He is employed by a multi national to secure their system and is apparently a 'white hat' hacker.This assumes, of course, you're actually hacking. Most people who claim to be hackers aren't.
Nice guy but a bit shy around women.
He is employed by a multi national to secure their system and is apparently a 'white hat' hacker.This assumes, of course, you're actually hacking. Most people who claim to be hackers aren't.
I hope he's hacking your communication then. Because if it's anything else, he loses white hat status once he's caught. As a former white hat who keeps his certifications, I wouldn't do anything to prove I can like you claim. Instant violation of white hat ethics.He is employed by a multi national to secure their system and is apparently a 'white hat' hacker.
Nice guy but a bit shy around women.
You can even do this yourself to get an idea of the probable routers to most destination IPs by using a basic command called tracert (pronouced 'trace route'). It gives you a list of all the routers an ICMP packet (ping) had to go through to get to a destination.Oh so any one who has access can easily predict the most likely hubs/routers that will be servicing a given destination IP.
Thanks, I know what a string is. But I don't sign emails. I also encrypt everything public so there are no strings to search. As for legality, think of packets as letter mail. I can open your mailbox and read the front of your mail. I see you have a letter from grandma, an offer for a new visa, a few sweepstakes entries and a letter from the government. I know that by looking at the outsides of your letters. I have no idea what the content of them is unless I open then. But it is illegal for me to open your mail without your permission.Clearly I do not, but I am learning.
LOL I probably am / will. It was worth it to see. And no it not just reading someones email.
It does not need to be the same email. Just a common string in each email. I bet you sign your emails? There is a common string. Emails were just an example. I will ask the legal question On Tuesday . My understanding is it would be illegal to intercept private communications. It is not illegal to harvest the header information based on destination IP and strings that our public domain. But I will look at that next.
If you have access, you don't have to predict. The router is a computer. If A, it does B. if you have access to the routing table, you know exactly where data is going, no need to try and predict what's likely. But if you have the destination IP, it's probably easier to hack that then the commercial-grade, secured router.Oh so any one who has access can easily predict the most likely hubs/routers that will be servicing a given destination IP. So yes it would be a lot easier than I imagined to find a convenient place to look.
Thank you !!!!
Oh Lord. Is Ms Cocki attempting to find out who Schlong is?
No more evidence needed. We all know the truth about Mr.Loco.But personally, I'd rather she stay visible and keep posting her plans as it continues to add to the evidence of his/her craziness.
I did not mean to talk down to you, I appreciate your help. I am just trying to not make assumptions and hope you will correct me if I am off.Thanks, I know what a string is. But I don't sign emails. I also encrypt everything public so there are no strings to search. As for legality, think of packets as letter mail. I can open your mailbox and read the front of your mail. I see you have a letter from grandma, an offer for a new visa, a few sweepstakes entries and a letter from the government. I know that by looking at the outsides of your letters. I have no idea what the content of them is unless I open then. But it is illegal for me to open your mail without your permission.
Accessimg routing tables isn't necessarily the solution to the complexities of intercepting data. Understanding what they are and how they work, however, is.
Oh no, of course not. That would be rude and terrible.Oh Lord. Is Ms Cocki attempting to find out who Schlong is?
No more evidence needed. We all know the truth about Mr.Loco.
Great job shlong, giving Loco a nervous breakdown.:thumb:
when it comes to hacking i don't know as much as others. as for finding someone it is really not hard. if you are spending a day and a half of research on it you are looking in the wrong spots.Oh no, of course not. That would be rude and terrible.
I am just trying to find out how hard it would be to find me
Did you never wonder how secure your identity is?
Perhapswhen it comes to hacking i don't know as much as others. as for finding someone it is really not hard. if you are spending a day and a half of research on it you are looking in the wrong spots.
Yes sadly I am very traumatized. And I shall be driven to seeing a very well reviewed therapist. Not much I can do except pay for the therapy.
No. Cryptography is a very complex thing. Somewhere on the other end, data needs to be unencrypted, that's true. I won't get in to how I go about securing my data, but suffice it to say a hacker can only see what I'm letting him see.I did not mean to talk down to you, I appreciate your help. I am just trying to not make assumptions and hope you will correct me if I am off.
Thank you, I am just wrapping my head around a new universe.
How can you encrypt everything public? I thought anything that went to anything other than another computer with the same encryption had to be sent open text?
No. That's not at all what I said, the header is the outside of an envelope. It has to be public domain or no one would ever be allowed to deliver mail. The inside of the packet, regardless of the content, is protected, like the inside of your letter. Not legal. I can read the outside of your mail, I can't open it..even if I know it's junk mail. Likewise, I read the headers of your data, I can't read what's inside.Ok, so your belief / knowledge is that reading the header is by definition legal. And if the content are in the public domain searching on that string is also legal, right?
Not even grey legal, just illegal. The Rogers routers are owned by Rogers. Updating routing tables without their permission is highly illegal. Otherwise Poviders would keep screwing up the competitions routing tables to slow them down. Monitoring traffic on a network your aren't authorized to is also illegal. Imagine I had a device that would tell me what phone number you called. So I walk over to your house, clamp it onto your phone line, and collect all the numbers you call. I didn't listen to your private calls, but I still violated your privacy.All the rerouting stuff sounds at best grey legal. But apparently just sitting watching the traffic entering one of the servers/hubs is very legal. It is also legal to record the headers of each packet that meets those criteria. I will have to check this all on Tuesday but t does sound viable
VPN is encrypted two-communication. Yes, many VPN's allow you to use the destination computer as a gateway and route your interned traffic through it, many do not. But that has less to do with VPN's and more to do with network theory. If you have 2 computers at home, you network them through the router. A VPN is a way of making another computer or set of cokputers that's outside your network part of your network as if it was right there beside you plugged into that same router. That's all a VPN is. Yes, you can use that connection to tunnel out if it is configured to do that, but that's not part of the VPN, that's just part of networking.Next challenge is for me to understand VPN. As I understand it, they are either software or hardware that takes your communications, and then changes the header information and spits it out at another location, or the same location. Sort of like diving into a pipe in Detroit, and emerging with false papers and new clothing in Atlanta. And it works both ways. And only the people running the pipe know know who went in to it. Is that accurate for a layman discussion?
Depends on the header. If you intercept the packet between the local network and the remote one (while it's in the VPN tunnel), it can only lead you to those two networks. If the VPN is being used to obfuscate your connection and you catch packets between the VPN and whatever the endpoint is, you only have access to the VPN. If you know that VPN is only being used by one person AND you have access to the network back to origin, you can follow it all the way back. Otherwise you can't and most VPN's are used by A LOT of people. In truth, there are ways to still track the packet, but they are extremely complicated and unless you're working within very specific parameters, highly illegal.So if it is an accurate description, the process we are discussing pretty much would just track the header back to where ever the pipe popped the information out?
Oh, I got ahead of you and copy paste on my tablet sucks. :S You can maybe pick it up, but it's very, very, very hard and you need a lot of information. I personally rely on social engineering at this point to gather intel and make the work easier. But you also need a lot, a lot, a lot, a lot of math. You would need to catch the data returning from the enpoint to the VPN. Extract the header and read the data. Figure out what the data would look like encrypted, then strip headers off every outbound packet looking for the matching value. Once found, check the header from that packet and see where it's going. All this assumed you can figure out the encrypted version of the data before the packets are sent, or you can store copies of the insane amount of data until you're able to evaluate it.Ok so far so good. So once you had it traced, it becomes a more or less dead end. But if you can guess roughly where the origin is from, you can still pick up the trail from the personal computer to the VPN, (assuming it is not a hard ware VPN. That sounds oddly wrong to me. I sent a note asking for clarification but his answers are rather hard to understand.
Honestly? I think you're trying to win a 1,000 m sprint but don't know how to crawl yet. Hackers learn computers first. What's memory? How does it work? How does data get from one part of the computer to another? How is Wall-E nothing but bumps on a round disc, then 1s and 0s through my computer, then a signal through some wires, and then an HD image and sound on my home theatre? Then they learn networking. What is an IP address? What's a subnet? Why do I need them? What does a gateway do? How does my computer convert the electronic signal in my wire into youtube videos on my screen? Once you start learning networking, you'll realize how big it is and that'll soak up most of your time for serval years. Then you can start learning encryption, assuming you know discrete math, matrices, algebra and calculus.What do you think?
I'm not 100% sure what you mean by 'encrypt everything public', but I'm going to guess you mean that if you are sending data to someone else over the public internet, how you could keep it secret. I think you already on the right track, you use a VPN (virtual private network). The endpoints of a VPN encrypt the data before putting it on the public internet so that in theory it is impossible to see what the two endpoints are sending to each other, even if it travels over the internet because the encrypted data looks pretty much like random noise. AFAIK, it is difficult or impossible to decrypt the traffic unless you happen to know the 'shared secret' - the key that is used to encrypt the traffic on the VPN.How can you encrypt everything public? I thought anything that went to anything other than another computer with the same encryption had to be sent open text?
I'm not a lawyer, but I too suspect it is a legal gray area. Just to clarify though - the use of the 'string' to do a search is simply to narrow down the firehose of raw data when you intercept a stream from a router. If you can intercept the stream, you can theoretically capture every single byte of info - but it could potentially be hundreds of gigabytes of data per hour so the practical issue of holding that data is the problem, you're gonna run out of drive space. So, what a hacker would do is instead of capturing hundreds of gigabytes of data per hour, he might set the protocol analyzer (packet sniffer) to watch the stream of data as it goes by and only copy down packets that have a particular known string - which might only be a few kilobytes of data per hour.Ok, so your belief / knowledge is that reading the header is by definition legal. And if the content are in the public domain searching on that string is also legal, right?
I can't comment on the legality of any of thoseAll the rerouting stuff sounds at best grey legal. But apparently just sitting watching the traffic entering one of the servers/hubs is very legal. It is also legal to record the headers of each packet that meets those criteria. I will have to check this all on Tuesday but t does sound viable
Not quite - as I said above, for VPNs the PAYLOAD of the packet is also encrypted. The headers are altered as well, but that's just so the VPN will 'work' because it's typically translating between a private network and the public network. The key is understanding that the stuff inside the VPN is encrypted, so that when it travels on the internet it is nearly impossible for someone watching it to read the payload.Next challenge is for me to understand VPN. As I understand it, they are either software or hardware that takes your communications, and then changes the header information and spits it out at another location, or the same location.
I guess that's close enough, but that analogy still makes me cring a little.Sort of like diving into a pipe in Detroit, and emerging with false papers and new clothing in Atlanta. And it works both ways. And only the people running the pipe know know who went in to it. Is that accurate for a layman discussion?
I'm having trouble parsing this sentence, sorry - but if it helps, basically anyone watching the VPN traffic on the internet can see that there IS traffic going between two points, but they can no longer read the traffic between those points because it's now encrypted. Perhaps a better way to describe a VPN is the analogy of a postcard vs a letter. Most internet traffic is like a postcard - the 'content' is readable by any postman who is carrying the postcard. VPN traffic is like a letter inside an indestructible envelope. It the postmen can carry it to the destination but he can no longer read what is inside.So if it is an accurate description, the process we are discussing pretty much would just track the header back to where ever the pipe popped the information out?
A hardware VPN is frequently a gateway router or firewall appliance that is doing the encryption of the traffic at the edge of the network, right before it is put on the public internet. They are typically used for site-to-site VPNs like between a branch office and a head office. Within the branch office itself, nothing is encrypted. But if you need to send something to the head office, the router will automatically encrypt the data and send it to it's partner router at the head office to decrypt it. And, just to re-iterate, even though this encrypted traffic travels over the internet, and people can see that SOMETHING is going between the branch office and the head office, no one can actually read the payload.Ok so far so good. So once you had it traced, it becomes a more or less dead end. But if you can guess roughly where the origin is from, you can still pick up the trail from the personal computer to the VPN, (assuming it is not a hard ware VPN. That sounds oddly wrong to me. I sent a note asking for clarification but his answers are rather hard to understand.
What do you think?
So recording the destination, the exact date and time of day, and the originating computer are all legal because they are in the header?That's not at all what I said, the header is the outside of an envelope. It has to be public domain or no one would ever be allowed to deliver mail. The inside of the packet, regardless of the content, is protected, like the inside of your letter. Not legal. I can read the outside of your mail, I can't open it..even if I know it's junk mail. Likewise, I read the headers of your data, I can't read what's inside.
He never mentioned writing to those tables. I got the impression it was more like reading the front of the envelope as ants carried it past your feet and up to the house <=== analogyNot even grey legal, just illegal. The Rogers routers are owned by Rogers. Updating routing tables without their permission is highly illegal. Otherwise Poviders would keep screwing up the competitions routing tables to slow them down. Monitoring traffic on a network your aren't authorized to is also illegal. Imagine I had a device that would tell me what phone number you called. So I walk over to your house, clamp it onto your phone line, and collect all the numbers you call. I didn't listen to your private calls, but I still violated your privacy.
He was talking stochastic analysis to determine the match at both ends. But that it only worked if you could limit the search area. If our vpn front end is in Bolivia it takes a lot of time (like WAY to long) to get a match randomly.VPN is encrypted two-communication. Yes, many VPN's allow you to use the destination computer as a gateway and route your interned traffic through it, many do not. But that has less to do with VPN's and more to do with network theory. If you have 2 computers at home, you network them through the router. A VPN is a way of making another computer or set of cokputers that's outside your network part of your network as if it was right there beside you plugged into that same router. That's all a VPN is. Yes, you can use that connection to tunnel out if it is configured to do that, but that's not part of the VPN, that's just part of networking.
If you intercept the packet between the local network and the remote one (while it's in the VPN tunnel), it can only lead you to those two networks. If the VPN is being used to obfuscate your connection and you catch packets between the VPN and whatever the endpoint is, you only have access to the VPN. If you know that VPN is only being used by one person AND you have access to the network back to origin, you can follow it all the way back. Otherwise you can't and most VPN's are used by A LOT of people. In truth, there are ways to still track the packet, but they are extremely complicated and unless you're working within very specific parameters, highly illegal.
WOW way over my head.Oh, I got ahead of you and copy paste on my tablet sucks. :S You can maybe pick it up, but it's very, very, very hard and you need a lot of information. I personally rely on social engineering at this point to gather intel and make the work easier. But you also need a lot, a lot, a lot, a lot of math. You would need to catch the data returning from the enpoint to the VPN. Extract the header and read the data. Figure out what the data would look like encrypted, then strip headers off every outbound packet looking for the matching value. Once found, check the header from that packet and see where it's going. All this assumed you can figure out the encrypted version of the data before the packets are sent, or you can store copies of the insane amount of data until you're able to evaluate it.
I honestly cannot imagine ever getting in that far. I mostly want to understand if the idea of popping out an originating IP, using the technique is BS.Honestly? I think you're trying to win a 1,000 m sprint but don't know how to crawl yet. Hackers learn computers first. What's memory? How does it work? How does data get from one part of the computer to another? How is Wall-E nothing but bumps on a round disc, then 1s and 0s through my computer, then a signal through some wires, and then an HD image and sound on my home theatre? Then they learn networking. What is an IP address? What's a subnet? Why do I need them? What does a gateway do? How does my computer convert the electronic signal in my wire into youtube videos on my screen? Once you start learning networking, you'll realize how big it is and that'll soak up most of your time for serval years. Then you can start learning encryption, assuming you know discrete math, matrices, algebra and calculus.
If you really want to learn it correctly, start by getting an A+ certification, then a Network+, then a CCNA, then a CISSP, then a CEH. That's the minimum. Or, if you want someone else to do all the hard work for you but still want to do a little hacking, sign up for the courses online. SANS is the company I would recommend. And learn Linux. You can't hack very well without using Linux