Solved

IP security

Posted on 2004-04-25
9
206 Views
Last Modified: 2010-04-11
I chat a lot in MIRC and someone told me yesterday that he runs a program that ''captures'' your personal data. Your name hour phone number etc. Is it possiple just using my IP address or any otner information from my MIRC connection? I have a university connection and he asked me what is the name of the responsible for the internet connections in my university...I think that he was just jocking, but I am a bit anxious! Can he find my name? And I he can do it, why did he ask me this name? Isn't he capable of finding my name by his onw means? Thank you in advance for your response!
0
Comment
Question by:escape_23
9 Comments
 
LVL 32

Accepted Solution

by:
Luc Franken earned 43 total points
Comment Utility
Hi escape_23,

Unless he has installed a keylogger or something like that on your computer, the answer is simple:
No, he can't do that. He's just talking way beond his knowledge :)

But that's what you allready figured out yourself:
>>And I he can do it, why did he ask me this name? Isn't he capable of finding my name by his onw means?<<
He told you he was able to find out, and now he isn't able to find it out???

Greetings,

LucF
0
 
LVL 5

Assisted Solution

by:Droby10
Droby10 earned 41 total points
Comment Utility
there's not an absolute yes/no answer for this.  he's not going to be able to automate this process with any form of 100% certainty, but using an IP obtained from irc as a gateway for further manual exploration, could eventually yield exactly such info.  barring any form of remotely installed malware, computers loaded with a network capable OS generally provide the necessary functionality to take advantage of an unsuspecting user remotely.  at times this is due to misconfiguration, other times from service/system/application flaw.  another possibility would be through infrastructure tampering.  ie. dns poisoning, dhcp packet injection, route manipulations, etc.  i would be willing to bet that most of these are safeguarded well in a university network, but it wouldn't be the first time.

0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 41 total points
Comment Utility
There have been exploits in mIRC for sometime now, and depending on the version you run, you may or may not be vulnerable. Here are a few:
http://securityresponse.symantec.com/avcenter/venc/data/w32.gillich.mirc.html (october 2002)
http://securityresponse.symantec.com/avcenter/venc/data/w32.fruit.mirc.html (2000)
http://securityresponse.symantec.com/avcenter/venc/data/w32.lxd.mirc.html (2000)

http://www.irchelp.org/irchelp/mirc/exploit.html
http://www.mondoirc.net/forum/topic.asp?TOPIC_ID=1789

many applications suffer from exploits and security holes very similar to these. Typically people who know what they are doing, will not tell you, unless they are script kiddie newb's who think they are cool because they DL'd a tool and know how to use it. So what I say is ignore this fellow, get a firewall and AV if running M$, update all your software regularally.
-rich
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 
LVL 1

Expert Comment

by:tr1cksho7
Comment Utility
Well, once he got ur ip, he can do a whois with a whois program n he can find the name of ur ISP. he can know wat ISP u r using.

Hope this helps!!
0
 
LVL 24

Expert Comment

by:SunBow
Comment Utility
I agree with  richrumble, that you cannot make any assumption that you are secure, especially if using "chat a lot in MIRC "

Fortunately you are not at home and do have a few protections while at school.

>  Is it possiple just using my IP address or any otner information from my MIRC connection?

No. Exploits like that need a little more help, and we won't post any 'how-to' concerning that.

>  he asked me what is the name of the responsible for the internet connections in my university.

The answer to that question is very trivial, indicating your 'chat friend' is not very knowledgeable if he has to ask.

> Question Title: IP security

IP is networking, which is never really perferctly secure. Keep that in mind, behave well, and do not offer personal information easily
0
 
LVL 11

Expert Comment

by:PennGwyn
Comment Utility
> i would be willing to bet that most of these are safeguarded well in a university network, but ...

and

> Fortunately you are not at home and do have a few protections while at school.

IT department efforts to secure university networks tend to run headlong into tenured faculty who believe that any attempt to filter or monitor network traffic infringes upon their "academic freedom".  Even if the university has staff who understand what should be done (most do), DO NOT assume that they are actually permitted to do it!

0
 

Expert Comment

by:mgbyrne2004
Comment Utility
*** advertising removed by Netminder, Site Admin ***
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now