Muskelmann098 wrote:Thanks for your answers both of you.
I haven't had the pleasure of being threatended like that yet, but I'll be looking forward to it
I would assume that those 'hacking toolkits' scan for vulnerable processes and use known exploits to 'h4x0r' the poor bastard on the other end? The only way I see it as truly useful though, would be if you could already plant a program on their computer which would receive instructions from your machine and act like a Trojan, but then we're into something entirely different.
So bottom line then, not to worry
insomaniacal wrote:People that say "I can h4x0r j00 wi7h t3h IP33z" are generally skript-kiddies who have just completed reading their first wikipedia article about networking, and have downloaded "Hacking toolkits" which ask them for a target IP. If you meet any of these in your internet travels, tell them that your IP is 127.0.0.1, and hopefully, lulz will ensue.
Phantom Wolf wrote:Not all that much. You can trace it to a general location, but that isn't always accurate. You could scan the ports and look for a vulnerable service running.
A lot of people don't even have public IPs. Me for example, the IP I see at a site like http://www.ipchicken.com/ isn't my IP address, it's sort of shared between every cellphone (or similar device) connected to the same tower. My router isn't actually visible to the Internet
It is entirely possible to be able to take control of a computer if you have its IP address, just not likely.
insomaniacal wrote:Phantom Wolf covered all the bases pretty well. Most devices connected to the internet today aren't using a modem directly, but rather connect via a router of some type. So, generally, when you see an IP, there's a good chance it doesn't even point directly to a computer.
People that say "I can h4x0r j00 wi7h t3h IP33z" are generally skript-kiddies who have just completed reading their first wikipedia article about networking, and have downloaded "Hacking toolkits" which ask them for a target IP. If you meet any of these in your internet travels, tell them that your IP is 127.0.0.1, and hopefully, lulz will ensue.
RevengeDriven wrote:Its not possible at all to take control of a computer with just an i.p. The person would have to somehow download something from the person trying to take control of the computer. Knowing an i.p. doesn't do you any good.
RevengeDriven wrote:Even port scanning for ports running vulnerable app.s is of little use unless you have the skills to set up shop on the computer you are scanning.
To attack a computer, you need your target's IP address, which you can get either through ping sweeping or by looking up a domain name on the Network Solutions website
. Once you know a computer's IP address, the next step is to find which ports are open so you know which ones you may be able to use to access the target computer.
- Code: Select all
Finding a computer and an open port can get you into a computer, but finding an open port is not enough.Hackers must find out which operating system the computer uses so they can know which commands to use and how to take advantage of any known vulnerabilities in the software that could save them from having to guess the computer's password.
Users browsing this forum: No registered users and 0 guests