software for malicious hackers
Page 1 of 2 12 LastLast
Results 1 to 10 of 11

Thread: software for malicious hackers

  1. #1
    Junior Member
    Join Date
    Mar 2003
    Posts
    2

    software for malicious hackers

    there seems to be plenty of software to download to do malicious hacking but could you tell me if there is security software that can spot an attack and attack them back as it seems we are to passive in defence
    apostle

  2. #2
    Banned
    Join Date
    Jan 2003
    Posts
    28
    Theres a program called BLACKICE DEFENDER, that warns you of attacks im not sure if you can attack back, but i think you can dissconnect them from the server and some **** like that.

  3. #3
    Senior Member tampabay420's Avatar
    Join Date
    Aug 2002
    Posts
    953
    Yes, search the IDS & Scanner forums... there should be tons of info...
    I'd personally suggest SNORT (www.snort.org)

    [edit] an IDS is a defensive tool only, although you can always contact the authorities, that's the ultimate hacker-counter-measure [/edit]
    yeah, I\'m gonna need that by friday...

  4. #4
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,324

    Re: software for malicious hackers

    Originally posted here by apostle
    there seems to be plenty of software to download to do malicious hacking but could you tell me if there is security software that can spot an attack and attack them back as it seems we are to passive in defence
    apostle
    Attacking someone back for an attack isn't always a good idea. What if the attacker is spoofing their IP address? You end up attacking someone who is innocent. In addition, there is the ethical issue of attacking someone. You truly become no better than the attacker and you will be subjected to the same laws that he/she is.

    I've yet to see any firewall/IDS that deliberately goes after an attacker, largely due to -- I believe -- the issue of legality.

    Besides, if you know what or how an attack works then your defense should be fairly good and you won't have to worry about an offense since they can't get in.
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  5. #5
    Junior Member
    Join Date
    Feb 2003
    Posts
    19

    Re: Re: software for malicious hackers

    Attacking someone back for an attack isn't always a good idea. What if the attacker is spoofing their IP address? You end up attacking someone who is innocent.
    We don't need a war on the Internet, caused by script kiddies with their brand new tools... Imagine the following case: 2 companies have a reactive IDS which attacks back. Our script kiddie spoofs company #1's ip and attacks the second... What would happen? The two companies attacking each other... and for what reason? A stupid guy?

    So the best thing to do (and the only one!) is defence.

  6. #6
    Junior Member
    Join Date
    Mar 2003
    Posts
    2
    as a newbie i have a lot to learn ,and i will take your advice...thanks for not shooting me down in flames
    apostle

  7. #7
    Banned
    Join Date
    Jan 2003
    Posts
    28
    Good point about contacting the authorities, the FBI or whoever deals with computer crime, are really big into busting people for hacking and stuff like that.

  8. #8
    Senior Member
    Join Date
    Aug 2001
    Posts
    267
    Have you ever heard "It happened to a friend of mine ?". Well (no BS) it did.
    He was getting scanned by someone and decided to try and 'hack' back at them.
    (I said NO NO NO !!! They may know more than you) And they did. His computer
    wouldn't startup the next morning. (files deleted)

  9. #9
    Senior Member
    Join Date
    Feb 2003
    Posts
    282
    MsMittens is right, Spoofing would hide the atackers ip and thus the ip you are atacking is the inosent victim. Often a victims computer is comprimized by a worm or trojan which is then useing the victims computer to atack others. Two wrongs dont make a right, if you suspect malicious activity by somone conecting to your computer the best thing to do is contact their isp by sending an email to abuse@isp.com whatever their abuse email is, and inform them of the incodents.

    Being sure to provide them with the unmodified logs with valid time stamps. And note your timezone, they can then compare their logs with the logs you present and determine the best cource of action. Furthermore launching an atack back may raise flags on your acount and may result in your isp terminateing your acount without any notice.



    Hacking related tools such as keyloggers, viruses, trojans.. have a corosponding set of software determined to defeat these, such as anti-keyloggers, anti-trojan, antivirus, IDS systems...

  10. #10
    Banned
    Join Date
    Feb 2003
    Posts
    106
    in the interest of info there is a tool at www.blackcode.com made by ewen g that monitors ports , windows and other nifty stuff (very comprehensive)and includes customizable messages to be sent to a person trying connect or you can boot them off , syn flood too i believe (don't do that its lame),its called killerwall l337

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •