Router Credential hackers Keylogger
-
@johnpoz I haven't had any of those brain or stroke conditions. I DO happen to take my physical safety and identity seriously. My hacked phones with the front and back cameras accessed (it makes perfect sense, and I haven't been in GA or other states and it's a MITM at minimum) - when I've had to use them and take pictures of stalking, those pictures and network traffic on the infected pc, turn my usb drives into rubber duckies as it's the only things I have on them. I know the pc is infected and the bios / registry is included. I've "wiped" and reinstalled Microsoft on it at minimum 5 times in various different ways. Ingenuine Windows files are now on it. I'd love to remove the pc and "be done with it" however I was hoping maybe one of you have had to deal with something similar. I CAN do the compromised pc articles but the actual instructions aren't listed and I CAN do the IDS / IPS but I hoped someone may have some pointers and an article or video or two that helped them.
The stalking that's occurring is to let me know that that form IS still there and what we do and watch IS included. A keylogger is included. I wanted verification as I've been scammed out of alot of money by a bad forensics company. I have a IT degree and background. All my networking pc compromised books are out of sight. I've given my recommendation to the owner who's being a stubborn mule. It's massive and the cops are involved and stalked me themselves. Stuff has been in my yard and on the roads to our house with very recent spray painted graphitti. The constant well IF it is this, then.... or criticizing whatever at the moment, isn't helpful. I haven't been fond of forums previously and when my healthcare is telling me and federal crimes since passwords are included and verifying for me (for the stubborn mule), I just want to fix it. Video, article, specifics. I've been to the FBI because of the stalking and ridiculousness and what they told me is correct. The local gov has verified it also. - While inappropriate comments have been made here in response. I have noticed the SRC similarities that IS in our form. This is flat out unhelpful. Guys enjoying blowing their own heads big and not helping people that have actual crimes happening. -
@RobbieTT Your post is gross and has sexual content in it. I don't appreciate it. I wish there was a thumbs down icon. It makes sense. When you get a cell phone activated, it uses your SSN. They're instantly hacked. There is no mistake. I make perfect sense. The pictures because I've had to use them, are infected and turn my formatted brand new USB's into rubber duckies. I was asking about the router hackers which are also black hat. Google it. The "rubber fetish" is your own sick pleasure and unnecessary. I'm being stalked while you're sexually gratifying your own perverted sense. I'm serious and I have pictures of it. If I had money to burn, I'd happily pay but pfsense recommends their forums. I thought I would give it a try.
To those who answered without pervert comments, THANK YOU. -
@smoses The best advice anyone here can give and the one i gave above is to take your infected devices off the network. Unplug them. reformat the hard drive if you must.
Firewalls arent magic boxes that can solve all cyber security problems. They absolutely help but at the end of the day the best defense is you. You know you have problematic devices on the network. You need to take them offline until you can solve the problem. -
This post is deleted! -
@michmoor I was reviewing the compromised pc article and videos on how to "lock down" the compromised pc. I'd junk it personally. You buy a firewall to make sure you're traffic is clean. I need to create rules and or use a IDS. That's what I was asking about.
-
@smoses said in Router Credential hackers Keylogger:
You buy a firewall to make sure you're traffic is clean
No. As i said a firewall isnt a magic box. You think that it is part of the problem here.
Again, you have a compromised host(s). You don't want to fix it. You want to put an IPS solution around it which doesn't make a lot of sense.
If you dont want to at least fix the problem but address the fact that your host is infected than im not sure what more any one here in the forums can do. I wish you the best of luck but my advice, to state it again, take the computer off the network. Run virus/malware scans. Best solution is to reformat. -
@michmoor Agreed. The solution is isolate the infected host and treat.
Don't burn the entire city to the ground because one resident has a case of measles.
-
@rcoleman-netgate Yep. that follows you also I believe. The comment doesn't state that. It states "rubber fetish". Gun to your head.
-
@smoses said in Router Credential hackers Keylogger:
Your post is gross and has sexual content in it
A rubber duckie is a hacking tool.
As for their other comment... while it might be a little bit extreme/excessive it is not intended in the manner you are interpreting it.
I suggest you ignore any user whose answers you do not like and simply not engage with them.
-
@rcoleman-netgate I acknowledged that and posted looking for specifics. Video, articles, etc. I don't need help diagnosing it, just fixing it. If it can. Blocking everything except normal traffic. Egress filtering, whatever.
-
@rcoleman-netgate a rubber fetish is not the same as rubber duckie. With gun to the head, it's completely unnecessary. The user's fault. Not mine.
-
@smoses
Ok...Very well.https://docs.netgate.com/pfsense/en/latest/firewall/index.html#firewall
Fantastic documentation can be found at the link above. Everything you need in order to create firewall rules and to isolate hosts if required.
I also recommend the following link. Although it shows Snort, the instructions work just as well for Suricata.
https://docs.netgate.com/pfsense/en/latest/packages/snort/index.html#ids-ips
-
@SteveITS for some reason it's affecting the AMD pc more than the Pentium. Completely differently. Specifically, it IS affecting the AMD's bios, registry and files that aren't on the Pentium pc on the same network. Thanks for responding.
-
@smoses said in Router Credential hackers Keylogger:
Blocking everything except normal traffic. Egress filtering, whatever.
You're looking, then, for IDS/IPS. Like Snort and Suricata. There's a section of the forum for that, too.
-
@rcoleman-netgate That will automatically get rid of the router credentials keylogger and form? The IDS? Is that a guaranteed thing?
-
@smoses Nothing in the world is a guarantee. You said you want to do egress filtering. That's where you should be.
-
@rcoleman-netgate The only guarantee is to remove the compromised pc completely off the network, right?
-
@smoses Yes, like I said earlier...
@rcoleman-netgate said in Router Credential hackers Keylogger:
@michmoor Agreed. The solution is isolate the infected host and treat.
-
@rcoleman-netgate I only asked as I'm showing it to educate the person who insists on using it. I'm aware of it.