Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
So unfortunately I was hacked and the people that are hacking me continue to do so for the last 7 months. What’s worse is that they’ve set up all these servers over my devices using Linux I think.
My first question is how to I close down ports on a different device using my windows pc. I was thinking that it would be something with cmd and a local IP address. I need to shut down all the ports that have been opened on my phones my smart tv my PlayStation my router has a file server. Something to my knowledge of samba over the router ip.
Second question how do I block and remote access to the router itself would it be like blocking ports. They have altered the firewall settings but it’s not showing up in the router gui so I’m wondering how they are doing it. (Originally they lived next door) but recently have moved thank god!
Thirdly I’ve noticed on quite a lot of my devices that there seems to be direct tunnelling from them to my device. I noticed this when I had a vpn set up and then I looked into things further and discovered you can directly creafe a tunnel between two devices. And this connection is maintain whether I switch to WiFi or mobile internet or if I even use a friends Wifi. They use stun p1 Cisco port 1990. So I wondering how I would remove vpn settings from potentially all together windows 7 windows 10 iPhone 6s Samsung s8 plus amazon fire stick a PlayStation 4 and a smart tv.
Is it even possible to remotely add a vpn to my devices so they can connect whether my router is off or on??
Lastly, how to I stop ssh tunnelling and how do I stop them from using Remote Desktop manager and things that would allow them to remotely take control of my devices or even worse remotely change my admin settings.
I have had registry keys changed and windows accounts locked out. I had to reset my administrator password the other day. I was wondering if someone could recommend what windows features I should turn off or block on the firewall and also what ports should I be looking at closely when it comes to remote hacking or remote file transfer.
I forgot to mention also that my windows 10 laptop is dual booted with Ubuntu what would I need to stop them from accessing that part of the system or do I need to.
If anyone can help I’d really appreciate it guys I’m sick of spending out money sending these devices off for repair only for them to just hack it again and put malware on to spy on me.
So unfortunately I was hacked and the people that are hacking me continue to do so for the last 7 months. What’s worse is that they’ve set up all these servers over my devices using Linux I think.
My first question is how to I close down ports on a different device using my windows pc. I was thinking that it would be something with cmd and a local IP address. I need to shut down all the ports that have been opened on my phones my smart tv my PlayStation my router has a file server. Something to my knowledge of samba over the router ip.
Second question how do I block and remote access to the router itself would it be like blocking ports. They have altered the firewall settings but it’s not showing up in the router gui so I’m wondering how they are doing it. (Originally they lived next door) but recently have moved thank god!
Thirdly I’ve noticed on quite a lot of my devices that there seems to be direct tunnelling from them to my device. I noticed this when I had a vpn set up and then I looked into things further and discovered you can directly creafe a tunnel between two devices. And this connection is maintain whether I switch to WiFi or mobile internet or if I even use a friends Wifi. They use stun p1 Cisco port 1990. So I wondering how I would remove vpn settings from potentially all together windows 7 windows 10 iPhone 6s Samsung s8 plus amazon fire stick a PlayStation 4 and a smart tv.
Is it even possible to remotely add a vpn to my devices so they can connect whether my router is off or on??
Lastly, how to I stop ssh tunnelling and how do I stop them from using Remote Desktop manager and things that would allow them to remotely take control of my devices or even worse remotely change my admin settings.
I have had registry keys changed and windows accounts locked out. I had to reset my administrator password the other day. I was wondering if someone could recommend what windows features I should turn off or block on the firewall and also what ports should I be looking at closely when it comes to remote hacking or remote file transfer.
I forgot to mention also that my windows 10 laptop is dual booted with Ubuntu what would I need to stop them from accessing that part of the system or do I need to.
If anyone can help I’d really appreciate it guys I’m sick of spending out money sending these devices off for repair only for them to just hack it again and put malware on to spy on me.
Same things you've posted in your other threads. Still no proof, and nothing you're saying makes sense. Thread reported as a triplicate-post.
Look....seriously.... All you have to do is turn your internet connection OFF, NOBODY can hack you if you don't have net connection. Reset/reinstall your phones/computers. Change all your passwords, buy a new router or better yet just forget the router and go with Ethernet, etc.
Apparently, they've moved within the past two weeks, according to the OP's posting history.
Quote:
Originally Posted by Mill J
Look....seriously.... All you have to do is turn your internet connection OFF, NOBODY can hack you if you don't have net connection. Reset/reinstall your phones/computers. Change all your passwords, buy a new router or better yet just forget the router and go with Ethernet, etc.
Mill J, I really don't think that'll fix the OP's real problem. Please see the previous two threads, because the OP just isn't making sense on any level.
"So my walls are thin enough for me to know my neighbours have hacked me. I can often hear them bragging about it. I’ve called BT so many times like more than 15 and they say it’s fine their end but yet every device I have has been modified." **They'd brag loudly? 15 calls to the ISP? EVERY DEVICE has been 'modified'?**
"I got a vpn I’m using nord but they’ve put on my devices IPsec VPN and its tunnelling my connection to them I think."
"I think they are using metasploit they are also using team viewer with a terminal so they can see my screen. I can see from the logs. They are using something called teredo isatap something."
"Someone is hacking my home networking. Using Linux OS and mounting and creating lib files/documents and locking me out. It seems they are able to do this without rooting or jail breaking my devices. The latest example is my Amazon fire stick. The most weird example is my PS4." **C'mon; Linux isn't magic. 'they' are locking them out...but somehow they're still able to get IN to see these mystery files/documents. Without rooting/jailbreaking devices. Including an iPhone, Fire stick, and a PS4. Somehow...**
"Well I do from what I’ve seen it seems they want to spy on me using VOIP I’ve found logs of this. I’ve also used an intruder app and caught half a face on camera when they’ve initially gone into to change the app." **Now it's VOIP for spying, instead of teamviewer through a terminal, or any of the other words randomly thrown out. And in the first thread, the police wanted proof. Seems the OP has it..so why not give it to police?**
"what can I do to stop them mounting my device using ssh and removing and self signing certificates to uncertify my device. " ??????
I don't think an IT professional is the type of professional help that could sort this problem out.
Mill J, I really don't think that'll fix the OP's real problem. Please see the previous two threads, because the OP just isn't making sense on any level.
I totally agree. But if everything OP states is true it would be best to start over from scratch. And very carefully transfer data after assuring it is virus free.
Too me anybody that waits this long to act...This is a BIG deal, I'd leave no stone unturned, hardware or other to limit access to my box. Even if I'd have to go offline until I had it fixed/secured.
I was following the previous threads as well. Which led me to believe that he is unwilling to help himself or follow advice.
All that aside, you have to admit, an offline computer is safe from hackers that don't have physical access, allowing time to recover. Its not like he's running a server...
Distribution: Slackware/Salix while testing others
Posts: 1,718
Rep:
that will not correct telepathic hacking, UFO hacking etc... suggestion would be to wrap the house in industrial strength foil, surrounded by bubble wrap, surrounded by gorilla tape, surrounded by sound proofing boards, surrounded by soil surface (aka dirt) mixed with thermite. That will stop them, unless they are poltergeist hackers.
I totally agree. But if everything OP states is true it would be best to start over from scratch. And very carefully transfer data after assuring it is virus free. Too me anybody that waits this long to act...This is a BIG deal, I'd leave no stone unturned, hardware or other to limit access to my box. Even if I'd have to go offline until I had it fixed/secured. I was following the previous threads as well. Which led me to believe that he is unwilling to help himself or follow advice.
First, I don't disagree with anything here, about cleaning the environment/etc, after a breach. But I do NOT think the OP has had any breaches or any intrusions at all, past MAYBE their neighbors using their wifi without permission. Nothing else the OP has said makes any sort of sense, at all, and indicates a problem that can't be fixed with a computer.
Quote:
All that aside, you have to admit, an offline computer is safe from hackers that don't have physical access, allowing time to recover. Its not like he's running a server...
Very true. But according to the OP, they have already 'modified' ALL the devices, including phones, an Amazon fire stick, PS4, computer, and probably the toaster too.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.