Solved

Tracking IP of hackers through windows 2000 logs

Posted on 2003-10-27
11
330 Views
Last Modified: 2013-12-04
I have been hacked and wonder if it is possible to track a hacker's ip address through windows logs or something similar.

Also if a hacker accesses a computer using Remote Procedure Call (RPC) interface, would their IP address be trackable in the same or similar way?

Thanks

0
Comment
Question by:Rowby Goren
  • 5
  • 5
11 Comments
 
LVL 49

Expert Comment

by:sunray_2003
Comment Utility
Rowby,

It is going to very difficult to find that find unless you are an hacker ..This is because hackers never hack without changing their IP ( IP spoofing) . So even if you find one it is not going to be the hackers

Sunray
0
 
LVL 9

Author Comment

by:Rowby Goren
Comment Utility
Thanks sunray.  

Even though their IP's might be spoofed, are the IP's at least  recorded in the logs?

0
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 425 total points
Comment Utility
Rowby,

It again depends. Hackers can be smart enough to write a program to delete the IP address in logs.

Best thing I would suggest is to have a good firewall program like zonealarm .which will record incoming port information and all required details .In that case only if you accept the incoming traffic would come inside

Sunray
0
 
LVL 9

Author Comment

by:Rowby Goren
Comment Utility
Thanks!

I'll award you the 250  points.  But will increase the points to 500 points and share those points with others who have commnents.

I'm partciularly intersted in knowing if a hacker comes through Remote Procedure Call (RPC) interface (one of Microsoft 2000's vulnerabilities patched with their update(s)  00 if their ip is also logged.

0
 
LVL 49

Expert Comment

by:sunray_2003
Comment Utility
Let me work more to get other 250

Sunray
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 9

Author Comment

by:Rowby Goren
Comment Utility
Sure!  :)
0
 
LVL 49

Expert Comment

by:sunray_2003
Comment Utility
Rowby,

I am not really sure if the ip address that you can see is through RPC .However you should get the IP address logged in the event log .

http://www.isogon.com/winnt200v3.htm

Sunray
0
 
LVL 9

Author Comment

by:Rowby Goren
Comment Utility
Thanks Sunray.  I'll be awarding the full points tomorrow morning. And thanks for the link too.

You can add anything else that comes to mind -- and I'll be giving you the full 500.

THanks!
0
 
LVL 5

Assisted Solution

by:juliancrawford
juliancrawford earned 75 total points
Comment Utility
Another good way to catch the hackers is to setup a honeypot.

A honeypot will show an open port to the hacker when he scans your PC.
He will think he has found a access point to enter - but really its just a trap you have laid to capture his IP address.
One may be obtained here if you are interested.
http://www.astalavista.com/tools/intrusiondetection/misc/
:)
0
 
LVL 9

Author Comment

by:Rowby Goren
Comment Utility
Thanks sunray and Julilan.

I'll probalby ask some more questions on this topic in a few days.
0
 
LVL 49

Expert Comment

by:sunray_2003
Comment Utility
Thanks

Sunray
0

Featured Post

Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

Join & Write a Comment

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Users of Windows 10 Professional can disable automatic reboots using the policy editor. This tool is not included in the Windows home edition. But don't worry! Follow the instructions below to install (a Win7) policy editor on your Windows 10 Home e…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now