Gaming Ways to get somebody's password

War

Take it easy~
Member
Joined
Oct 26, 2007
Messages
5,408
Trophies
0
Age
32
Location
California
Website
www.gbatemp.net
XP
1,999
Country
As long as you use private browsing you should be fine. Also, don't do that thing where the website remembers your password... like for example, whenever you put in a password while browsing in Firefox, it asks you if you want Firefox to remember the password so you don't have to put it in next time. If something like that happens just say no.
 

Midna

Banned!
Banned
Joined
Apr 13, 2008
Messages
3,336
Trophies
0
XP
1,044
Country
Albania
UltraMagnus said:
why is it wise for his parents to invade his privacy?
It's not, but this isn't an invasion of his privacy. His parents have a right to know what he's doing, and anyway; there's a saying that goes " If you don't want anyone to see, you shouldn't be doing it in the first place." (Actually I just made that up.) The best way to keep your parents out of your business is not to give them a reason to intrude.
 

UltraMagnus

hic sunt dracones
Member
Joined
Aug 2, 2007
Messages
1,964
Trophies
0
Age
35
Location
Portsmouth
Website
Visit site
XP
220
Country
ok, I will say this only once, the only full proof method would be a bootable linux usb pen drive and routing your connection through TOR. not even the feds could find out what you have been doing then (well, unless they steal your pen drive
rolleyes.gif
)

midna25 said:
UltraMagnus said:
why is it wise for his parents to invade his privacy?
It's not, but this isn't an invasion of his privacy. His parents have a right to know what he's doing,

knowing what someone is doing is pretty much the definition of "invasion of privacy".
 

Taza

Well-Known Member
Member
Joined
Sep 15, 2007
Messages
257
Trophies
0
Website
Visit site
XP
112
Country
Finland
TOR or a SSH tunnel, and of course you can't use hardware you don't know hasn't been tampered with.

So, yeah. Anyone who says private browsing/etc is enough, is both wrong and knows nothing about this stuff.

Let's have a little list of how you can track someone's browsing.

1: Proxy and/or a fitting router. Hardware between you and the internet. Setting it up ranges from trivial to advanced, hiding it only requires that you can't access the devices or don't recognize them.
2: Hardware addition, internal or external. If you know how to look for them, they are easy to spot unless a motherboard component has been replaced or the motherboard comes with functionality towards this end. Dongles, additional cards - there's aplenty ways and most of them are easy and cheap for someone competent.
3: Software addition. Trivial to set up, usually trivial to detect. Bypassed with a live media operating system, such as a CD-rom or USB flash drive Linux distribution.
4: Studying software logs. Requires no technical skill, completely effortless to set up and dodge. Easily dodged with a portable browser.

And those are just a few. In essence, to dodge it you need a secure tunnel out of the network, and to start it from your own, trusted hardware with your own, trusted operating system. Eee PC with Tor and Ubuntu you always keep with you would do, but that's a bit pricey.

If yer daddy knows computers on a semi-advanced level, there is nothing you can do until you have your own hardware you know they won't tamper with.
 

Isaiah

The Conductor
Member
Joined
Aug 24, 2008
Messages
522
Trophies
0
Location
Brisbane
XP
219
Country
Your parents are creeps... personally I'd tell to back off and to block the resquesting log from provider use something called peerguardian... not too sure about that one
 

FAST6191

Techromancer
Editorial Team
Joined
Nov 21, 2005
Messages
36,798
Trophies
3
XP
28,403
Country
United Kingdom
MicShadow said:
show a screenshot of all running processes in task manager, Id be able to identify any monitoring applications

Good job nothing is hidden from task manager then...........

Back on topic rather than telling how to do it I will tell you ways of monitoring things. I will echo Scorpei's comment on "too much effort", this game is not easy and if that is your limit give up now and save us all some time. I probably missed something obvious but hey.

Local monitoring.
1) Checking your browser history. Also checking cookies (they can stay for years if unchecked) and temp files from browser (60 tabs open tends to mean something likely gets written to the drive at some point).
Problems, can be deleted, can be circumvented by use of another browser such as firefox portable, can be circumvented by use of another operating system (see live CD like puppy linux).

Solutions. Extra storage, I can have software copy history every so often to somewhere else for later viewing. Also does nothing against real time and the other methods below.

2) Keylogger. Two main forms are hardware and software.
Hardware sits between the keyboard and socket (you could internalise one I guess but it is rare) and some can also sit on whatever management interface there is (hint firewire/ie1394 has access to many things as part of the spec and that is easily internalised, see "recent" firewire security stuff: http://www.theregister.co.uk/2008/03/04/wi...rd_bypass_tool/ ). I am assuming we are not going completely old school and having cameras.

Software is a bit different and can work in many ways. Many will try to hide themselves from the casual observer (to the point they mimic some of the bad spyware I spend the odd bit of time removing from machines). I know of nothing in this realm that can not be circumvented by use of another OS, you can also try booting in safe mode as I doubt it will be able to wind itself into windows that well (if it can then it is better than any spyware I have gone up against) and take it down from there. Checking startup values is a method but not one that I can assure you works (I have run up against a few things that delete their entry and redo it before shutdown/next boot).

Remote monitoring.

1) Dial in screen grabber. Used by bosses everywhere, loading another OS stops it and if you can killing the process also works (see spyware above). You can also have local ones that log for later viewing. See 2) to try and detect this (unless you share files on your network there is little reason for stuff to be sent to computers in the order of magnitude that this requires, filters will tell you what is standard network traffic), logging hard drive access is easy and due to the way things work in computers (writing the same file from two apps is a bad idea hence having to lock the file to one app).

2) Network monitoring. Most data is sent unencrypted and as such can be read and reconstructed with the appropriate software (see the likes of wireshark). More importantly the IP you are connecting to is also able to be monitored so running a reverse dns is not hard. I would not rely on the fact you can hammer your connection at hundreds of kilobytes a second, filtering is piss easy to do.

Problems. A fair few sites offer SSL encryption (try https:// instead of http://) but not all do as it a drain on resources and it will not stop people resolving the site in the first place. TOR and ssh work by sending the data on a long journey in the case of tor (so it looks like it first goes somewhere innocuous) and ssh works by encrypting all traffic and sending it via another computer. You have to pay for the latter though.
A proxy does work (tor is a proxy chain) but some packet inspection (will say who is doing what) can still turn up some interesting things.

In there just for giggles. Site blocking.
I already mentioned DNS but for those not paying attention your computer does not have a clue what www.google.com is but it does know what http://74.125.45.100 is DNS is little more than a list of IP addresses and their corresponding urls, most governments use this to some level ( http://www.theregister.co.uk/2008/08/11/pirate_bay_italy/ ) but people outside their purview run stuff like openDNS (which also offers a site blocking flavour). You can often tell your router to use openDNS instead of the ISP DNS server. As for logging they have something but I doubt your parents can get at it, as for the law well they have far more power than many would realise or care to know about.

Others use a proxy to filter things (see recent IWF brouhaha in the UK re wikipedia (although if I do say so blocking wikipedia is no bad thing from a getting rid of the trash point of view) and whatver else it has been doing)

Others use a the hosts file or similar to block "bad" sites.

Methods, whitelist: a list of allowed sites. Often blocks harmless ones. Usually DNS based and so SSH/tor bypasses it.
blacklist: list of blocked sites. Often allows bad ones through as it is easy enough to hijack an existing site or create a new one. Can be machine level or can be network level. Usually DNS based and so SSH/tor bypasses it.

greylist: usually tied into some form of checking software than will analyse page contents and then say whether to block or not. Try searching for biology homework or Dick Cheney with such things on. Some work on text and others on automated recognition of things (70% pink: probably porn sort of thing), some are system wide and some are browser level. Rarely you can have a human sitting the other end to check things as they come in.

A note on social engineering. Your parents presumably know who you are and as such can divine information about you that I would be willing to wager that you use or at least have let slip at some point (password a name of pet, band, actor, person, word...... you like) and the internet by definition is not local, they can get some info and look it up another way if they really wanted.

Easiest solution to the lot though: as close as it is to security by obscurity (a bad idea most of the time) find some stuff and give it to your parents to do (hint, usenet and a video player of some form like XBMC). Your social life is likely unutterably dull (most peoples are) and given the choice of new film/tv show or classics or extensive checking of sprogs where you have been given no reason to.....
 

Trolly

Well-Known Member
Member
Joined
Sep 14, 2007
Messages
1,716
Trophies
0
Age
32
Location
Behind you! I know you looked!
Website
Visit site
XP
247
Country
Hm, it sounds irritating, and I'm sure I'd hate it as well if my parents did the same, but at the end of the day BiscuitBee is right.
Not to mention, if you start trying to stop them from tracking what you're doing, they'll think you have something to hide, particularly if they're paranoid enough to track everything you're doing.
On the other hand, you could go through all the privacy measures to see whether your dad will notice. If he doesn't, you can tell it's just an empty threat to stop you going on porn and stuff like that.
 

Maz7006

iSEXu
Member
Joined
Aug 2, 2008
Messages
3,649
Trophies
1
Age
31
Website
Visit site
XP
567
Country
Rip out the network cable, that's *networking* your PC with your parents, this may disconnect your internet but hopefully its set up in such a way that you internet runs directly through a modem. Its really simple, im guessing you have a modem, which is then attached to a router, just unplug that router from the modem, and then directly connect through the internet through your modem. Of course this isn't really clever because your parents will recognize what you did but ahhh its the best way i know, the good old ripping out wires and messing around with configs.
smile.gif
Also private browsing as suggested above DOES work.
 

Strider

Next to the mainstream
Member
Joined
Oct 29, 2002
Messages
901
Trophies
0
Website
Visit site
XP
309
Country
If your dad's really good with computers, you're SOL. That's it.

Not that that's a bad thing, usually parent's look out for you...

Personally I'd configure the internet router so you'd have to run through MY proxy, and guess what? Full monitoring.

So play nice.
 

UltraMagnus

hic sunt dracones
Member
Joined
Aug 2, 2007
Messages
1,964
Trophies
0
Age
35
Location
Portsmouth
Website
Visit site
XP
220
Country
Strider said:
Personally I'd configure the internet router so you'd have to run through MY proxy, and guess what? Full monitoring.

of course if its routing through TOR all you would see is a bunch of random IP addresses....
 

link_xt

Member
Newcomer
Joined
May 25, 2008
Messages
14
Trophies
0
XP
69
Country
Brazil
Run hijackthis, then check your log at hijackthis.de to see if there's any keylogger. Before running hjt, rename it to something else, DO NOT DELETE ANYTHING WITHOUT KNOWING WHAT IT IS, ask here first
moogle.gif
 

Gwendall

Member
Newcomer
Joined
Feb 2, 2009
Messages
19
Trophies
0
Website
Visit site
XP
51
Country
United States
There's always a lazier (albeit expensive) solution:

https://www.ironkey.com/

Mmm... fun stuff. Try cracking that puppy.

Anyway as others have said, they're just being responsible. They're on the hook for whatever junk you do. It's not like you'll have them on your back forever, ride it out.

Admittedly I never had much of an issue with this though. I talked to my parents and they trusted me to do the right thing online. Sure enough, no issues.
 

Filter

Well-Known Member
Member
Joined
Aug 23, 2008
Messages
283
Trophies
0
XP
88
Country
United States
You can use
QUOTE said:
Active@ Password Changer
Ophcrack
Other linux distros that clears admin pass or changes.
3rd party software that clears Admin pass via .exe file
 

Sao Mortel

Well-Known Member
Member
Joined
Jul 23, 2008
Messages
533
Trophies
0
Age
42
Location
Montreal
Website
shoptemp.com
XP
148
Country
Canada
Your parents can check somewhat where you have been to a point; but for me an the easiest way has always been keeping a clean install of firefox portable (in a zip file maybe?) and just unzip, browse and delete when you are done.
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    Psionic Roshambo @ Psionic Roshambo: https://wccftech-com.cdn.ampproject.org/v/s/wccftech.com/amd-800-series-am5-motherboards-launch-r...