Tracing a hacker that bounced off a phone?
Moderators: jelco, bert_the_turtle, Chris, Icepick, Rkiver, Punisher Bass
Tracing a hacker that bounced off a phone?
I got a "trace a hacker that stole from our bank" mission, and went through the bank's admin menu to look at the log, ip traced it through two internal system and a mainframe, following the bounce record each time, until it led me to somebody's telephone.
and I have no idea how to check the logs of a telephone (or if they even exist), so right now, i'm sorta stuck.
Money and software are no problem (I got some of those "someone transferred a gigantic amount of money. who did they send it to?" missions, and someone with over a million dollars in their account is too tempting to pass up. I have the best possible gateway and all the hardware it can hold, and have the best version of all the software, except the useless ones. I even had to nuke the gateway when i got lazy about the logs, and had enough money left over to buy all the stuff again.)
anyway: to the original question: how do I trace a hacker who bounced off a phone line?
and I have no idea how to check the logs of a telephone (or if they even exist), so right now, i'm sorta stuck.
Money and software are no problem (I got some of those "someone transferred a gigantic amount of money. who did they send it to?" missions, and someone with over a million dollars in their account is too tempting to pass up. I have the best possible gateway and all the hardware it can hold, and have the best version of all the software, except the useless ones. I even had to nuke the gateway when i got lazy about the logs, and had enough money left over to buy all the stuff again.)
anyway: to the original question: how do I trace a hacker who bounced off a phone line?
- frenchfrog
- level5
- Posts: 2572
- Joined: Sun Sep 22, 2002 7:11 pm
- Location: Quebec
I'll go for my classical answer: Log Undeleter.
- mr_anonymous
- level3
- Posts: 461
- Joined: Tue Jul 05, 2005 2:06 am
- Location: unknown
are either of you reading my posts at all?
There are no logs.
it's not that there used to be logs and then they were deleted: there are no logs at all.
there isn't even a folder for logs to exist in.
a hacker bounced his connection off of somebody's telephone, and now I need to find out how to follow his tracks, but I can't, because there doesn't seem to be any record: not a deleted record, not a modified record, not even a place where records would be kept.
There are no logs.
it's not that there used to be logs and then they were deleted: there are no logs at all.
there isn't even a folder for logs to exist in.
a hacker bounced his connection off of somebody's telephone, and now I need to find out how to follow his tracks, but I can't, because there doesn't seem to be any record: not a deleted record, not a modified record, not even a place where records would be kept.
You lost track of the hacker before you got to the phone - i.e. the log with the correct time & date on it was pointed at the phone system rather than where the hacker really bounced through. You may have lost the trail a fair while back. Go back to the previous system, and use Log_Undeleter on the log you followed to the phone system.
- mr_anonymous
- level3
- Posts: 461
- Joined: Tue Jul 05, 2005 2:06 am
- Location: unknown
Maybe the problem is that you guys don't really understand what the various tools do. Log_Deleter deletes logs. All but the highest versions leave a trace. Log_Modifier changes logs. The logs are left in place only modified. Log_Undeleter can both restore logs deleted (either on the console, or by Log_Deleter) AND it can restore logs changed by Log_Modifier.
So, this is what happened. The hacker bounced around, did their hack, and logged off. Then, they went back and changed one of their logs, using Log_Modifier, to point back to a phone system. The log that points to the phone system is a modified log. Use Log_Undeleter on it.
Is that clear enough for you?
So, this is what happened. The hacker bounced around, did their hack, and logged off. Then, they went back and changed one of their logs, using Log_Modifier, to point back to a phone system. The log that points to the phone system is a modified log. Use Log_Undeleter on it.
Is that clear enough for you?
Look, My hacker bounced of a telephone system directly before he connected to the compromised system. If he modified his logs he could only do it at that system right? I used the log_undeleter on ALL the logs on that system with no effekt (and I have the highest version you can get). and the mission was only 30 min old. so, my conclution is that the hacker really REALLY bounced through a telephone system. and the question remains. Is it possible to trace a hacker past such systems?
-
- level1
- Posts: 22
- Joined: Sat Nov 25, 2006 6:19 pm
-
- level2
- Posts: 125
- Joined: Mon Feb 23, 2004 12:46 am
- Location: Wisconsin
-
- level1
- Posts: 22
- Joined: Sat Nov 25, 2006 6:19 pm
I'm sure he means it is pure idiocy to post on a game's forum that you ripped off the creators of that game. That is all.Sabertooth wrote:Yeah, the police are on their way to your house RIGHT NOW to bust down your door for playing a cracked version of Uplink.
No joke.
It's happened.
Yeah.
No.
Let's say you like the band Band. You register on their forum and go "Where can I download Band's latest album plzkthx???!!!". Quite the stupid thing to do, as it makes you very unpopular - not to mention it is ultimate proof your IQ is below 54 (clinically proven, like Clearasil). So yeah.
Who is online
Users browsing this forum: No registered users and 6 guests