Mounting my phone. How do I stop them.
Hi guys.
Someone is hacking my home networking. Using Linux OS and mounting and creating lib files/documents and locking me out. It seems they are able to do this without rooting or jail breaking my devices. The latest example is my Amazon fire stick. The most weird example is my PS4. Problems is I am having my new replacement s8 plus that I have had to claim on because they did what they did. I don’t know how to keep them out I’ve tried VPN and antiviruses. They just seem to turn the software on me to their advantage like change the permissions of the app or add parts of code to be malicious. I have no idea why. Well I do from what I’ve seen it seems they want to spy on me using VOIP I’ve found logs of this. I’ve also used an intruder app and caught half a face on camera when they’ve initially gone into to change the app. There’s loads to the story but I’m just wondering what can I do to stop them mounting my device using ssh and removing and self signing certificates to uncertify my device. The are also harvesting cookie information for passwords but not using them. I only know because they are using chromium and when I put in http://chrome/chrome-urls I get all their stored information show up. They have also dropped ssl security on apps and webpages so I’m surfing unsecurely. I think I covered most of things. If anyone can help keep them out. Can you give me the advice. It would be best to mention also they have penetrating my home Wifi using kali or metasploit already and are using the old smb hack attack. I hope I’ve made sense and someone can help please help |
I forgot to mention the are using last loads of different open source software as well to be malicious (they put the license information on my devices) is there anyone I can contact for help with that.
For example I’ve seen a lot lately about oauth2 which I read is something to do with like authentication when logging in. Also I wanted to ask what a login token was and how they can use it to login into my accounts using it. Even though I use 2 step on everything |
I think you may be in need of expert help to help resolve this. If your devices are compromised as you describe , security credentials (and other personal/sensitive data) may have been harvested. The gateway router/firewall needs to be checked for security, and all connected devices checked. It's not a trivial task. It could be that malware is installed and enabling a hacker to further attack your network.
https://www.cnet.com/forums/discussi...k-been-hacked/ |
I definitely agree: you need to solicit professional help.
|
Quote:
https://www.linuxquestions.org/quest...nk-4175624013/ Your last thread, and this one, seem to be nothing but wild speculation about some 'they' who is hacking you somehow...and now they're in your phone too? Sorry, nothing you're saying is adding up. If you have these logs and 'proof', then you only need to take this to the police cybercrimes unit, and they can act. You claim to have proof, so use it. According to you, they are wizard-class hackers, able to hack your iphone, PS4, computer, and whatever else they want. And even though you have no proof, you KNOW they're using 'kali linux' to do this somehow. Nothing in these past two threads makes actual, technical sense. Sorry, it just doesn't; you string together technical terms that make no sense in the context you're using them. Your first post here is so inconsistent with the story you're telling (and have told), that it's not even funny. The only thing that is probably happening, is that they're using your wifi through the BT admin password, which (AGAIN) are trivial to guess. Get another wifi point that is secure, and turn off BT wifi. Past that...I agree with sundialsvcs |
Quote:
Quote:
Quote:
So show them to us. Or show someone you trust at a LUG. Or show a security professional (if you're willing to invest in the services of one). Or show the police. Because no offence, but the "my Amazon fire stick was used as an attack vector" is literally proof that you've misinterpreted something. To be clear: I said "that you've misinterpreted something". Not that that you don't actually have a problem (we don't know that). |
This one time in New Genny I was working in office / computer supply store and this old lady came in in a frantic. So I asked her what the problem was. She told me she delete the internet.
I asked here how did she do that? she told me, she deleted the little world icon off of her windows desktop, so now the internet was gone. Yes, she actually believed she had deleted the entire internet. true story. :D except for the place happened at. |
I used to work in Academic Computing at my University during minicomputer days, and the first few weeks of classes were always interesting. A lady came into the office and said the computer wasn't working. I went to her station where everything – even a "BASIC coding form," neatly filled in – was laid out just so. I sat down, absently reached to the back of the terminal to turn it on, did so ... and she abruptly said, "Stop. Thank you." And basically hurried me off. It took me a few minutes to piece together what must have happened. But, I'm not making any fun of her, even to this day. "Computer anxiety" is real. (She was very disciplined, put hard work into her classes, and excelled.)
|
Quote:
This entire thread was pretty much junk; please don't add to it. |
Quote:
they are resurrecting old, smartphone-related threads, quoting the OP and adding a few keywords. in this quote, the terms "Notepad++ Malwarebytes FileZilla" are visually hidden links. i already reported two other posts where the keywords were porn-related (and i didn-t notice they were links). |
Quote:
|
Sounds like the OP needs to seek professional substance abuse help, in the form of methamphetamine detox. Meth and crack addicts suffer from extreme paranoia and ramble like this.
|
Quote:
Quote:
|
All times are GMT -5. The time now is 08:42 PM. |