LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie
User Name
Password
Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question? If it is not in the man pages or the how-to's this is the place!

Notices


Reply
  Search this Thread
Old 10-08-2020, 10:22 PM   #31
duupunisher2x
Member
 
Registered: Aug 2020
Posts: 88

Original Poster
Rep: Reputation: Disabled

Quote:
Originally Posted by TB0ne View Post
So then why don't you ask this 'top networking security expert' for more information?? Sounds like you know them, and aren't going to listen to anyone here.
I don't have contact with them anymore. When they said this to me, they were specifically talking about "remote-access", like using a RAT virus/malware. They weren't talking about anything like keyloggers, etc, just full remote-access.
 
Old 10-08-2020, 10:27 PM   #32
duupunisher2x
Member
 
Registered: Aug 2020
Posts: 88

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by sgosnell View Post
What makes you believe that a terminal or browser has anything to do with it?
I think it is common knowledge that malware is often sent to computers using someone's ip address. Does this have to do with the terminal or browser, that I do not know.
 
Old 10-08-2020, 10:28 PM   #33
duupunisher2x
Member
 
Registered: Aug 2020
Posts: 88

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by TB0ne View Post
So then why don't you ask this 'top networking security expert' for more information?? Sounds like you know them, and aren't going to listen to anyone here.
What's wrong with a good discussion about something? That's how everyone learns more.
 
Old 10-08-2020, 10:31 PM   #34
duupunisher2x
Member
 
Registered: Aug 2020
Posts: 88

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by sgosnell View Post
What makes you believe that a terminal or browser has anything to do with it?
I would love to know how malware getting on my computer works when it is sent via someone's ip address. I will google it but anything you would like to add would be appreciated!
 
Old 10-08-2020, 10:34 PM   #35
duupunisher2x
Member
 
Registered: Aug 2020
Posts: 88

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by jefro View Post
There are three main ways one can have some malware.

A newly discovered uefi and older bios issues may contain embedded code.

Any connection to the outside or use of any media such as cd,usb or network that can allow code to execute.

Any of the pre-installed programs and or base system can be infected or have a defect that can allow attack.

Thank you. How would a connection to the outside via a "network" work? Such as using someone's ip address via the network, or, another way via the network.
 
Old 10-09-2020, 03:16 PM   #36
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,965

Rep: Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622
If one monitors the network traffic on their home or business wan connection they find that there is attackers working to try to access your lan every few seconds or more. The wan traffic is much worse than most people think.
 
Old 10-10-2020, 03:00 PM   #37
duupunisher2x
Member
 
Registered: Aug 2020
Posts: 88

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by jefro View Post
If one monitors the network traffic on their home or business wan connection they find that there is attackers working to try to access your lan every few seconds or more. The wan traffic is much worse than most people think.
Thanks. Would you agree that most attackers monitoring someone's network traffic will try to gain access via someone's IP address? I know there are other vectors of attack, but whenever I have heard someone saying they get on someone else's computer, they have always said they did it using that person's IP address. I know the OS is very vulnerable too.

QUESTION: When someone does send malware via the ip address, what is the path that the malware takes as it leaves the attacker's computer?

Thanks.

Last edited by duupunisher2x; 10-10-2020 at 03:04 PM.
 
Old 10-10-2020, 04:51 PM   #38
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 26,604

Rep: Reputation: 7960Reputation: 7960Reputation: 7960Reputation: 7960Reputation: 7960Reputation: 7960Reputation: 7960Reputation: 7960Reputation: 7960Reputation: 7960Reputation: 7960
Quote:
Originally Posted by duupunisher2x View Post
What's wrong with a good discussion about something? That's how everyone learns more.
Only if you listen to what others say. You've been told lots....and seem to ignore it.
 
Old 10-10-2020, 05:37 PM   #39
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,965

Rep: Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622Reputation: 3622
IP address is one way but there are others.

Assuming that an actor sends malware via internet then we would have to look at ways that the target computer can be compromised. There is no simple one line answer for how on that question. So many ways to attack.
 
Old 10-11-2020, 05:55 AM   #40
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,779

Rep: Reputation: 7304Reputation: 7304Reputation: 7304Reputation: 7304Reputation: 7304Reputation: 7304Reputation: 7304Reputation: 7304Reputation: 7304Reputation: 7304Reputation: 7304
Quote:
Originally Posted by duupunisher2x View Post
QUESTION: When someone does send malware via the ip address, what is the path that the malware takes as it leaves the attacker's computer?

Thanks.
I'm afraid it does not work that way. Malware is not sent to a given IP to damage the target.
Actually we have packages sent from one computer to another and these packages may contain anything, like account numbers, pictures, videos, malware ....

I think you need to understand first what is an IP address, a port and how the network communication works. How can be anything transferred from one host to another?

by the way, you may try to boot your PC without network (unplugged) to see what's happening in that case.

Last edited by pan64; 10-11-2020 at 05:57 AM.
 
Old 10-13-2020, 05:18 PM   #41
Hermani
Member
 
Registered: Apr 2018
Location: Delden, NL
Distribution: Ubuntu
Posts: 261
Blog Entries: 3

Rep: Reputation: 113Reputation: 113
Quote:
Originally Posted by duupunisher2x View Post
QUESTION: When someone does send malware via the ip address, what is the path that the malware takes as it leaves the attacker's computer?
Most times, it is crossing a network switch. Sometimes, a router too.

Last edited by Hermani; 10-13-2020 at 05:19 PM.
 
1 members found this post helpful.
Old 10-13-2020, 05:23 PM   #42
dugan
LQ Guru
 
Registered: Nov 2003
Location: Canada
Distribution: distro hopper
Posts: 11,217

Rep: Reputation: 5309Reputation: 5309Reputation: 5309Reputation: 5309Reputation: 5309Reputation: 5309Reputation: 5309Reputation: 5309Reputation: 5309Reputation: 5309Reputation: 5309
Quote:
Originally Posted by duupunisher2x View Post
I think it is common knowledge that malware is often sent to computers using someone's ip address.
AFAIK this is not correct. A lot of malware is spread via infected ads, phishing or other forms of social engineering, or infected USB drives -- none of which require the attacker to know your IP.

If someone is able to plant malware on your system using no information other than your IP, then you've already been owned. No malware needed.

Last edited by dugan; 10-13-2020 at 05:34 PM.
 
Old 10-13-2020, 05:43 PM   #43
duupunisher2x
Member
 
Registered: Aug 2020
Posts: 88

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by Hermani View Post
Most times, it is crossing a network switch. Sometimes, a router too.
I think you are exactly correct. I had someone sit right next to me when I was using my laptop and open wifi. I was not using a vpn and my mac address was not spoofed. When I would connect to the network, they would start typing into their computer. I would purposely disconnect after 15 seconds and wait 2 minutes. Once I disconnected, they stopped and didn't start again until I reconnected. I did this cycle about 5 times, every time they stopped typing after I disconnected.

I also have spoken with others, long ago, who said they would get on their ex-girlfriend's computer by sending a RAT, but that they needed to know their ip address.

Last edited by duupunisher2x; 10-13-2020 at 05:54 PM.
 
Old 10-13-2020, 05:48 PM   #44
duupunisher2x
Member
 
Registered: Aug 2020
Posts: 88

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by dugan View Post
AFAIK this is not correct. A lot of malware is spread via infected ads, phishing or other forms of social engineering, or infected USB drives -- none of which require the attacker to know your IP.

If someone is able to plant malware on your system using no information other than your IP, then you've already been owned. No malware needed.
I saw what you wrote before you deleted it: "now everyone knows". With all due respect, why are you afraid for people to know how easy it is for others to get on their computers, especially when using open wifi?

People need to know how easy it is for someone else to get on their computers.
 
Old 10-13-2020, 05:49 PM   #45
duupunisher2x
Member
 
Registered: Aug 2020
Posts: 88

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by Hermani View Post
Most times, it is crossing a network switch. Sometimes, a router too.
What happens after someone identifies me on the network, such as when using open wifi and no vpn and no spoofed mac?
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Can the peppermint bootable usb drive be permanently infected if malware gets root access? Ulysses_ Linux - Security 30 04-21-2017 05:22 PM
May have contracted malware. Yes, malware. Firefox on Ubuntu Fiesty. Seeking a fix drachenchen Linux - Security 1 06-12-2008 05:10 AM
Phục hồi dữ liệu bị mất???, cứ pollsite General 1 06-27-2005 12:39 PM
Gotta love those ٱٱٱٱٱٱٱ&# iLLuSionZ Linux - General 5 11-18-2003 07:14 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie

All times are GMT -5. The time now is 04:22 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration