LinuxQuestions.org
Help answer threads with 0 replies.
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices


Reply
  Search this Thread
Old 01-23-2020, 03:50 AM   #1
jazzy_mood
Member
 
Registered: Mar 2019
Posts: 54

Rep: Reputation: 26
RF exploitation: how does it work?


Hi all,

This is a security question not directly related to Linux, so I am posting it in the General forum.

I have been reading some articles about RF exploitation and I am wondering if it is possible to hack/exploit a laptop or desktop PC. In case it is, I wonder if some special equipment/devices are necessary to accomplish it and how does it work. For instance, what is the distance range of a RF signal from a laptop or PC. Just curious about it.

Thanks for your comments/opinions on this matter.
 
Old 01-23-2020, 07:40 AM   #2
rtmistler
Moderator
 
Registered: Mar 2011
Location: USA
Distribution: MINT Debian, Angstrom, SUSE, Ubuntu, Debian
Posts: 8,439
Blog Entries: 13

Rep: Reputation: 3759Reputation: 3759Reputation: 3759Reputation: 3759Reputation: 3759Reputation: 3759Reputation: 3759Reputation: 3759Reputation: 3759Reputation: 3759Reputation: 3759
<removed by user>

@OP, you're a banned member as another username, openly admitting this.

Please refrain from this behavior.

Last edited by rtmistler; 01-23-2020 at 02:58 PM.
 
Old 01-23-2020, 10:18 AM   #3
jazzy_mood
Member
 
Registered: Mar 2019
Posts: 54

Original Poster
Rep: Reputation: 26
Thank you for the explanation, rtmistler; it clears things up somehow.

I just wonder if it is possible to use RF exploitation on a laptop or PC CPU. I ask this because I have been hacked repeatedly by someone. Since this has been going on and on and on, I finally decided to open my laptop, remove the Wi-Fi card and the Bluetooth module and format/reinstall everything from scratch (with my router turned off). However, the signs intrusion still persist: the laptop makes noises that come from the speakers (not the usual HDD noises; these are ticks and creaks), some programs lock up or behave weird, there are website redirections (for instance, I write "www.youtube.com" on the web browser and it redirects me to a totally different webpage), etc.

Apart from that, on a previous format/fresh reinstall without being connected to my router, some icons that don't come with Win 10 appeared on my desktop (I doubt Booking and Avast come with the Win 10 DVD).

By the way, my old user is Hungry ghost. These are some threads for reference:

https://www.linuxquestions.org/quest...it-4175650365/
https://www.linuxquestions.org/quest...me-4175649900/

Any ideas?
 
Old 01-23-2020, 10:39 AM   #4
jazzy_mood
Member
 
Registered: Mar 2019
Posts: 54

Original Poster
Rep: Reputation: 26
I forgot to add that I live in a third floor, so it is possible that the person who's hacking me has some equipment hidden outside (for instance, in a car). In fact, sometimes I have seen my SSID name outside even with my router turned off.
 
Old 01-23-2020, 11:30 AM   #5
Pastychomper
Member
 
Registered: Sep 2011
Location: Scotland
Distribution: Slackware, Android
Posts: 116

Rep: Reputation: 231Reputation: 231Reputation: 231
Quote:
Originally Posted by jazzy_mood View Post
...
Any ideas?
Three ideas that might or might not help.

One, I see a lot of weirdness on computers but relatively little cracking/hacking, even in the old days when I was using Windows 95. Are you certain you're seeing something malicious rather than a bad install?

Two, I've no great experience with Avast, Windows 10 or Booking, but I do know that a recent install of Win 10 can include some "news" channels so I wouldn't be surprised if it included advertising as well, in the form of icons on the desktop.

Three, what would a cracker gain by (a) installing Avast on your machine or (b) making it obvious that your machine had been compromised?
 
Old 01-23-2020, 12:16 PM   #6
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 22,333

Rep: Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026
Quote:
Originally Posted by jazzy_mood View Post
Thank you for the explanation, rtmistler; it clears things up somehow.

I just wonder if it is possible to use RF exploitation on a laptop or PC CPU. I ask this because I have been hacked repeatedly by someone. Since this has been going on and on and on, I finally decided to open my laptop, remove the Wi-Fi card and the Bluetooth module and format/reinstall everything from scratch (with my router turned off). However, the signs intrusion still persist: the laptop makes noises that come from the speakers (not the usual HDD noises; these are ticks and creaks), some programs lock up or behave weird, there are website redirections (for instance, I write "www.youtube.com" on the web browser and it redirects me to a totally different webpage), etc.

Apart from that, on a previous format/fresh reinstall without being connected to my router, some icons that don't come with Win 10 appeared on my desktop (I doubt Booking and Avast come with the Win 10 DVD).

By the way, my old user is Hungry ghost. These are some threads for reference:

https://www.linuxquestions.org/quest...it-4175650365/
https://www.linuxquestions.org/quest...me-4175649900/

Any ideas?
Yep:
  • You're using Windows 10: go to a Microsoft forum for help
  • Seek help yourself; again, as with your other user names and threads, you have zero evidence of anything.
You keep claiming to have evidence, the police have a 'case' open, etc., etc., but keep throwing out technical terms that don't make sense. This thread is a great example. Now it's wifi/bluetooth 'hacking'; and 'they' have previously gotten into your BIOS, 'cracked' your cell phone (because there was a new feature in Google maps), and your 'psychotic' ISP was hacking you too.

Sorry, no...just don't believe any of it, and you've certainly not posted any evidence to indicate that anything is going on, even though you supposedly have it. Is it *POSSIBLE* to get into a system via wifi/bluetooth? Absolutely....is it LIKELY? Nope....not unless you enable wifi direct, or share your bluetooth connection, both of which are manual processes that you have to enable, then give the connection secrets to them.
 
Old 01-23-2020, 12:57 PM   #7
jazzy_mood
Member
 
Registered: Mar 2019
Posts: 54

Original Poster
Rep: Reputation: 26
Quote:
Originally Posted by Pastychomper View Post
Quote:
Originally Posted by jazzy_mood View Post
...
Any ideas?
Three ideas that might or might not help.

One, I see a lot of weirdness on computers but relatively little cracking/hacking, even in the old days when I was using Windows 95. Are you certain you're seeing something malicious rather than a bad install?

Two, I've no great experience with Avast, Windows 10 or Booking, but I do know that a recent install of Win 10 can include some "news" channels so I wouldn't be surprised if it included advertising as well, in the form of icons on the desktop.

Three, what would a cracker gain by (a) installing Avast on your machine or (b) making it obvious that your machine had been compromised?
I've done many Windows and Linux installs since many years ago and nothing like this had happened before. The DVD I'm using was downloaded from the MS website, and on other installs using the same DVD these icons have not appeared on the desktop (they appeared even without being connected to any WiFi network, so I guess something outside is somehow interfering with my laptop).

By the way, the noises issue also happens on Linux.

I'm still not sure what these people want, but I guess they just want to tease me or annoy me in some way.

I guess they are exploiting some CPU vulnerability, since it has happened while installing with the WiFi and Bluetooth cards completely removed.

Last edited by jazzy_mood; 01-23-2020 at 12:58 PM.
 
Old 01-23-2020, 01:23 PM   #8
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 22,333

Rep: Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026
Quote:
Originally Posted by jazzy_mood View Post
I've done many Windows and Linux installs since many years ago and nothing like this had happened before. The DVD I'm using was downloaded from the MS website, and on other installs using the same DVD these icons have not appeared on the desktop (they appeared even without being connected to any WiFi network, so I guess something outside is somehow interfering with my laptop).

By the way, the noises issue also happens on Linux.

I'm still not sure what these people want, but I guess they just want to tease me or annoy me in some way.

I guess they are exploiting some CPU vulnerability, since it has happened while installing with the WiFi and Bluetooth cards completely removed.
Again: seek help.

Now they're 'exploiting some CPU vulnerability', somehow....without your computer even being connected to anything??? Right....makes perfect sense.
 
Old 01-24-2020, 04:49 AM   #9
Geist
Member
 
Registered: Jul 2013
Distribution: Slackware 14 / current
Posts: 367

Rep: Reputation: Disabled
Run memtest, maybe your computers RAM is wonky.
It could be anything, what's the word in English...uh, pick one:

electr. intermittent contact Wackelkontakt {m}
electr. loose connection Wackelkontakt {m}
electr. loose contact Wackelkontakt {m}
electr. slack joint Wackelkontakt {m}

When a connection is janky due to parts bending/moving around slightly.

If a cracker is actually targeting your computer then don't worry.
If THAT is their definition of fun then let the poor troglodyte keep your computer while you move away posthaste and become a sculptor, or something.
That person is off worse than you, changing websites and making noises, that's some 90s subseven/deepthroat casual levels where some bored individual wants to be a leet haxor, infects themselves (incredibly common occurance) while rocking back and forth, giggling in mirth, clutching their knees because some random housewife in Sheboygan Wisconsin is now seeing a tic tac toe board and a spooky message like 'Mess with the best, die like the rest....that, yeah, you should be pitying them.

(Although, admittedly, it's good fun to mess with people like thatš...Ahh, firewall? What's that? Sounds dangerous. ...troglyfe)

In other words you'll be fine.


šthat's still trog levels cause the actual whizkids turned into pentesters and all that (Okay, social skills matter there too, hehe) , or at least used the internet and things like this to actually make some good dosh otherwise.

Last edited by Geist; 01-24-2020 at 05:41 AM.
 
Old 01-24-2020, 09:25 AM   #10
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 22,333

Rep: Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026Reputation: 6026
Quote:
Originally Posted by Geist View Post
Run memtest, maybe your computers RAM is wonky.
It could be anything, what's the word in English...uh, pick one:

electr. intermittent contact Wackelkontakt {m}
electr. loose connection Wackelkontakt {m}
electr. loose contact Wackelkontakt {m}
electr. slack joint Wackelkontakt {m}

When a connection is janky due to parts bending/moving around slightly.

If a cracker is actually targeting your computer then don't worry.
If THAT is their definition of fun then let the poor troglodyte keep your computer while you move away posthaste and become a sculptor, or something.
That person is off worse than you, changing websites and making noises, that's some 90s subseven/deepthroat casual levels where some bored individual wants to be a leet haxor, infects themselves (incredibly common occurance) while rocking back and forth, giggling in mirth, clutching their knees because some random housewife in Sheboygan Wisconsin is now seeing a tic tac toe board and a spooky message like 'Mess with the best, die like the rest....that, yeah, you should be pitying them.

(Although, admittedly, it's good fun to mess with people like thatš...Ahh, firewall? What's that? Sounds dangerous. ...troglyfe)

In other words you'll be fine.

šthat's still trog levels cause the actual whizkids turned into pentesters and all that (Okay, social skills matter there too, hehe) , or at least used the internet and things like this to actually make some good dosh otherwise.
Geist, please check the OP's other posts under the several user ID's they've made. Apparently it's between a psychopathic ISP person, a government official, the cybercrimes unit, etc. These aren't your ordinary hackers, either...they can (apparently) break a system in under ten seconds, even when it's not connected to any network. They can overwrite and re-flash the BIOS without it being connected either, and cause CPU's to overheat as well. And they're so skilled that they leave an absolute *TON* of evidence on their system, including desktop icons.

This isn't anything that needs technical help...but it does require help.
 
Old 01-24-2020, 10:12 AM   #11
jazzy_mood
Member
 
Registered: Mar 2019
Posts: 54

Original Poster
Rep: Reputation: 26
Quote:
Originally Posted by Geist View Post
Run memtest, maybe your computers RAM is wonky.
It could be anything, what's the word in English...uh, pick one:

electr. intermittent contact Wackelkontakt {m}
electr. loose connection Wackelkontakt {m}
electr. loose contact Wackelkontakt {m}
electr. slack joint Wackelkontakt {m}

When a connection is janky due to parts bending/moving around slightly.

If a cracker is actually targeting your computer then don't worry.
If THAT is their definition of fun then let the poor troglodyte keep your computer while you move away posthaste and become a sculptor, or something.
That person is off worse than you, changing websites and making noises, that's some 90s subseven/deepthroat casual levels where some bored individual wants to be a leet haxor, infects themselves (incredibly common occurance) while rocking back and forth, giggling in mirth, clutching their knees because some random housewife in Sheboygan Wisconsin is now seeing a tic tac toe board and a spooky message like 'Mess with the best, die like the rest....that, yeah, you should be pitying them.

(Although, admittedly, it's good fun to mess with people like that¹...Ahh, firewall? What's that? Sounds dangerous. ...troglyfe)

In other words you'll be fine.


¹that's still trog levels cause the actual whizkids turned into pentesters and all that (Okay, social skills matter there too, hehe) , or at least used the internet and things like this to actually make some good dosh otherwise.
Yes, I'm still wondering what they want, apart from bothering me. The only logical explanation I find, given some other facts, is hate crime.
 
Old 01-24-2020, 01:22 PM   #12
Geist
Member
 
Registered: Jul 2013
Distribution: Slackware 14 / current
Posts: 367

Rep: Reputation: Disabled
Quote:
Originally Posted by TB0ne View Post
Geist, please check the OP's other posts under the several user ID's they've made. Apparently it's between a psychopathic ISP person, a government official, the cybercrimes unit, etc. These aren't your ordinary hackers, either...they can (apparently) break a system in under ten seconds, even when it's not connected to any network. They can overwrite and re-flash the BIOS without it being connected either, and cause CPU's to overheat as well. And they're so skilled that they leave an absolute *TON* of evidence on their system, including desktop icons.

This isn't anything that needs technical help...but it does require help.
Oh, well, okay that is on another level, then. Dang. Thankfully all of these entities appear to be harmless, childlike tricksters.

@jazzy_mood
Hate crime? This? Hate is a mighty strong emotion, what kind of milquetoast, mealy mouthed, twinkle toed, sissy ass hate crime is this?
Redirecting your webpage and making noises? I have messed up my computer myself in worse ways and I'm on quite friendly terms with myself.

Grow a thicker skin, and run a hardware test. This isn't gangstalking or anything, nor is it ghosts or some sort of conspiracy. It's probably just faulty hardware.
Maybe seek some counseling and throw your computer in the trash, too. Can't hack what you don't own, and you won't make yourself anxious by reading up articles about extremely niche exploits to commit incredibly pathetic 'hate crimes' against you.


Edit:
After thinking this over a bit, have another angle:
Do you think it's possible that you're simply in a rut? Highly inhibited. It's rather common these days where there is almost no culture and even 'theology' has regressed a bit toward unironic discussions about morality through pop culture characters like Obi Wan Kenobi, or other such things.

Maybe your life is just really dull and you never do anything fun.

You mention hate crimes? Are you perhaps Jewish?
If you are (or, heck, even if you aren't), instead of fretting like this:
Prepare your home first, by moving furniture out of the way so you get a little arena (last thing you want is slamming your hands or arms on a piece of furniture)
Then, blast some bomb ass catchy AF klezmer music from a stereo and have a good old spazz, just go with the flow, dance dance dance, maybe hoot and yell a bit, laugh along the clarinets.
(Don't worry, your neighbors will love klezmer music, everyone loves klezmer music, including the police that might show up, but embrace it, jail is no big deal, it'll be an social adventure and I'm absolutely serious about this. )

Dance and sing (hava nagila and dodi lil are also great) until you're straight up exhausted to the point where you just want to lay on the floor, laugh and gasp and feel your body glowing.

If you also are actually the target of some group, then they'll respect you for having a good time like that. You'll graduate from Meek dweeb whom they can torment with pitiful attacks like that (to the point where you think this is as passoinate as a HATE crime) to a chad who knows how to have a good time.

And, again, I'm actually serious about this. Many people live very suppressed lives and they can get stir crazy in that way too, always gotta be a quiet mouse, bowing and scraping, being a good boy while the media, on the other hand, goes all gloom and doom.
And if you feel persecuted, establish yourself by letting your voice out and having a good time at least once every while, before you ACTUALLY go crazy.

And if this is just a ruse, etc, well, I'm sad to say, Terry A. Davis currently holds the cup of "most interesting tech madman", granted, the guy is dead, but he still had a significant suite of achievements. You'll have to do better than RF exploitation to dethrone him on the grounds of "hehe, this is a fun prank I'll play on this community".

If that all doesn't fit, really do seek counseling, even if it's just to get out of the house, which torments you so with its RF web of danger.

Last edited by Geist; 01-25-2020 at 04:20 AM.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Hacking the art of exploitation, sometimes don't work atomas123 Programming 5 04-14-2013 02:01 PM
LXer: Open Source Software: Exploitation At Its Finest LXer Syndicated Linux News 0 05-03-2012 07:12 PM
WebGL - A New Dimension for Browser Exploitation win32sux Linux - Security 3 05-12-2011 10:49 AM
Possible anti-exploitation measures in 2.6.21.5-smp? IceDane Linux - Security 1 10-12-2007 09:32 PM
LXer: Point, click, root: System exploitation with open tools LXer Syndicated Linux News 0 09-20-2006 10:21 PM

LinuxQuestions.org > Forums > Non-*NIX Forums > General

All times are GMT -5. The time now is 02:15 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration