Solved

Tracking IP of hackers through windows 2000 logs

Posted on 2003-10-27
11
333 Views
Last Modified: 2013-12-04
I have been hacked and wonder if it is possible to track a hacker's ip address through windows logs or something similar.

Also if a hacker accesses a computer using Remote Procedure Call (RPC) interface, would their IP address be trackable in the same or similar way?

Thanks

0
Comment
Question by:Rowby Goren
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 5
11 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9630708
Rowby,

It is going to very difficult to find that find unless you are an hacker ..This is because hackers never hack without changing their IP ( IP spoofing) . So even if you find one it is not going to be the hackers

Sunray
0
 
LVL 9

Author Comment

by:Rowby Goren
ID: 9630805
Thanks sunray.  

Even though their IP's might be spoofed, are the IP's at least  recorded in the logs?

0
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 425 total points
ID: 9630856
Rowby,

It again depends. Hackers can be smart enough to write a program to delete the IP address in logs.

Best thing I would suggest is to have a good firewall program like zonealarm .which will record incoming port information and all required details .In that case only if you accept the incoming traffic would come inside

Sunray
0
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

 
LVL 9

Author Comment

by:Rowby Goren
ID: 9630869
Thanks!

I'll award you the 250  points.  But will increase the points to 500 points and share those points with others who have commnents.

I'm partciularly intersted in knowing if a hacker comes through Remote Procedure Call (RPC) interface (one of Microsoft 2000's vulnerabilities patched with their update(s)  00 if their ip is also logged.

0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9630873
Let me work more to get other 250

Sunray
0
 
LVL 9

Author Comment

by:Rowby Goren
ID: 9630882
Sure!  :)
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9631254
Rowby,

I am not really sure if the ip address that you can see is through RPC .However you should get the IP address logged in the event log .

http://www.isogon.com/winnt200v3.htm

Sunray
0
 
LVL 9

Author Comment

by:Rowby Goren
ID: 9631428
Thanks Sunray.  I'll be awarding the full points tomorrow morning. And thanks for the link too.

You can add anything else that comes to mind -- and I'll be giving you the full 500.

THanks!
0
 
LVL 5

Assisted Solution

by:juliancrawford
juliancrawford earned 75 total points
ID: 9631894
Another good way to catch the hackers is to setup a honeypot.

A honeypot will show an open port to the hacker when he scans your PC.
He will think he has found a access point to enter - but really its just a trap you have laid to capture his IP address.
One may be obtained here if you are interested.
http://www.astalavista.com/tools/intrusiondetection/misc/
:)
0
 
LVL 9

Author Comment

by:Rowby Goren
ID: 9638464
Thanks sunray and Julilan.

I'll probalby ask some more questions on this topic in a few days.
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9639080
Thanks

Sunray
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question