Page 2 of 3 FirstFirst 123 LastLast
Results 11 to 20 of 22

Thread: Stolen ISP Accounts

  1. #11
    it like delting log files using a stolen isp account
    or hacking from a pay phone
    Uhhh... yeah whatever.
    these are some things you could do to keep from getting caught but most people who get caught or who you see in the news for doing a DOS attack on a big web site are mostaly scriptkiddies the other are just hackers who dident want to leave their comferts of home behind wile they have some fun hope this explaned it all for you.
    So many people out there, they pick up on computer related tasks just to be called something, what does all of this make you?

  2. #12
    T3h 1337 N00b kryptonic's Avatar
    Join Date
    Sep 2003
    Location
    Seattle, Washington.
    Posts
    523
    Originally posted here by foxyloxley
    Then he wouldn't have got the room in the first place.
    not true....Ive had friends who hav gotten rooms with fake IDs.

  3. #13
    HeadShot Master N1nja Cybr1d's Avatar
    Join Date
    Jul 2003
    Location
    Boston, MA
    Posts
    1,840
    I'm with lumpy on this one...I have quite a few wireless hotspots near my house...if I "REALLY" wanted to be annonymous...all I have to do is get in my car and drive across teh street.

    If a malicious computer hacker like Kevin Mitnick were to break into my computer while using a stolen ISP account, would the phone company (or anyone) be able to trace the connection back to his address?
    Malicious? AFAIK he's been quite helpful to the security world lately. We've all been young and stupid at one time in our life. You can't call him malicious because of what he did back in the day, just call him by his name without an additions to it...


    nirvanist6 any thing can be traced no one cant be but their are things you can do to stop it like delting log files using a stolen isp account and using some one elses phone line or hacking from a pay phone you can connect to some ones phone line from right out side their house and do what yo uneed to do then they would track it their and you could live miles away or they could track it to a pay phone, not much help for them. these are some things you could do to keep from getting caught but most people who get caught or who you see in the news for doing a DOS attack on a big web site are mostaly scriptkiddies the other are just hackers who dident want to leave their comferts of home behind wile they have some fun hope this explaned it all for you.
    You kids watch way too many movies....but as specialist said....uh whatever.

    Look, the cold truth is that no1 gives a ****....IF you bring enough attention to yourself, you will get caught EVEN if you're hacking from a payphone....which is very hard to do anyways for you amateurs anyways, so dont get your hopes up zer0c00l. If you defaced your buddy's website, no1 is going to give a ****, expect that you might suffer a concusion when your buddy kicks your ass. If you deal more than $5000 in damage with your lack of talent in the world of hacking, then there's a chance you'll get caught.

  4. #14
    Member
    Join Date
    Aug 2004
    Posts
    95

    connecting trojan

    What happens if i implant a trojan in the victim and connect to the victim from a remote location and hack into another system. Once the worker is over i can certain tools to corrupt his hard disk beyond repairable stage. There are open tools available like that.

    no hard disk, no log entries to trace.

  5. #15
    What happens if i implant a trojan in the victim and connect to the victim from a remote location and hack into another system. Once the worker is over i can certain tools to corrupt his hard disk beyond repairable stage. There are open tools available like that.
    First off, if you connect to another computer and the hack from that computer, the computer you connected to to hack from is called a "Zombie", second of all, if you hack from the Zombie and then destroy its HDD, there are no logs on the computer anymore, but the computer doesnt have to keep log anyways, the ISP of zombie computer sure will, then you'd have to hack the ISP (probably very huge and secured) and delete their HDD's which are probably being backed up all the time, lesson is : You loose no matter what, stop suggesting stupid stuff you "could" do !
    O.G at A.O

  6. #16
    Member
    Join Date
    Aug 2004
    Posts
    51
    i worked in a phone company before and we didnt have a care of tracing it, we're just reporting in Fraud and they will tell their customer that they're going to investigate for it, but on the other hand, they are just going to put it into a report and do nothing about it, I agree, the phone company were just counting on how many anomalies are there right now, but they're not tracing it anyways...believe me
    juicy`peanut

  7. #17
    Junior Member
    Join Date
    Aug 2004
    Posts
    17
    Not necessarily.....Mitnick was caught not by where he was calling from*easily forged* but by where the called terminated from.........so in essence of a script kiddy, yes you could catch him......but the smart ones don't get caught hence why you don't hear about them

  8. #18
    HeadShot Master N1nja Cybr1d's Avatar
    Join Date
    Jul 2003
    Location
    Boston, MA
    Posts
    1,840
    What happens if i implant a trojan in the victim and connect to the victim from a remote location and hack into another system. Once the worker is over i can certain tools to corrupt his hard disk beyond repairable stage. There are open tools available like that.

    no hard disk, no log entries to trace.
    What if I just pulled up your IP through the post that you just made, and I started to monitor you. What if I just installed a trojan on your computer, one that I just programed and which your AV will not catch. What if I programed my trojan to open all your ports and post your IP address to numerious Hacking groups. What If i'm also using your computer to surf for porn, and hack other computers through it, purpously leaving traces for them to find your computer.

    What if I was behind you right now, as you read this post, with a knife in my hand, waiting for you to turn your head so I can slice your throat? Sshhh, don't make a sound, and don't you dare look behind you! Thats right..keep reading....good boy....

    What if....?

  9. #19
    Hacking from a payphone? Whatever? It's not exactly hard to do , either with an acoustic coupler or by getting at the wires. Like RijilV said , you never heard about the best hackers.

    /edit: Your post doesn't make any sense at all Kurt. Kamikaze it ? What do you mean ? Be careless?
    -n6

  10. #20
    All the Certs! 11001001's Avatar
    Join Date
    Mar 2002
    Location
    Just West of Beantown, though nobody from Beantown actually calls it "Beantown."
    Posts
    1,230
    Originally posted here by foxyloxley
    Then he wouldn't have got the room in the first place.


    Greenbacks leave no tracks...


    Above ground, vertical, and exchanging gasses.
    Now you see me | Now you don't
    "Relax, Bender; It was just a dream. There's no such thing as two." ~ Fry
    sometimes my computer goes down on me

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •