BetaONE will rise again!


Reply
  #11  
Old 12th Oct 05, 10:06 AM
JacKDynne's Avatar
JacKDynne JacKDynne is offline
Administrator
 
Join Date: Oct 2001
Location: The Past Through Tomorrow
Posts: 1,591
JacKDynne will become famous soon enoughJacKDynne will become famous soon enough
Send a message via MSN to JacKDynne
http://www.google.com/search?hl=en&q...oogle+Sear ch



/JD
__________________


Reply With Quote
  #12  
Old 13th Oct 05, 09:51 AM
BearCat's Avatar
BearCat BearCat is offline
Administrator
 
Join Date: Jul 2001
Location: Oslo, Norway
Posts: 1,146
BearCat will become famous soon enoughBearCat will become famous soon enough
Quote:
Originally Posted by XPatriot
I was wondering if anyone could possibly tell me how someone could have discovered
not only the passwords to numerous hotmail accounts when some of them are not only
unknown to anyone other than me and when all are unrelated to one another... used in separate identities in Outlook express?
Actually, this is relatively easy with packet sniffing.
You don't need to "lsten" directely to the computer, as long as you have access to parts of the network involved.
A wiretap, or wireless listening (with unencrypted or weakly encrypted wireless)
will reveal the passwords used when checking the e-mail.
And as a "side effect" also your username... so it's all available to be stolen.


More on the subject.
__________________
\|||/
(o o)

----ooO-(_)-Ooo----
Oh, people can come up with statistics to prove anything. 14% of people know that.


Last edited by BearCat : 13th Oct 05 at 10:05 AM.
Reply With Quote
  #13  
Old 14th Oct 05, 07:12 AM
XPatriot's Avatar
XPatriot XPatriot is offline
Member
 
Join Date: Nov 2001
Location: Canada
Posts: 53
XPatriot
Hello again and thanks,

I've did the research via Google on keylogging and only found programs that you would have to open (via email attachments) for them to work and send info to their users. I've read the info on packet sniffers (thanks btw) and it seems to be a local network spy concept. I can assure you that this person found out this information about me before I started using a wireless router, and even so he/she was never connected to my network...
since a promiscuous sniffer as you know can only sniff the data traffic being shared on its local network segment...the offending person does not live in my house..

About keyloggers via email attachements; I mentioned earlier that I only sent one email to this person, they only sent one back. It was to my Yahoo account and the only thing that they would have recieved from that is an IP address...I only used that email address a few times and the communication with this person was to an unknown person and the original conversation was solicited by me...

Ok then, If keyloggers need the host computer to have the Keylogger running on it, and would have had to been executed by me (which I know it wasn't)then a Keylogger is out of the question, and if packet sniffers only work on local networks then that too is out of the question???

Am I wrong??


Reply With Quote
  #14  
Old 14th Oct 05, 11:49 AM
Dudelive Dudelive is offline
Senior Member
 
Join Date: Oct 2001
Location: USA
Posts: 603
Dudelive is an unknown quantity at this point
Go here first and read:
http://www.betaone.net/forum/article.php?a=3

If you have not always been using a firewall that rerports which apps are trying to connect to the internet, then you may have had a keylogger and trojan combination for quite sometime and never knew it. At the same time you need to have been scanning your system for such nasties as those all along.

Just scanning with a virus scanner is not enough anymore as new ones are made daily just to get around someones security programs.

All that you can do now since that all mail is back to normal is clean all computers of all bad things there. This is what I would do.......
1 Format all computers there by writing 1's and 0's to the drive, check the drive
makers direction as to the correct way for each type of drive.
2 Get a firewall that will tell you when an app is connecting out.
3 Get a trojan scanner that will have constant updates
4 A scanner for malware, example...AdAware and there are others

Now that you have a machine with all of the above plus other protection that others here can name, connect the computer to the internet just long enough to get all the things installed from GOOD sources and updated. Then disconnect from the internet.
Then spend several hours scanning your previous backups as well as ALL programs you may have burnt to cd or dvd as a backup....be sure to scan these for problems. When all cd's are scanned you can then install to the other computers.

Watch the firewall and when a program ask for a connection be sure you know what the program is first before allowing it.

If you have a router there is a log file in there that will tell about incoming and out going connections.

Thanks
Dudelive
__________________
Be careful what you ask for, because you might just get it.

Last edited by Dudelive : 14th Oct 05 at 12:08 PM.
Reply With Quote
Reply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump


All times are GMT +1. The time now is 02:35 AM.


Design by Vjacheslav Trushkin for phpBBStyles.com.
Powered by vBulletin® Version 3.6.5
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.