This Forum has been archived there is no more new posts or threads ... use this link to report any abusive content
==> Report abusive content in this page <==
Post Reply 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
I'm falsely accused of breaking a rule on a forum. How can I clear my name?
04-28-2014, 12:24 AM
Post: #2
 
Maybe you are infected with a proxy Trojan, that might sound confusing but i'll make it quick and simple, a proxy Trojan is a type of Trojan that uses your computer to do bad things or normal things, you have an ip so does the hacker the hacker uses your ip how? well like VPN the hacker sends the requests to your computer instead of the server then your computer sends the hacker's requests to the server then the server replies to your computer and you respond to the hacker so the server thinks it's you so basically the hacker is connected to your computer his ip is connected to yours but yours is the one connected to the server so the server thinks it's you, here's a nice hacking lesson i made a while ago it will help you find out if there is a connection on your computer however if the hacker is not a professional you might be able to remove the Trojan with a full scan.

Hacking-scanning-Currports

Level: Absolute beginner

About: Currports is a useful tool if you are hacked one of the best things i found about it is that it can kill the Trojan's connection to the server if you are ratted, Trojans can be made undetectable by anti viruses however they still have to connect somewhere i will talk about rats in another lesson.

Go to http://www.nirsoft.net/utils/cports.html and download Currports if you are using 64bits operating system make sure to select that if you don't know English don't worry scroll to the bottom of the page and select your language.

Open currports

Look for any processes you don't like usually hackers use port 100 to connect your computer to their rat so look for port 100

Look at the remote addresses and note anything that looks weird unless it is an application you trust

Ping http://www.noip.com and note their ip cause that's where all the information goes before it goes to most hackers (I am not sure about that one)

Look for any process name that looks weird like Server, My first rat, Rat #, Slave # etc especially ones with .exe at the end.

I hope you enjoyed this lesson, It is good to know how to defend yourself from the evil hackers whos goal is to destroy your privacy, steal, scam etc, i will be talking about catching a scammer and finding out exactly where he/she lives in another lesson.

Lesson made by Christian hacker John Hacket Hackit.

Ads

Find all posts by this user
Quote this message in a reply
Post Reply 


Messages In This Thread
[] - John Hacket - 04-28-2014 12:24 AM

Forum Jump:


User(s) browsing this thread: 1 Guest(s)