or trojans have been detected, even if you have not done anything out of the ordinary. Although hacker attacks can be complex and innovative, many rely on known trojans or backdoors to gain full access to a compromised system. If the resident component of your antivirus is detecting and reporting such malware, this may be an indication that your system can be accessed from outside.

Unix machines:

* Suspiciously named files in the /tmp folder. Many exploits in the Unix world rely on creating temporary files in the /tmp standard folder which are not always deleted after the system hack. The same is true for some worms known to infect Unix systems; they recompile themselves in the /tmp folder and use it as 'home'.
* Modified system binaries such as 'login', 'telnet', 'ftp', 'finger' or more complex daemons, 'sshd', 'ftpd' and the like. After breaking into a system, a hacker usually attempts to secure access by planting a backdoor in one of the daemons with direct access from the Internet, or by modifying standard system utilities which are used to connect to other systems. The modified binaries are usually part of a rootkit and generally, are 'stealthed' against direct simple inspection. In all cases, it is a good idea to maintain a database of checksums for every system utility and periodically verify them with the system offline, in single user mode.
* Modified /etc/passwd, /etc/shadow, or other system files in the /etc folder. Sometimes hacker attacks may add a new user in /etc/passwd which can be remotely logged in a later date. Look for any suspicious usernames in the password file and monitor all additions, especially on a multi-user system.
* Suspicious services added to /etc/services. Opening a backdoor in a Unix system is sometimes a matter of adding two text lines. This is accomplished by modifying /etc/services as well as /etc/ined.conf. Closely monitor these two files for any additions which may indicate a backdoor bound to an unused or suspicious port.
++me2d++
++me2d++
Stafftechnician
Stafftechnician

Male Jumlah posting : 2268
Age : 43
Mig33 ID : me2d_ok
Location : Muter2 Pekalongan
Chat Room : Kedungwuni, BATANG, Papua, mig33pantura
FS : me2d_ok@plasa.com
Phone : +6285641255797
Registration date : 15.05.08

http://me2d.peperonity.com

Kembali Ke Atas Go down

How to Detect a Hacker Attack Empty Re: How to Detect a Hacker Attack

Post by en-cuk2an Fri Oct 03, 2008 4:24 am

How to Detect a Hacker Attack 364474 AQ KOQ MALES MOCO SE,...

en-cuk2an
Member
Member

Male Jumlah posting : 106
Age : 44
Location : jombang
Registration date : 28.05.08

Kembali Ke Atas Go down

How to Detect a Hacker Attack Empty Re: How to Detect a Hacker Attack

Post by il_lupo Fri Oct 03, 2008 3:25 pm

Waduh How to Detect a Hacker Attack 364474
Translatorna ijin cuti dlu ya lol!
il_lupo
il_lupo
Stafftranslator
Stafftranslator

Male Jumlah posting : 1728
Age : 39
Mig33 ID : il_lupo
Location : Weleri
Chat Room : Weleri, Kendal dan sekitarnya
FS : barrasaputra@yahoo.com
Registration date : 12.07.08

http://www.kopeng.co.cc

Kembali Ke Atas Go down

How to Detect a Hacker Attack Empty Re: How to Detect a Hacker Attack

Post by ++me2d++ Sat Oct 04, 2008 9:35 pm

kan aq dah pernah blg mw ksh kerjaan buat translator, koq mlh cuuti.. How to Detect a Hacker Attack 11339

ini blm seberapa... msh ada lagi... tungguin yah... How to Detect a Hacker Attack 248890
++me2d++
++me2d++
Stafftechnician
Stafftechnician

Male Jumlah posting : 2268
Age : 43
Mig33 ID : me2d_ok
Location : Muter2 Pekalongan
Chat Room : Kedungwuni, BATANG, Papua, mig33pantura
FS : me2d_ok@plasa.com
Phone : +6285641255797
Registration date : 15.05.08

http://me2d.peperonity.com

Kembali Ke Atas Go down

How to Detect a Hacker Attack Empty Re: How to Detect a Hacker Attack

Post by symbol- Wed Oct 15, 2008 7:47 pm

il_lupo wrote:Waduh How to Detect a Hacker Attack 364474
Translatorna ijin cuti dlu ya lol!

ayooookkk,, aku nunggu ki How to Detect a Hacker Attack 72174
symbol-
symbol-
Stafftechnician
Stafftechnician

Male Jumlah posting : 1260
Age : 33
Mig33 ID : symbol-
Location : kendal
Chat Room : kendal, semarang, magelang, klaten, pekalongan, batang, kaliwungu, boja, sukorejo, kediri, makasar,
FS : id_1302@yahoo.co.id
Phone : +6285641388098
Registration date : 13.08.08

Kembali Ke Atas Go down

How to Detect a Hacker Attack Empty Re: How to Detect a Hacker Attack

Post by ++me2d++ Sun Oct 26, 2008 2:28 am

drg di translate juga yakz... How to Detect a Hacker Attack 11339
++me2d++
++me2d++
Stafftechnician
Stafftechnician

Male Jumlah posting : 2268
Age : 43
Mig33 ID : me2d_ok
Location : Muter2 Pekalongan
Chat Room : Kedungwuni, BATANG, Papua, mig33pantura
FS : me2d_ok@plasa.com
Phone : +6285641255797
Registration date : 15.05.08

http://me2d.peperonity.com

Kembali Ke Atas Go down

How to Detect a Hacker Attack Empty Re: How to Detect a Hacker Attack

Post by chimz_love Sun Oct 26, 2008 3:55 am

kang luppo How to Detect a Hacker Attack 72174 How to Detect a Hacker Attack 72174
chimz_love
chimz_love
Senior member
Senior member

Male Jumlah posting : 624
Age : 34
Mig33 ID : chimz_love; atu1; chimenk
Location : pekalongan
Chat Room : pekalongan; pekalongan.1; cewek
FS : chimz_story@yahoo.com
Phone : +6285641204009
Registration date : 12.06.08

Kembali Ke Atas Go down

How to Detect a Hacker Attack Empty Re: How to Detect a Hacker Attack

Post by **ali_sakit** Sun Oct 26, 2008 5:25 pm

Saya coba mengartikan:
pokoknya intinya gtu.thankz
**ali_sakit**
**ali_sakit**
CO-Moderator
CO-Moderator

Male Jumlah posting : 2268
Age : 35
Mig33 ID : ali_sakit al.i
Location : JAKARTA
Chat Room : BATANG,pekalongan33
FS : makin_membusuk@yahoo.com
Phone : +6285642535866
Registration date : 16.05.08

http://fatalmig.hexat.com

Kembali Ke Atas Go down

How to Detect a Hacker Attack Empty Re: How to Detect a Hacker Attack

Post by symbol- Mon Oct 27, 2008 2:12 pm

piye maksudmu li huh
symbol-
symbol-
Stafftechnician
Stafftechnician

Male Jumlah posting : 1260
Age : 33
Mig33 ID : symbol-
Location : kendal
Chat Room : kendal, semarang, magelang, klaten, pekalongan, batang, kaliwungu, boja, sukorejo, kediri, makasar,
FS : id_1302@yahoo.co.id
Phone : +6285641388098
Registration date : 13.08.08

Kembali Ke Atas Go down

How to Detect a Hacker Attack Empty Re: How to Detect a Hacker Attack

Post by jd... Fri Nov 14, 2008 8:28 am

il_lupo wrote:Waduh How to Detect a Hacker Attack 364474
Translatorna ijin cuti dlu ya lol!


translatornya paiyaH nicH no problem
jd...
jd...
Topposter
Topposter

Male Jumlah posting : 1258
Age : 33
Mig33 ID : fuckcde
Location : batang & semarang
Chat Room : batang
FS : fuckcde@mig33.com
Phone : +628562724000
Registration date : 10.06.08

Kembali Ke Atas Go down

How to Detect a Hacker Attack Empty Re: How to Detect a Hacker Attack

Post by Sponsored content


Sponsored content


Kembali Ke Atas Go down

Kembali Ke Atas


 
Permissions in this forum:
Anda tidak dapat menjawab topik