Jump to content

HolyRoller

Members
  • Posts

    6
  • Joined

  • Last visited

Profile Information

  • Favorite Area of Science
    Infinitium

HolyRoller's Achievements

Lepton

Lepton (1/13)

0

Reputation

  1. To your first question. I called the local FBI office on discovery of the first time I got hacked and gave the desk Sargent my IP address, then I observed the behavior of them busting in. This is where reading my entire post comes in handy, instead of just posting a comment without any knowledge of the previous happenings. If you notice the section where I discovered two remote back doors opened on my firewall that were not there before, 5985 and 80 exploit point. You would realize what the actual conversation is. Lets get thinking here. Because there has to be some type of identifier I can use to determine the exact moment of entry. Whatever they use to get in is hidden very well. To your first question. I called the local FBI office on discovery of the first time I got hacked and gave the desk Sargent my IP address, then I observed the behavior of them busting in. This is where reading my entire post comes in handy, instead of just posting a comment without any knowledge of the previous happenings. If you notice the section where I discovered two remote back doors opened on my firewall that were not there before, 5985 and 80 exploit point. You would realize what the actual conversation is. Lets get thinking here. Because there has to be some type of identifier I can use to determine the exact moment of entry. Whatever they use to get in is hidden very well. I am not doing anything to get the feds in here. Before when I got hacked I actually called the desk Sargent at the fbi and gave them my direct IP. They got through both firewalls in about 6 seconds and again, were in digging through files to determine what other trojans had been dropped in due to the fake MS software. Now, someone added to exceptions to my firewall to allow for tcp 5985 remote admin and 80 remote admin to be used. I don't use remote administrative programs, ever. So how are they doing this, why are they doing this and most importantly what do I need to do in order to make them stop, or catch them so I can either sue or report their illeagal activities to the proper law enforcement.
  2. Script kiddie deployment programs such as net bus, back door sd bot and orifice are not enough to cause what is going on. (just so you know, microsoft has to build in remote administrative back doors for use by the government including law enforcement, the FBI and the CIA into each of its operating systems. That is why every six months or so A GIANT RAPE SECURITY FLAW WITH REMOTE ADMINISTRATIVE ABILITY HAS TO BE PATCHED.) Whatever this person on the outside is doing, they have something or know something they are not supposed to know. The connection makes no arrival in firewall logs either interior or exterior to my pc. No services are high jacked during the process and no extra processes begin running. I know it is something heavy duty and well hidden and also possible because when I got hacked 2 years ago I also had the Feds remote into my pc and they bypassed both of my firewalls in under 5 seconds and where looking through my files to determine what other trojans had been dropped in due to the software. I have been through just about everything including "string junkies" idea. For instance, the processes being shut off and the internet still working as well as all sound and other peripheral devices. Was that remote services management? Or was it the trojan being shut off and a demonstration of all peripheral software device control being useless and nothing more than trojan monitoring software from different companies? Its either Microsoft or someone else. Just found two additions to my firewall that I never put in. Both of them are non record exceptions. 1. Windows remote management. TCP 5985 2. Windows remote management - Compatability Mode (HTTP-in) Port 80 tcp <--always thought there was an exploit for port 80 for remote admin.
  3. BACK ON TOPIC! Please don't hijack the thread. Malware this or that is not going to help, MSE is not going to help. This is something outside the norm to deal with. Someone is up to something extremely illeagal.
  4. LOL windows defender, thats funny right there, that is the most hilarious joke I have ever heard in my entire life. This is more advanced than just regular everyday malware. Someone is up to something serious very serious. I am out millions, my life itself has been damaged and I am trying to figure out how they are doing this. So lets all get our thinking caps on, and try and figure out how they are doing this. lets get thinking here people
  5. Its not the graphics card itself shutting off. Its just portions of the software. Like the software control board for sound max, and the software control board for invidia, and the software control board for norton as well as a myriad of other software programs including internal windows xp services. Right now I am behind two fire walls, one linux based on my router and one windows based on my pc from norton. The wireless router is Mac address locked so only Mac addresses as I specify can get through. But what I saw, when this strange thing happened, was all services off, internet functioning fine, nvidia software control panel gone, sound max control panel gone and norton control panel gone as well as the windows based sound control "speaker" icon gone. I checked the processes in the task manager, only 7 were running. It was literally like all the sudden whatever was going on I could see and that my pc and my desktop were either copied or transported over to another pc running no firewall or any of the software. Before when I tracked down what was going on it went back to Russia and China. Now there is nothing to track down. It is as if I my pc is being run on a virtual machine on another pc while they use my pc, wherein somehow I accidently saw what was going on or someone turned off all those services instantly to show me what was going on. Or even perhaps they remoted me and showed me their desktop with all my personal property on it. The questions here are. How do I make them stop? How do I catch them? How do I determine if its law enforcement? Could it be Microsoft? And finally, since what I saw is possible, how on earth are they doing it?
  6. Allow me to explain as contritely as possible. This all began about four years ago. I built my own pc, I purchased two different versions of windows xp from a local pc store. One xp pro 32 the other windows xp 64 bit. My first ISP was verizon at the time. This is right after they laid the new fiber optic cables. My router began being flooded with massive amounts of data and contacting ip addresses world wide, even when the pc was not in any use at all. I began a carefully calculated lock down of remote ports and exploit ports. When I finally had the problem defeated within a few min my router was destroyed internally so I had to get a new one from verizon. Fast forward many months of stolen data, mistreatment, harassment and remote destruction of my natural psychological state I called Microsoft. This call was made when they still used the India off shore company to handle all of their tech support calls (they no longer do because of them being rip off artists). They ran me through a closed remote administrative process to ensure validation of not just the installed operating system, but of both of the disks themselves. After a lengthy process the disks were found to be invalid and fakes distributed from remote locations in two different countries. One in China, the other in Russia. I guessed they were root kitted and crammed full of enough remote administration trojans to choke a horse. So I sent them into the FBI with a detailed list of all IP addresses that got connected to my pc. I then switched ISP's. Before plugging in I reformatted using a windows xp disk purchased from a local college which I knew to be safe. Upon hooking to the net after completion of a lengthy security hardening process I waited for the odd behavior to begin again. Soon after it did I downloaded the isp provided virus scanner. Once the virus was found and turned in by myself through anon means, it was found that a total of 2,483 pc's world wide had been infected by the same virus. Thinking I was in the clear, I began further processes of research, writing and information gathering as per my normal experience and use of the internet. Then the strangeness started up all over again. A few days ago now, my processes lowered down to no more than 7, my fire wall was turned off, my sound card control board was turned off, my graphics card control board was turned off. It almost appeared as though someone was either remote administrating my pc, or somehow had forced me into a virtual machine copy of my own PC before I installed any of my own software. However all my files existed on my desktop as per the norm. Instead of taking a screen capture I restarted, then I realized I had been had. I should have realized it sooner. Do any of you know of a way to do this. I mean either force someone into a virtual pc copy while controlling their actual pc and keeping them running in a virtual machine. Or creating a remote administrative program that forces them to use your pc while you use theirs? Or perhaps even just control all processes and hide from them the end reality of their own pc while you exploit them? because that is what is happening to me.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.