Solved

what connections should be in my network connection logs?

Posted on 2016-10-20
6
33 Views
Last Modified: 2016-10-30
I'm trying to trace a hacker that's in my computer and phone as well...basically my entire network. I've been recording my network connections and PCAPs but there are so many captures that log how can I tell which ones to research and which ones are simply apps running in the bankground?
also if the title of a capture reads "unknown"is that an automatic red flag??
any advice is greatly appreciated.
0
Comment
Question by:Fulgencio Eres
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 94

Assisted Solution

by:John Hurst
John Hurst earned 500 total points
ID: 41852935
I suggest you get and install Comm View (Tamosoft). This will tell you on the main packet screen the Local and Remote IP, the Ports, the Hostname (if one) and the process used.

Any significant traffic (total bytes) to / from something you do not recognize is cause for concern.
0
 
LVL 70

Expert Comment

by:Merete
ID: 41853189
Try the Process Hacker it's free
A free, powerful, multi-purpose tool that helps you
monitor system resources, debug software and detect malware.
http://processhacker.sourceforge.net/
What makes you think you have been hacked?
What are the signs?
Do you have any Peer to peer software installed for downloading like Bittorrent/Gnutella Napster if so check if you have disabled the uploading.
With Peer to Peer the file-transfer load is distributed between the computers exchanging files, but file searches and transfers from your computer to others can cause bottlenecks.
Some people download files and immediately disconnect without allowing others to obtain files from their system, which is called leeching.
This limits the number of computers the software can search for the requested file.
0
 
LVL 94

Accepted Solution

by:
John Hurst earned 500 total points
ID: 41853197
Comm View reports this very nicely.

You could try Wireshark but I prefer Comm VIew because it does all this.
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 70

Expert Comment

by:Merete
ID: 41854771
Your two questions should be in the same so that the information is relevant to both
what info is needed to have the cops research a cybercrime?
https://www.experts-exchange.com/questions/28977688/what-info-is-needed-to-have-the-cops-research-a-cybercrime.html
0
 

Author Comment

by:Fulgencio Eres
ID: 41866144
Thank you so much for replying (everyone)..
I have the report from CommView (I have WireShark also) what information is the information that is important?  what do I research more? what is the info needed for the police?
0
 
LVL 94

Expert Comment

by:John Hurst
ID: 41866150
The only information the police would want would be an identifiable external IP Address (that one can look up in Whois).
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

OfficeMate Freezes on login or does not load after login credentials are input.
The Nano Server Image Builder helps you create a custom Nano Server image and bootable USB media with the aid of a graphical interface. Based on the inputs you provide, it generates images for deployment and creates reusable PowerShell scripts that …
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
Hi friends,  in this video  I'll show you how new windows 10 user can learn the using of windows 10. Thank you.

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question