How To Remove Hackers?

Apostle

Member
Okay, I'm not actually being hacked, and I probably never will be... but if in the future I was somehow hacked, how would I remove them from my computer? A step by step response would be nice, thanks.
 
If you happen to get "hacked" (assuming you mean someone gaining access to your computer via wifi or ethernet somehow) though it is actually very easy to solve the problem, pull the ethernet cord out and/or turn off your wireless before they get a chance to put software on your computer to lock you out. Like voyager said though, getting hacked is the least of your concern.
 
About 6 or 7 years ago it happened to me. Using and playing with remote software.
Just sat at my computer one day and seen my mouse moving and exploring all my directories. I wasn't fixing nothing. shut down and started over. A military wipe.
Suspected a port sniffer was to blame.
 
About 6 or 7 years ago it happened to me. Using and playing with remote software.
Just sat at my computer one day and seen my mouse moving and exploring all my directories. I wasn't fixing nothing. shut down and started over. A military wipe.
Suspected a port sniffer was to blame.

Hehehe you should have opened up notepad and write with big bold letters something like:

I HAVE JUST CALLED PENTAGON AND YOUR IP ADDRESS HAS BEEN CAUGHT.
SEE YOU IN PRISON!

I bet he would **** in his pants and stopped hacking you right away hahaha!
Hell maybe he would even apologize. :D
 
The term hacker is pretty vague, the definition of a hacker is: "a person who secretly gets access to a computer system in order to get information, cause damage, etc."

It's normal for computer to run IP scans attempting to use known vulnerabilities to gain access to your machine and data, my NAS alone detects and blocks SSH attempts from multiple failed attempts, and it reports me of about 5-10 blocked attacks per day.

Usually you won't know a hacker is in your system, they will enter through a backdoor, install software, or take your information. You may never know they were ever there. If you disconnect your computer from the network, that will stop their attack and it will stop any further harm.
 
What would be the steps to follow after disconnecting from the network?
There's really no step by step guide, as every attack is different. A good rule of thumb is to have a good firewall, either on your PC or on your router. Make sure you are not on the DMZ, and only forward ports you absolutely need. If you don't need access to your router from the WAN, either on the web UI or via SSH/Telnet, you should close those down.
 
There's really no step by step guide, as every attack is different. A good rule of thumb is to have a good firewall, either on your PC or on your router. Make sure you are not on the DMZ, and only forward ports you absolutely need. If you don't need access to your router from the WAN, either on the web UI or via SSH/Telnet, you should close those down.

Okay, thank you for the advice.
 
I don't see the difference. I only see a difference in intent, and you still have some rootkit of a kind to get rid of.

End user installing software != service exploit.

Also, having a vulnerability doesn't automatically give you access to install a rootkit or similar.

The real answer is that it all depends. Attacks can be varying levels of effective and you can have varying levels of vulnerabilities in your setup. You can 'be hacked' from someone watching something like a clear text authentication to web server or similar, or it could be a exploit to a service you have exposed to the WAN. Most of the time it's just end users clicking on whatever and becoming infected.

For your idea of hacking, on enterprise grade gear you can have varying degrees of logging and could view which connection is established in real time. The vast majority of home grade gear doesn't give you anything useful for 'catching' certain traffic patterns and you would largely never notice unless they were expressly malicious.
 
Back
Top