Pickering Angels

If someone knows your IP address, can he hack into your computer?

fuji

Banned
Jan 31, 2005
80,011
7
0
¯\_(ツ)_/¯
is.gd
And, according to you, none of them will succeed with just my IP address alone without my cooperation.
Thst is not entirely true, but their chance of success is much much less. They might find a flaw in your router and break into that, then watch your internet connections to steal passwords.

However that is a lot less likely.

Still if you are worried make sure the firmware on your router is the latest version so you have any recent security patches applied.

Again the only fully secure thing is not to be connected to the internet. Maybe keep your most sensitive files on a second laptop that is not used to connect to the internet. If you have home made porn of you fucking Mila Kunis or something you might want to be that paranoid.

Do install good AV software and be careful before clicking dodgy links or attachments.
 

peter4025

Active member
Mar 10, 2010
6,256
11
38
There are lots of ways that people could have gotten your name Nd personal email and not necessarily from your hobie account. Did you recently provided your name and email to a merchant ( ie the bay marks wear house or the like ) when paying at the cashier. You won't believe how many of this merchants sell your information
 

sammy6789

New member
Jan 26, 2004
356
0
0
You have porn of mila?? Hey bud let me have a crack at your computer send me an email ;) ill test your security for ya free of charge.

Show of hands who would keep me supplied with coffee and red bull to keep me awake till I have this video?
 

mas0

Member
Nov 1, 2012
767
0
16
Thst is not entirely true, but their chance of success is much much less. They might find a flaw in your router and break into that, then watch your internet connections to steal passwords.

However that is a lot less likely.

Still if you are worried make sure the firmware on your router is the latest version so you have any recent security patches applied.

Again the only fully secure thing is not to be connected to the internet. Maybe keep your most sensitive files on a second laptop that is not used to connect to the internet. If you have home made porn of you fucking Mila Kunis or something you might want to be that paranoid.

Do install good AV software and be careful before clicking dodgy links or attachments.
This -may- help. Some exploits I have seen have not been patched by the software companies because well, it was not reported by any of the whitehats. But your previous comment is right, hacking someone is not that easy; getting an IP address is but bypassing the NAT might be harder than a few clicks. But if I really wanted to get prestokeys my first move would be, say finding out that our comrade uses terb, which uses vbulletin, getting one of the cross scripting vulnerabilities on terb which could result in remote code execution and installing a downloader\rootkit on his machine (and somehow on everyone else who accesses this site). Reverse connection and code injection would allow me to bypass his firewall and NAT and the likelihood of him using norton would almost guarantee that the heuristics would not catch my rootkit if i kept it low key.
 

sammy6789

New member
Jan 26, 2004
356
0
0
Ya that could work lol there are so many ways in its stupid. I've been experimenting getting in via mobile devices. Been working on the autorun exploit for usb on the comp when phone connected to network
 

rhuarc29

Well-known member
Apr 15, 2009
9,651
1,295
113
Well, if you sent email to someone who has computer hacking skills, certainly he can get your IP address instantly after getting your email, especially if you are someone whose computer he would like to hack into.
No. Not...even...close. I promise you 1000% that this is wrong.
Yeah, you're right. An individual doesn't need hacking skills to get your IP address from an email. Anyone can do it. An IP address alone doesn't do much for them however.
 

Big Sleazy

Active member
Sep 13, 2004
3,535
8
38
If it's digital it can be hacked. Computers, phones, social networking, bank accounts etc.... Now, not everyone can do it. But in the right hands. A hacker or a security agency can eventually hack into anything. We were much more secure when we worked on analog as opposed to digital.

BS
 

fuji

Banned
Jan 31, 2005
80,011
7
0
¯\_(ツ)_/¯
is.gd
Yeah, you're right. An individual doesn't need hacking skills to get your IP address from an email. Anyone can do it. An IP address alone doesn't do much for them however.
You don't need hacking skills, you can buy those by purchasing hacker kits from people who do have skills. There are a variety of Russian and Chinese websites that do a good business selling kits to maladjusted WoW types who fancy themselves hackers. FatOne can probably hook you up!
 

krayjee

Banned
Jan 4, 2009
3,889
2
0
I believe my phone was hacked a few months ago and all my ex's texts and emails were wiped out. Strangely enough only her texts and her emails were cleaned out, the rest remaned intact. Thank God I had saved them in my other computers as a back up. Phone emails are easier to hack i guess cuz it was always left open.
 

krayjee

Banned
Jan 4, 2009
3,889
2
0
Why save the texts and emails? Perhaps your ex knows a good hacker. :angel:
I always saved them for my own protection in case if they made up some stories so I have something to back up as solid proof. It happened to me with my ex GF 4-5 yrs ago and her texts I had saved had saved my ass and the judge threw out the case of me being accused of harassing her. You never know what ladies are capable of. Never ever underestimate the power of extremely pissed off women.
 

OddSox

Active member
May 3, 2006
3,148
2
36
Ottawa
If it's digital it can be hacked. Computers, phones, social networking, bank accounts etc.... Now, not everyone can do it. But in the right hands. A hacker or a security agency can eventually hack into anything. We were much more secure when we worked on analog as opposed to digital.

BS
"BS" - that's exactly what it is. If your system is locked down with a properly configured firewall and proper passwords etc., it's virtually impossible to 'hack' it - despite what you see on television. Phishing and trojan horses are the way most do it - and both require some cooperation from the owner of the system.
 

tearstmyeyes

New member
Apr 28, 2012
26
0
0
If it was not already mentioned.....
If you are worried re-boot your router and your ISP will assign a new IP (unless you have a static IP which is highly unlikely, i.e. business for VPN or hosting etc..)
 

Anynym

Just a bit to the right
Dec 28, 2005
2,961
6
38
There are two distinct questions here:

(1) Can you be targeted?
and (2) Can you be hacked?

In the headers of most emails is enough information to find your computer. Is a recipient of an email from you likely to know how to process those headers? Most people don't even know they exist. If someone were determined, they could learn a lot of information from the headers. If a sender were determined they could hide a lot of the commonly available information. But a determined hacker would resort to other means of finding your computer beyond the email. And a government has access to additional resources (e.g. ISP logs) which could identify a computer if a criminal act is alleged.

If a determined assailant is able to identify your computer - let's say they got the IP address easily from the headers - they could start to penetrate your network. Major corporations spend millions of dollars on network security and hackers are able to penetrate their networks. The US Federal Reserve takes security very seriously and they were hacked. Can your little home network stand up to a determined hacker? Not a chance.

A hacker would quickly find out that (say) you were using a home router, and that the router is the "computer" presented to the ISP. There are various things a hacker can do to accurately guess the manufacturer and model number of the router you're using (since they each implement various things slightly differently, the hacker just needs to send a few specific "tests" to the router and see how it responds). Once they know the model of the router, they can look up the vulnerabilities of that router and attack - and take control of - your router.

Once they've got control of your router, they pretty much have control over your network. And all those patches that Microsoft issues every month? They're released because new vulnerabilities are being found in Windows every month. The attacker just needs to find one that hasn't yet been patched, and they can gain control over your computer. You probably won't even know they've done it.

But all of this is a lot of work for little gain. Vulnerabilities are being patched "all the time". Most crooks will "sweep" IP address ranges looking for an easy target, rather than targetting a specific person (versus governments, who are interested in specific individuals).

Can it be done? Absolutely, by a well-informed crook. Is it likely? Not really.
 

prestokeys

Banned
Oct 1, 2011
3,578
0
36
There are two distinct questions here:

(1) Can you be targeted?
and (2) Can you be hacked?

In the headers of most emails is enough information to find your computer. Is a recipient of an email from you likely to know how to process those headers? Most people don't even know they exist. If someone were determined, they could learn a lot of information from the headers. If a sender were determined they could hide a lot of the commonly available information. But a determined hacker would resort to other means of finding your computer beyond the email. And a government has access to additional resources (e.g. ISP logs) which could identify a computer if a criminal act is alleged.

If a determined assailant is able to identify your computer - let's say they got the IP address easily from the headers - they could start to penetrate your network. Major corporations spend millions of dollars on network security and hackers are able to penetrate their networks. The US Federal Reserve takes security very seriously and they were hacked. Can your little home network stand up to a determined hacker? Not a chance.

A hacker would quickly find out that (say) you were using a home router, and that the router is the "computer" presented to the ISP. There are various things a hacker can do to accurately guess the manufacturer and model number of the router you're using (since they each implement various things slightly differently, the hacker just needs to send a few specific "tests" to the router and see how it responds). Once they know the model of the router, they can look up the vulnerabilities of that router and attack - and take control of - your router.

Once they've got control of your router, they pretty much have control over your network. And all those patches that Microsoft issues every month? They're released because new vulnerabilities are being found in Windows every month. The attacker just needs to find one that hasn't yet been patched, and they can gain control over your computer. You probably won't even know they've done it.

But all of this is a lot of work for little gain. Vulnerabilities are being patched "all the time". Most crooks will "sweep" IP address ranges looking for an easy target, rather than targetting a specific person (versus governments, who are interested in specific individuals).

Can it be done? Absolutely, by a well-informed crook. Is it likely? Not really.
Wow! The answer to the question has now changed from "no" to "yes".
 

mas0

Member
Nov 1, 2012
767
0
16
"BS" - that's exactly what it is. If your system is locked down with a properly configured firewall and proper passwords etc., it's virtually impossible to 'hack' it - despite what you see on television. Phishing and trojan horses are the way most do it - and both require some cooperation from the owner of the system.
Keep thinking that. A firewall is just a piece of software. Bypassing a firewall could be hard but not impossible. I have not kept up to date with recent changes but back about 8 years ago I personally wrote and software that bypassed firewalls. One of the simplest methods back then was process injection. Your software firewall would let your browser access the net, I would execute code inside the memory of said browser and do whatever I wanted with your machine. Routers NAT were also easy to bypass. Instead of using YOUR ip; I would hardcode mine and have your system connect to me. NAT posed no issues then.

If it was not already mentioned.....
If you are worried re-boot your router and your ISP will assign a new IP (unless you have a static IP which is highly unlikely, i.e. business for VPN or hosting etc..)
Wrong. LOTS of ISPs are pretty much assigning static IPs these days. OR dynamic IPs with a very very long leases. That's my own personal experience.
There are two distinct questions here:

(1) Can you be targeted?
and (2) Can you be hacked?

In the headers of most emails is enough information to find your computer. Is a recipient of an email from you likely to know how to process those headers? Most people don't even know they exist. If someone were determined, they could learn a lot of information from the headers. If a sender were determined they could hide a lot of the commonly available information. But a determined hacker would resort to other means of finding your computer beyond the email. And a government has access to additional resources (e.g. ISP logs) which could identify a computer if a criminal act is alleged.

If a determined assailant is able to identify your computer - let's say they got the IP address easily from the headers - they could start to penetrate your network. Major corporations spend millions of dollars on network security and hackers are able to penetrate their networks. The US Federal Reserve takes security very seriously and they were hacked. Can your little home network stand up to a determined hacker? Not a chance.

A hacker would quickly find out that (say) you were using a home router, and that the router is the "computer" presented to the ISP. There are various things a hacker can do to accurately guess the manufacturer and model number of the router you're using (since they each implement various things slightly differently, the hacker just needs to send a few specific "tests" to the router and see how it responds). Once they know the model of the router, they can look up the vulnerabilities of that router and attack - and take control of - your router.

Once they've got control of your router, they pretty much have control over your network. And all those patches that Microsoft issues every month? They're released because new vulnerabilities are being found in Windows every month. The attacker just needs to find one that hasn't yet been patched, and they can gain control over your computer. You probably won't even know they've done it.

But all of this is a lot of work for little gain. Vulnerabilities are being patched "all the time". Most crooks will "sweep" IP address ranges looking for an easy target, rather than targetting a specific person (versus governments, who are interested in specific individuals).

Can it be done? Absolutely, by a well-informed crook. Is it likely? Not really.
Agreed to a certain extent more than once I did some pen testing my beloved Nmap to find out that the device I was targetting had no known security holes. But really the weakest spot in the any security infrastructure is the person behind the keyboard. It is far easier (but more time consuming) to have someone let you in their network by deception than to break into it by using exploits.

Also I despise the word crook when it comes to talking about hackers. I am a hacker and I don't consider myself a crook. Nor have I done anything to steal or hurt anyone. Most of the people I know and frequent actually do it for the sake of learning. Hackers are really just tech savvy people who think outside the box while software engineers use methodology. Don't get me wrong those guys do great work; they just do it by the book. Methods, procedures, a whole lot of stuff that I do enjoy bypassing.

Where I work and how I live encourages that. I mean if you are an engineer and you are working in a big corporation you have to deal with red tape. Constantly. How I do it is... go under that red tape. Oh you need to communicate with this server and have remote commands issued remotely from your desktop? Oh well you might want the network admin to check if open the firewall then check with the system admin if to see if the server can handle another application and of course request permissions. And of course if you have a security team you have to run it by them. Which in turns means a few weeks if not months of delay before you even get started.

Give it to a hacker. You know what he does? Oh this server has read-write on this share? Easy-peasy. Let's just make an app that writes to this share and another that reads the same file from the server. And guess what, I don't need admin access anymore. My app is up and running in 10 minutes. Fuck your red tape.
 
Jan 3, 2012
72
0
6
Knowing an ip address is no different than knowing someones home address. You still need to get through the door.

Like a home, any computer can be broken into. If security is a concern keep sensitive data on a non networked computer or external hard drive.

A good first few steps: not using windows, securing your browser. and securing your email.
 
Toronto Escorts