Jump to content

antihacker101

Members
  • Posts

    3
  • Joined

  • Last visited

Everything posted by antihacker101

  1. when it comes to a good antivirus, none really work on this backdoor aka indetectble, but so far eset.com is the first ever(actually 2nd) to detect over 16 trojans which are part of the worm. the first was kasperty 2010, but the hacker shortly after intercepted the detection never detected again. it detected over 60 generic keyloggers resulting in my graphics/audio/lan drivers to be updatable for the first time in a year. but it came back shortly after. but try eset.com
  2. i can tell ya whats going on. the highest priority of the hacker that created the botnet system since aug 2008 was to make it undetectable. the main botnet is actually a backdoor injected into your motherboard through a chip flaw. if you was to format and install a firewall, you can use sysinternal's process monitor and watch it use both sides of the connection to breakthrough. the hacker injects radio packets from a smartphone through a phone tower to send a request for info of your system. he then uses codes to talk back and forth using cookies and smtp. if you had best security, the hacker would create an incoming cookie that i always choose block/allow/view info. no matter what you choose, the worm intercepts the packets and recieves commands from your hacker buddy. the worm in return if need be, creates an smtp packet with codes in the subject using dollarsigns before and after a word. that is how they mainly talk. when you see ANON scripts or packets, that means that he hijacked your first master boot record. this is where the codes are that he injects into your browser to connect to other sites. when you see the ARP packets, it means that he has hijacked your drivers/firmware/kernel and set it up to run independant of your operating system. you may be pinging as much as 2 or 3 thousand ips per hour 24/7. the only way to detect so far(besides your connection being so slow), is to put a router with a good log between your connection and computer . this will show incoming and outgoing. all that is required for this to run is to turn your machine on. and later on if you get these kernel lags, you prolly have another infected machine locally that is turned on. or it seems he may alter timers and threads. when this first started and may be how you guys can help me figure out, you could not even low level format any hardrive if there was more than 1 active anywhere on the network. now i cant even low level format any drive. when i used dban, it repeativly mentioned DAV. and of course the access violation(cache(part of chip hack)) related. i went through my notes and noticed an old message i wrote down while monitoring the worm that said AXEL.DAV = data interface. i would like to know if anyone knows t hat that is or means. thanks
  3. i may be the only one that can answer your question. first a lot of you may start noticing a lot of stuff happening starting this month after a change in the worm feb 13. what was never told yet and i can now tell only cause the worm changed where a lot of the interceptions are unblocked. the main botnet and intent of the hacker is actually above boot in your motherboard that is an undetectable backdoor. the conficters were made detecable on purpose to take blame. the popups your getting are actually the hacker sending commands using cookies to get in your system. he goes down a list of exploits. the letter H shows the worm that it has a solid exploit that it thinks you cant remove. the hanging windows happen when the thread freezes and the hacker gets in. you can read about it if you do a search on microsoft for adobe exploits and hanging threads. this is how he gets in. and to my notice, he first goes directly to your graphics driver. i bet you cannot update or replace any part of your graphics/audio or ethernet drivers. it will say FAILED... another thing not mentioned anywhere and you may notice in this response is that letters and words get altered or twisted. another part of the worm takes any focused box and inserts memory pointer strings having nulls that create tiny little blackholes in a sense.. anyways, i hope this gets you started. this botnet is possible only cause a hacker got a job resulting in some fbi gone bad. most are in jail now and is linked to the darkmarket.org situation. the link if i get it right about the chip flaw that makes the main botnet possible may be at this link. http://www.technewsworld.com/story/69335.html?wlc=1266287381
×
×
  • Create New...