Pages

Monday, 28 April 2014

Report Hackers

HOW TO REPORT HACKERS

 Stopping hackers can be very difficult sometimes seemingly

impossible. I believe however if you use the right types of

programs combined with self-education on how hackers think,


you can make your computer much safer.

 
Reporting hackers can sometimes be a little bit tricky. A lot of

users never report hack attempts. Simply because they just

don’t care or believe that the “hacker” knows he can’t get into

their system. There is also the reason that users just don’t know

what steps to take once they realize their system is being
 
attacked.

 Once your system is connected to the Internet, some form of

system attack will eventually hit your computer. Most of the

times these attacks will be completely random. While not every

single attack ever made should be reported, repetitious attacks

should. Repeated attacks from the same person/IP address

should always be reported. This is a clear indication that

someone is trying to gain access to your computer.

 
If you are using Black Ice Defender and or Lockdown 2000, you

will be able to see the IP address of the person attempting to

break into your system.

 
What do you do now that you know that someone is attempting

to hack into your computer?

Before you can do anything you will require some utilities. I

recommend getting the following program.

 

·         NetLab

 

Netlab has a variety of utilities combined into one easy to use

application.

You can obtain a copy of Netlab from:

 


 

After obtaining a copy of NetLab and installing it you’ll be ready.

I find the best procedure for this is to begin by identifying how

many times this “individual” has attempted to hack into your

system, and at what times.

 
(Consult your firewall program documentation for instructions on

where to locate the number of attacks originating from an IP

address.)

 
Once you have identified how many times the person has

attempted to gain access and at what time the most recent

attack was, it is a wise idea to check if they actually got through.

To check what is currently connected to your computer, do the

following:

 
     ·         Write down the IP address you were given by Black Ice and

      or Lockdown 2000

·         Click Start

·         Go to Run

·         Type in Command and hit Enter

 

This will bring you to your DOS prompt again.

 

 

 Type the following at the DOS prompt.

 

·         Netstat
 
 This will give you a listing of all active connections to your
 
computer and it will look something like this.
 
 Active Connections

 
Protocol    Local Address    Foreign Address     State
TCP         COMP: 0000      10.0.0.1 : 0000   ESTABLISHED

TCP         COMP:2020       10.0.0.5 : 1010   ESTABLISHED
 
TCP         COMP:9090       10.0.0.3 : 1918  ESTABLISHED
 
Your information will have different numbers. I used the IP
 
address 10.0.0.x for demonstration purposes only.
 
If your attacker is connected to your computer, you will see his IP
 
address in this listing. Compare this listing to the IP address you
 
have written down.
 
In the table above you will see numbers after a (:)
 
For example: COMP: 2020

 
The 2020 represents the port number that the Foreign computer
 
is connected to on your computer.
 
Using our example let’s take a look at the second row. This
 
shows us that someone is connected to our computer on port
 
(2020) from the IP address 10.0.0.5.
 
Once you have assessed that the “hacker” was unsuccessful in
 
his attempts to hack into your computer, you can proceed to
 
gather information to report the attack.
 

Start up NetLab
 
 
·         Type in the IP Address in the indicated area below
 
 



·         After typing in the IP Address Click on Ping indicated

Below
 
At this point you will see one of two results. You will see a
 
response indicating either the person is online or you will see no
 
response indicating they are offline. We do this to check if the
 
person is still connected.
 
 
 
 
1: This is the IP address that you are pinging

2: The time it takes to ping the address.

The next step is to check who the IP address belongs to. You can

do this by using whois.arin.net on the person’s IP address.
 

Once you’ve typed in the IP address in Query String Click on the
Whois button. You will then see who the IP address belongs to.
 
This will reveal who the “hackers” internet service provider is.
 
This is very important, if you can figure out where your attacker

is coming from you can forward the appropriate information to

the right people.
 Let’s recap our procedure in a step-by-step format.
 
A) Drop to the DOS prompt
 
B) Run netstat to check if they got through
 
C) Start Netlab and do a Ping Test to check if they are still
 
    connected
 
D) Do a Whois (Using the whois.arin.net) lookup
 
 Once you’ve done the steps above you will need to send the
 
information to your ISP and the attacker’s ISP. The goal is to
 
give them as much information as you can about the attacker.
 
Both firewall programs (Black Ice Defender) and (Lockdown
 
2000) create log files of each attack. Copy the information along
with your own test and include the times of each attack into an
email and send it to your ISP provider. Send a copy of that email
to your attacker’s ISP provider also.
 
(Note: You may need to call the attackers ISP provider in order to
get the right Email Address. If the call will involve long distance
charges send the message to support@thehackersisp.com)
 
All ISP providers have an Abuse department. They are
responsible for dealing with such issues. If you send the email to
the support department of the “hackers” ISP they will forward it
to the correct division.
 
It is your responsibility to report any attacks being made against
your computer. I encourage you to take an active part in
reporting repeated attacks from the same IP address against
your computer, as these are clear indications of someone
targeting you.
 
It may be that you have something they are interested in, or
perhaps your system has been compromised prior to your
realization, and with the installation of the firewall program you
are now blocking their attacks. Whatever the reason now thatyou are aware your goal is to
 
protect your privacy. 
 




 

No comments:

Post a Comment