The Naked Scientists
  • Login
  • Register
  • Podcasts
      • The Naked Scientists
      • eLife
      • Naked Genetics
      • Naked Astronomy
      • In short
      • Naked Neuroscience
      • Ask! The Naked Scientists
      • Question of the Week
      • Archive
      • Video
      • SUBSCRIBE to our Podcasts
  • Articles
      • Science News
      • Features
      • Interviews
      • Answers to Science Questions
  • Get Naked
      • Donate
      • Do an Experiment
      • Science Forum
      • Ask a Question
  • About
      • Meet the team
      • Our Sponsors
      • Site Map
      • Contact us

User menu

  • Login
  • Register
  • Home
  • Help
  • Search
  • Tags
  • Recent Topics
  • Login
  • Register
  1. Naked Science Forum
  2. Non Life Sciences
  3. Geek Speak
  4. Do hackers leave a trail?
« previous next »
  • Print
Pages: [1]   Go Down

Do hackers leave a trail?

  • 4 Replies
  • 7740 Views
  • 0 Tags

0 Members and 1 Guest are viewing this topic.

Offline thedoc (OP)

  • Forum Admin
  • Hero Member
  • *****
  • 510
  • Activity:
    0%
  • Thanked: 21 times
Do hackers leave a trail?
« on: 04/09/2012 18:25:14 »
Do hackers leave a trail?
Asked by Mark, Bletchley


                                        Visit the webpage for the podcast in which this question is answered.

 

« Last Edit: 04/09/2012 18:25:14 by _system »
Logged
 



Offline thedoc (OP)

  • Forum Admin
  • Hero Member
  • *****
  • 510
  • Activity:
    0%
  • Thanked: 21 times
Do hackers leave a trail?
« Reply #1 on: 04/09/2012 18:25:14 »
We answered this question on the show...



 Steven -   It’s very hard not to leave a trail with your breaking into a computer system.  Some hackers will try to cover up what there is, but there’ll generally be something left over.
Ross -   Well, even although there's a trail, the problem is doing anything about it and the root problem in the UK is that back in 2005, the home office agreed that frauds should in future be reported not to the police, but to the banks.  This had the effect of reducing the fraud figures to near zero.  It also had the effects of removing the police incentives to look into the problem.
Chris -  Indeed.  Oh, dear!  That’s an important aspect in terms of who actually claims the credit for discovering this. 
« Last Edit: 04/09/2012 18:25:14 by _system »
Logged
 

Offline Schema

  • First timers
  • *
  • 6
  • Activity:
    0%
Re: Do hackers leave a trail?
« Reply #2 on: 15/07/2013 01:03:10 »
It depends on the quality of the hacker. Every thing you do leaves a trail; a log. But that trail doesn't have to point to you. I suppose a knowledgeable hacker would first hack into someone else's router before attempting to do anything stupid.  The best foolproof method to hacking is using a disposable, sanitized laptop from a wifi hotspot.
« Last Edit: 15/07/2013 01:07:19 by Schema »
Logged
 

Offline JSparkle

  • First timers
  • *
  • 7
  • Activity:
    0%
    • CG Cleaning Services
Re: Do hackers leave a trail?
« Reply #3 on: 16/08/2013 06:48:48 »
Agree - everything leaves a trail of some sort - most hackers get caught eventually so I guess there must be a trail for the authorities to follow.
Logged
CG Cleaning Services
 

Offline yor_on

  • Naked Science Forum GOD!
  • *******
  • 81389
  • Activity:
    100%
  • Thanked: 178 times
  • (Ah, yes:) *a table is always good to hide under*
Re: Do hackers leave a trail?
« Reply #4 on: 19/08/2013 00:21:50 »
It depends.

You can either do it Chema's way, in which case the electronic trail itself shouldn't matter, although the expertise shown, as what methodology used, as well as the geographic end-location will. Or you can do it through intermediaries, as some network of computers when it comes to bombing some poor private server. Then you also can use jumping between computers, and creating false IP addresses, dump the log before leaving or just change it. And there are other ways too I'm sure. But except for the first, I think all should be track-able to some origin, as long as there is something to follow, and those nodes involved/used agree to let you see their logs. The last can be a big problem if the cracker went all over the globe before arriving to your server.

And naturally you can combine those two. But the most used and simplest approach seems to 'social engineering', in where you fool someone to give a legitimate password into the system.
Logged
URGENT:  Naked Scientists website is under threat.    https://www.thenakedscientists.com/sos-cambridge-university-killing-dr-chris

"BOMB DISPOSAL EXPERT. If you see me running, try to keep up."
 



  • Print
Pages: [1]   Go Up
« previous next »
Tags:
 
There was an error while thanking
Thanking...
  • SMF 2.0.15 | SMF © 2017, Simple Machines
    Privacy Policy
    SMFAds for Free Forums
  • Naked Science Forum ©

Page created in 0.28 seconds with 44 queries.

  • Podcasts
  • Articles
  • Get Naked
  • About
  • Contact us
  • Advertise
  • Privacy Policy
  • Subscribe to newsletter
  • We love feedback

Follow us

cambridge_logo_footer.png

©The Naked Scientists® 2000–2017 | The Naked Scientists® and Naked Science® are registered trademarks created by Dr Chris Smith. Information presented on this website is the opinion of the individual contributors and does not reflect the general views of the administrators, editors, moderators, sponsors, Cambridge University or the public at large.