Hello There, Guest! (LoginRegister)

Post Reply 
Nothing to see here. Move along.
Author Message
Smaug Offline
Happnin' Dude
*

Posts: 61,211
Joined: Mar 2005
Reputation: 842
I Root For: Dragons
Location: The Lonely Mountain

BlazerTalk AwardBlazerTalk AwardBlazerTalk AwardBlazerTalk Award
Post: #1
Nothing to see here. Move along.
06-14-2013 11:57 AM
Find all posts by this user Quote this message in a reply
Advertisement


smn1256 Offline
I miss Tripster
*

Posts: 28,878
Joined: Apr 2008
Reputation: 337
I Root For: Lower taxes
Location: North Mexico
Post: #2
RE: Nothing to see here. Move along.
I'd like to know how they know the computer was hacked. Specifically, getting into the machine could have been easy, but how do they know what happened after they got into it? I'm pretty good with computers and I can't figure that one out unless there is already something in the computer that logs all activity.
06-14-2013 12:04 PM
Find all posts by this user Quote this message in a reply
WoodlandsOwl Offline
Up in the Woods
*

Posts: 11,813
Joined: Jun 2005
Reputation: 115
I Root For: Rice Owls
Location:

New Orleans Bowl
Post: #3
RE: Nothing to see here. Move along.
(06-14-2013 12:04 PM)smn1256 Wrote:  I'd like to know how they know the computer was hacked. Specifically, getting into the machine could have been easy, but how do they know what happened after they got into it? I'm pretty good with computers and I can't figure that one out unless there is already something in the computer that logs all activity.

A log shows time and date each file was accessed.
06-14-2013 12:06 PM
Find all posts by this user Quote this message in a reply
smn1256 Offline
I miss Tripster
*

Posts: 28,878
Joined: Apr 2008
Reputation: 337
I Root For: Lower taxes
Location: North Mexico
Post: #4
RE: Nothing to see here. Move along.
(06-14-2013 12:06 PM)WMD Owl Wrote:  
(06-14-2013 12:04 PM)smn1256 Wrote:  I'd like to know how they know the computer was hacked. Specifically, getting into the machine could have been easy, but how do they know what happened after they got into it? I'm pretty good with computers and I can't figure that one out unless there is already something in the computer that logs all activity.

A log shows time and date each file was accessed.

That can be fixed. Not only that, a file could be altered and the date changed to make it appear it was done a long time ago. I know network servers have logs that pretty much detail all activity, but I'm unaware of individual computers having that ability.
06-14-2013 12:11 PM
Find all posts by this user Quote this message in a reply
Advertisement


Bull_In_Exile Offline
Eternal Pessimist
*

Posts: 21,809
Joined: Jun 2009
Reputation: 461
I Root For: The Underdog
Location:
Post: #5
RE: Nothing to see here. Move along.
(06-14-2013 12:04 PM)smn1256 Wrote:  I'd like to know how they know the computer was hacked. Specifically, getting into the machine could have been easy, but how do they know what happened after they got into it? I'm pretty good with computers and I can't figure that one out unless there is already something in the computer that logs all activity.

Probably tripwire or an analysis of the filesystem at a deep level. It's actually quite impressive what a forensic hacker can do given free reign on a system.

I'm not an expert on the files systems that Windows uses but on the UNIX side it's pretty dang hard to access data without leaving a fingerprint behind and if you try to clean that (inode alteration) then you're going to muck something else up.

And then at the end of the day you get into the physical aspect of the world where the magnetic properties of the file locations on the platters of the disks themselves will have been altered.

There is no such ting as a perfect crime. It's as true of murder as it is of computer hacking. The only question is how much do you want to spend trying to run it down.
06-14-2013 12:20 PM
Find all posts by this user Quote this message in a reply
WoodlandsOwl Offline
Up in the Woods
*

Posts: 11,813
Joined: Jun 2005
Reputation: 115
I Root For: Rice Owls
Location:

New Orleans Bowl
Post: #6
RE: Nothing to see here. Move along.
(06-14-2013 12:11 PM)smn1256 Wrote:  
(06-14-2013 12:06 PM)WMD Owl Wrote:  
(06-14-2013 12:04 PM)smn1256 Wrote:  I'd like to know how they know the computer was hacked. Specifically, getting into the machine could have been easy, but how do they know what happened after they got into it? I'm pretty good with computers and I can't figure that one out unless there is already something in the computer that logs all activity.

A log shows time and date each file was accessed.

That can be fixed. Not only that, a file could be altered and the date changed to make it appear it was done a long time ago. I know network servers have logs that pretty much detail all activity, but I'm unaware of individual computers having that ability.

I think the article was inaccurate. It was probably a server with files associated with the Reporters WorkStation being accessed.
06-14-2013 12:20 PM
Find all posts by this user Quote this message in a reply
smn1256 Offline
I miss Tripster
*

Posts: 28,878
Joined: Apr 2008
Reputation: 337
I Root For: Lower taxes
Location: North Mexico
Post: #7
RE: Nothing to see here. Move along.
(06-14-2013 12:20 PM)WMD Owl Wrote:  
(06-14-2013 12:11 PM)smn1256 Wrote:  
(06-14-2013 12:06 PM)WMD Owl Wrote:  
(06-14-2013 12:04 PM)smn1256 Wrote:  I'd like to know how they know the computer was hacked. Specifically, getting into the machine could have been easy, but how do they know what happened after they got into it? I'm pretty good with computers and I can't figure that one out unless there is already something in the computer that logs all activity.

A log shows time and date each file was accessed.

That can be fixed. Not only that, a file could be altered and the date changed to make it appear it was done a long time ago. I know network servers have logs that pretty much detail all activity, but I'm unaware of individual computers having that ability.

I think the article was inaccurate. It was probably a server with files associated with the Reporters WorkStation being accessed.

That makes a lot of sense. The last place I worked had all email folders and all the folders in the My Documents folder stored on a server. If I created a directory on C: it was not stored on the server. I had a few computers crap out on me and when I got a new one everything was there except the stuff I stored in the self created directories on C.
(This post was last modified: 06-14-2013 12:25 PM by smn1256.)
06-14-2013 12:22 PM
Find all posts by this user Quote this message in a reply
Bull_In_Exile Offline
Eternal Pessimist
*

Posts: 21,809
Joined: Jun 2009
Reputation: 461
I Root For: The Underdog
Location:
Post: #8
RE: Nothing to see here. Move along.
(06-14-2013 12:11 PM)smn1256 Wrote:  
(06-14-2013 12:06 PM)WMD Owl Wrote:  
(06-14-2013 12:04 PM)smn1256 Wrote:  I'd like to know how they know the computer was hacked. Specifically, getting into the machine could have been easy, but how do they know what happened after they got into it? I'm pretty good with computers and I can't figure that one out unless there is already something in the computer that logs all activity.

A log shows time and date each file was accessed.

That can be fixed. Not only that, a file could be altered and the date changed to make it appear it was done a long time ago. I know network servers have logs that pretty much detail all activity, but I'm unaware of individual computers having that ability.

It's very difficult to modify the ctime property of an inode. Yea changing a file so it looks like the access or modify time is pretty simple but you have to hack the inode table to alter ctimes and that would mess up hash values in other places. If something like Tripwire is employed then there is even more of an issue.

It would be like kicking in a door so you can go lower the toilet seat so that nobody knew you used their bathroom. Better to leave things be and hope the person does not notice the seat up, after all you cleaned up the sink and put the towels back.
(This post was last modified: 06-14-2013 12:32 PM by Bull_In_Exile.)
06-14-2013 12:27 PM
Find all posts by this user Quote this message in a reply
Post Reply 




User(s) browsing this thread: 1 Guest(s)


Copyright © 2002-2024 Collegiate Sports Nation Bulletin Board System (CSNbbs), All Rights Reserved.
CSNbbs is an independent fan site and is in no way affiliated to the NCAA or any of the schools and conferences it represents.
This site monetizes links. FTC Disclosure.
We allow third-party companies to serve ads and/or collect certain anonymous information when you visit our web site. These companies may use non-personally identifiable information (e.g., click stream information, browser type, time and date, subject of advertisements clicked or scrolled over) during your visits to this and other Web sites in order to provide advertisements about goods and services likely to be of greater interest to you. These companies typically use a cookie or third party web beacon to collect this information. To learn more about this behavioral advertising practice or to opt-out of this type of advertising, you can visit http://www.networkadvertising.org.
Powered By MyBB, © 2002-2024 MyBB Group.