Jump to content

raphael123

Members
  • Posts

    4
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

raphael123's Achievements

  1. ps: don't hesitate to repeat the "cleaning process" multiple times, maybe the potential hacker could stick after the first one being done
  2. Hi Could you give some examples? It seems that you want to remove any potential access that a potential hacker would have You said you have a hotspot but I understood that it is your personal wifi router that you own I get in mind 2 things that would help to remove any potential access that a potential hacker would have: 1. Wiping physical devices 2. Changing accounts passwords ___ I get in mind 3 physical devices: - Wifi router - PC - Phone ____________________________ Maybe someone has a physical access to your devices. In that case, after being wiped, you would have to encrypt the OS using a strong password that you write nowhere. It seems to me that only the PC would be concerned by this. I use dashlane password generator and this to check strength. By wiped I mean for example fully reinstall Windows, not using the menus but using a bootable usb key (delete all partitions then install). Maybe keep in mind that some rare virus can infect the bios/uefi / hdd firmware... ____________________________ I think it's better to wipe physical devices before changing accounts passwords, because if you change accounts passwords using an infected device then the hacker can access the changes. ____________________________ You can also keep in mind that some devices can have some publicly known exploits, mostly kinda old Android phones, and some routers. I mean the manufacturers stop updating the "firmware" and then leave the exploits unpatched. ________________________________________________________ So I would say to: - Reset the router and ensure is uses a strong encryption and a strong password //But you can't remember all the strong passwords... and if you reset using an infected device it's not great... - Wipe computers //Creating a bootable usb key from a potentially infected computer is not great... - Factory reset the phones/tablets _____ When all devices are "cleaned", you could consider cleaning the accounts I have in mind: - If you have a Google account, check the linked external websites - Change the security questions of the accounts - If you receive a lot of crappy mails, i think creating a new mail address could be pleasant and reassuring for you, same for phone number. ______________________________________________________ Another thing I have in mind, to avoid craps on internet, uBlock Origin is great, i suggest using with firefox When i install a software, i search the software website link from wikipedia ______ I'm not an expert hacker, I'm sure that some hak5 members could suggest great tools to check if your data are leaked for example, or good tips etc
  3. Thank you very much for your replies I think I will keep the signing way for if i do something commercial / official someday I'm very interested about understanding the av signatures though, i found this youtube video that i really enjoy, i'm at the end of it
  4. Hi I'm making a simple and light executable program, for an old multiplayer game. (as a fan) It is intended for managing the official client game program, such as managing non-official updates/patches, like a mini-launcher. It is intended to be manually installed using a "proposer", where the player could choose if he wants or not to install this mini-launcher. The proposer is getting download to the player os, when joining a specific public dedicated server, which appears in the servers list just like the others. Once the proposer.exe is downloaded, it gets automatically opened using the game engine. I build this file using the Win32 api, C++ and Visual Studio on Windows 11. I don't have any issue with Windows Defender when building and opening the tool. ___________________ But I have a testing laptop running Windows 10, and when I plug a usb key with the proposer.exe in it, the file gets detected and quarantined. Same when I make it getting downloaded when joining the game server. But it seems that this antivirus is not consistent, because when I plug the usb key in the pc where I build the tool, it's not getting detected, I can paste the file on my desktop and open it. But if I wait some time, then I can't paste the file anymore because of the antivirus. And also for example, when I compress this file in a zip on the build pc, if I wait some time and then try to extract this zip, now the antivirus detects it. When I scan it, the antivirus finds no threat, but the one of virustotal does. It gets detect by around 20 antivirus on this website. ___________________ It seems that the time, is a reason about all this. When I build the file, then I directly take a usb key to copy it and then plug in the test laptop, then it doesn't get detected, I can paste it on the Desktop and open it. The files gets detected as a "Trojan:Win32/Wacatac.B!ml" I also got a detection of this name, using .vbs scripts before starting with this Win32 C++, I thought it would help but apparently not. Could you help me please? Is it related about machine learning? I heard about the possibility to ask antivirus providers to whitelist your files, I don't understand well how this works.
×
×
  • Create New...