Sunday 23 January 2011

HACKING YOUR COMPUTER IS, HACKING INTO YOUR LIFE!

HI guys,
                 This time I am going to given an scenario where an hacker had hacked your system and how he can turn your life into a real shit!

    It doesn't matter what OS you have or what anti-virus you run, you will be owned by the hacker if you don't have some commonsense.


    You may think nothing major can happen to my life at most you may loss all your data in you pc but it doesn't stops there. No one need you 100GB of data. A real hacker, all they need is a machine which can work for him any day, any time at any part of the world.


There are lot of vulnerable on most of the commonly used application on your day to day life like Adobe reader, Win amp,Quicklime, Itune, MS office or your browser . One example I Am going to talk about is your browser, you can't avoid this when you are using internet.


Ok how does this going to affect my life?




Here is the scenario, you have connected to internet and your system had fell into the hands of an hacker.
.
Do you believe me if I say an hacker will come to know what you and your family members doing in the room or what you speaking with them in case if it is a home PC or he can come to know whats going on in an office environment without your knowledge.


OK how many of them use Skype or any messenger?? 9/10 people so you should be having a mic and a cam connected to your system almost every time it is connected to your pc in case of laptop it is with you where ever u carry your laptop..


Yes an compromised PC can be used even to spy on your location. The attacker can access your web cam and also your microphone and he can save it remotely.


Imagine that you are speaking with you partner about a banking detail or anything, the attacker will hear and he can later use the information that you spoken. He can even click an snap of you and post it on somewhere. I can create a fake Id card, driving license.


This type of hacking will be more serious if the hacker is near your house or sharing the house or internet. If  I need to steal your bike from your house I can listen to the conversation you had and find a time when no one is at the house.


You will not have any suspicious thought at all, you believe my PC or laptop is in logoff mode but you still didn't shutdown ,so the remote hacker can connect and still do what ever he wants. As I said before, they all need a slave to work from them,may not you data, so they will install some program on your system which will try to help him to hack many more system from there. Even if some one finds that his system is been attacked the police is going to question you not the real hacker.


Countermeasures:
  • You have to disconnect your web cam and microphone from the jack when you are not using it.
  • Turn you internet router or modem when your not in need of it.
  • I would say it is best to turn your PC.
  • Always update your OS and the antivirus it will help you at least when they had found the threat signature.
  • Keep checking you log for any user login, you can do it by looking into the event viewer. If you find someone had logged in you can trace from which user name they had dialed in.
  • Hacker mostly use the same account detail that you have, so it is worth changing the password every month at least every 2 months.
  • Check your cpu usage and process running on your system. If you find some suspicious process running on your system please end the task. 

1 comment:

  1. hi...
    i am Gaurav Garg From How To Hack A Computer
    i like your web site or all available content but i like this post the most..
    thanks for providing this information in this open way..

    Regards
    Gaurav garg

    Keep Posting
    Have A Nice day

    ReplyDelete

Conformio-Online Compliance Tool Multiple Vulnerabilities

# Exploit Title: Conformio-Online Compliance Tool Multiple Vulnerabilities. # Discovered Date: 16/11/2017 # Exploit Author: Ramikan # Websi...