Soldato
- Joined
- 28 Nov 2004
- Posts
- 16,024
- Location
- 9th Inner Circle
Well putting it like that is just asking for it...
Go Anonymous!
Well putting it like that is just asking for it...
It seems some think that all the police/whoever have to do is get your IP. This is entirely not the case. UK law requires that there is enough evidence to prove beyond reasonable doubt. Simply having someone's IP address won't do this.
So on this point, when they identify the public IP found to be the originating source of these messages, they apply for a warrant to seize all machines that are behind that IP (so if at your home, they will seize all laptops, workstations, PDAs, iPhones, iPads etc. etc.)
Then they will then begin "forensic analysis" of said machines. Simply put, they'll poke through your hard drive looking for evidence of foul play. 90% of the time, it is to find any messages, emails, browser history of forum posts etc. etc. to prove that you conspired and purposefully committed the act, not just had some Trojan do it on the behalf of someone else. These idiots who used LOIC (which is a load testing tool, and not a "hacking tool" as described) will have had plenty of "OMGZ I R LEET HAXORING AMAZON LOLOLOLOL!111!11" messages to convict them with.
The various security forces are not IT illiterate idiots, and their lawyers (and the defence lawyers) know how to present this evidence that will not confuse 72 year old Mrs Billpot who is on the Jury.
They'd also see the virus/whatever it is you've used to take control. Like I said, they are not idiotsBut what if I have control of your computer? They'd seize your computer and find all sorts.
OH SHI*
They'd also see the virus/whatever it is you've used to take control. Like I said, they are not idiotsthey won't just do a preliminary scan with Norton and leave it at that.
They'd also find various things to prove that it was me using that machine, such as anything on Facebook or other such site where I have used my credentials. A popular one is internet purchases using a credit/debit card, to prove beyond reasonable doubt that I was at the machine.
I wish there were a way to prove it
They'd also see the virus/whatever it is you've used to take control. Like I said, they are not idiotsthey won't just do a preliminary scan with Norton and leave it at that.
They'd also find various things to prove that it was me using that machine, such as anything on Facebook or other such site where I have used my credentials. A popular one is internet purchases using a credit/debit card, to prove beyond reasonable doubt that I was at the machine.
In similar news a recent study found that shooting yourself in the head is dangerous
So it could go both ways then, if someone wanted to do it and make it look like they're innocent they could place a trojan or virus and perhaps leave their wireless open at the time, either way when it comes to computers theres just so many possibilities that i don't see how they can ever get enough evidence beyond reasonable doubt.
My sister works in computer forensics![]()
So it could go both ways then, if someone wanted to do it and make it look like they're innocent they could place a trojan or virus and perhaps leave their wireless open at the time, either way when it comes to computers theres just so many possibilities that i don't see how they can ever get enough evidence beyond reasonable doubt.
Yep, a good idea. Let's just hope they're able to find it!
Maybe you could pick her brains for us thenAre publicly available, open source tools used? Do they use their own as well as? Just how hard do they look for malware, and do they bother/have the skills to reverse engineer it?
How do they deal with people encrypting their hard drives and... forgetting... their passwords? What if the attacker, after doing his malicious deeds, does this?
I'd love to know, I'm genuinely interested.
They'd also see the virus/whatever it is you've used to take control. Like I said, they are not idiotsthey won't just do a preliminary scan with Norton and leave it at that.
They'd also find various things to prove that it was me using that machine, such as anything on Facebook or other such site where I have used my credentials. A popular one is internet purchases using a credit/debit card, to prove beyond reasonable doubt that I was at the machine.
True but any half decent ISP will implement reverse path filtering on a per customer basis. Spoofed packets will be dropped before leaving the ISP.Actually you can hide your IP address by crafting TCP packets to spoof the sender IP, just don't expect to get anything back again.... which of course for a DOS is not a requirement.