A very skilled hacker with the intent on causing nothing but destruction, has found out your ip address

A very skilled hacker with the intent on causing nothing but destruction, has found out your ip address.

What is the most damaging thing this professional black hat can do, just by knowing your ip address?

Other urls found in this thread:

youtube.com/watch?v=0AhneMIIKpk&feature=share
fi.m.wikipedia.org/wiki/Karhu-ryhmä
twitter.com/NSFWRedditVideo

Nothing.

this

Fill up my ssh server log with failed login-attempts

DDoS, but it's costly, temporary, and your ISP will likely just give you a new IP if you tell them what's going on

> I don understand how NAT and dynamic IP's work.

You are the cancer. Leave this board and never return.

Install Windows 10 on my computer.

Well a skilled hacker who has been intent on destruction for a long time might have assembled a sizable botnet and could DDoS you. That would mostly be it.

Join my minecraft server and burn my world

Send you tons of pizza

Ddos might work, nothing I can do against that.
For the rest, any direct requests are always routed to the server and that thing drops nearly every packet unless it's on a few ports, and even then the only few entry points are secured with a key-pair. The only vulnerabilities would be potential exploits in the apache server or a few other services that don't run in a sandbox.

DDoS me with $5 hackforums booter
This

kek

>Fill up my ssh server log with failed login-attempts
Fill up my apache log with failed attempts of accessing phpmyadmin (which I don't have)

Nothing

I think Op is referring to an average user, not the techies.

This made me think:


Is it possible to use TempleOS to keep your important shit secure?

Nobody would be this cruel, right?
Right?!?

>what is fail2ban (or compatible)

Probably buy some botnet time and try to DDoS me.

The ADSL router I use is somewhat old, but I've set it to bridged mode, the real router is a frequently updated Debian box behind it which does NATting and firewalling. I've attempted connecting to the ADSL router several times over the public internet, but I can't seem to make it respond to anything. It doesn't even let you see the status page unless you plug a computer directly into its non-bridged port on the LAN side. All port scans return zero results regardless of whether the Debian box is turned ON or OFF.

The ADSL box is my own, by the way, not an ISP-supplied.

mmmmmm, pizza!

I was thinking about it, but I get maybe 50 such requests in a month so I don't give a shit. It helps that I already block typical Chinese/Russian ip's in my firewall.

You could use any computer and just not connect it to the internet.

Well, now I need pizza today.

DDoS me. Fail miserably to get into my VPN. Fill up my router log with failed login attempts.

DoS me and maybe fuck up my router if they have an exploit for it.

post it on Sup Forums

Find out my general location.

Scan for ports, see what vulnerabilities I have (probably my default password router)

gang rape every last port until something gives

skilled hacker will grep your IP in his 5TB+ db dumps and find your possible online accounts

I guess yall mean "crackers", newfags.

>every single other person in this thread is a newfag
>I'm not a newfag
Hmmm

Hardly anything.

>Home IP
My router has a known backdoor, so I'd be pretty fucked.
Still waiting on a new router and modem in the mail.

>mobile phone IP
Nothing, it's behind 7 NATs

>look up ISP
>spoof caller ID to local/company number
>hello, I'm out here at whatever, can you tell me who owns this line IP? everything is all fucked up
or whatever other social engineering attack they want to use, pretend to be police/ISP worker
>sure, x owns it, it should connect to (OP's address)
>thanks
>find OP
>sodomize OP with dragon dildos
>burn OP's house down
and everyone lives happily ever after

Hey, I'm actually compiling something like this right now!
I just need to upload the fucking 100+GB db to a server so I can search it quickly.

They can fill up my SSH logs with failed login attempts or spam Apache with HTTP requests for control panels I don't have since I don't have fail2ban or sshguard up at the moment, not much else.

Even if they somehow managed to guess a working username, attack the password in a timely fashion, and get in, I doubt the average dumbass wannabe that would unironically call themselves a "black hat" for bruteforcing some shell logins would even know what to do with an ancient SPARC/Solaris box sharing an isolated network with a couple Windows 2000 workstations and no useful data that wasn't meant for public consumption anyway.

What this kid did.
youtube.com/watch?v=0AhneMIIKpk&feature=share
wow

How though?

It must have been his sick anonymous wallpaper.

Hell dem pixels dossing stuff

I work for Comcast and had a guy try to do this.
>Hey this is Jerry from the residential department and I need you to help me out with something
>>Sure jerry, what's up
>my Einstein tool is down and I was hoping you could pull open a.c. account for me.
>>Ok. What do you have?
>all I have is the IP. You can find it under DNS lookup.
I knew how to look it up, but the guy thought I was a typical scrub and told me how. Which was weird he knew so much about the proprietary tool.
>>Ok I've got it open, what do you need.
>I've got something on my side. Can you give me the address.
>>I'm not sure I can sir.
>oh you're good. I know it's in the town of (whatever he found with a geolocate tool)
>>no, I can't give you that sir.
>why not?
>>this could be a social engineering attempt and I simply cannot give you private info without the acc number.
>S-Social engineering. what's that? I've never heard of that before.
He started getting real antsy
>>doesn't matter if you don't know what it is, I can't give it to you. Ask your supervisor for help.
He complained for a minute before hanging up on me.
I notified my supervisor about the attempt but he laughed it off. There isn't a lot of procedure for social engineering.
Funny thing is, a month later they locked access to the tool that can search by ip.
You can still get into most the tools by html editing the page in the browser and changing the visibility though.
If I ever get somebody to do that again, I'll BS and say that the attempt has been logged and will be sent to the authorities for investigation.

I'd have to change my IP, so I'd have no internet for ~5 minutes while I call my ISP. That would suck.

Own your router.
Forward traffic from the router to every machine on your network.
Own your machines.
Download all of the child pornography he can find off of Gnutella.
Have your machine share the content.
Advocate child love using your online identities.
Slip up revealing your whereabouts.
Wait...
??????
Profit!

Get your IP.
Hack other sites and match your IP.
Find your online usernames/email.
Track you.
Build portfolio on who you are, what you do, what you believe, how you type, your personality, etc.
Guess passwords
Get your name/address/phone
Call SWAT.
Report you for illegal shit.
Get raided by police and maybe kill you in the process.

Call ISP/electric company/phone company/etc
Ask for change of plans/disconnects/etc

So much potential if you're skilled enough in these age and resourceful enough.

> using ssh with passwords instead of configuring private keys

Hack your router then your machines and make it look like you committed a bunch of digital crimes. Could make you look like a money laundering terrorist with child porn on their boxes.

if they exploit a vulnerability in your router/firewall, lots of things.

My IP? That'd imply I'm not behind NAT, and thus not share that IP with bazillion of people.

why do you have a picture of my ip address

Captian pentester here: with an IP a hacker can do diddily fuck. However the IP can be used to find stuff out. With my skillset, I could probably do a decent man in the browser attack.

monitor your unencrypted traffic.

How?

Install gentoo

>type my public IP into the address bar just to see
>router login page
Well, I guess it's a good thing I don't use the default password. I should probably disable that shit though.

Fill up my SSH and nginx logs.

just tried this and my fucking xfinity router has remote management on and i can't turn it off. wtf comcast?

You retard, you can only see that from your internal network

Post your IP then. Your ISP is always going to give out your information almost freely to anyone who asks enough.

I hope you have a max size for logs so he doesn't fill up your disk.

that doesn't make any sense.

204.48.93.69, have fun, I don't give a fuck.

>>sodomize OP with dragon dildos
>implying op would'nt love that

162.45.81.116

Do your worst, kiddo.

69.58.186.114

Have fun

they can spoof your ip address. obviously hack a government server. they look up the ip address. throw you in jail.

192.168.1.52

...

It does. If you're on the network itself it will just loop back, showing you the login page. If you're on another network then the firewall should block out. Look up what a NAT is.

i know what nat is, but if remote management is turned off then why can i still access it if it's looped from the external router interface? i guess the router doesn't ever turn off remote management and instead uses firewalling to drop all connection attempts except from it's own wan ip address. that makes me think there is a port knocking sequence or some other backdoor which my isp could use.

>Call SWAT
But wht if I live in one yuropoor countrys?
>more specifically
Nordic yuropoor?

Your ISP can access the router anyway right, for configuration and updates. That's managed by docsis or something though. What is that remote management you're talking about?

fuck off op

192.168.1.144 is my IP
Hack me guise

Now try the same from your phone's connection (not wi-fi)

http/s based router gui access that should only be accessible from internal subnet ips. its the same thing i use to change the wifi password and firewall settings.

>C:/Users/Jeremy/Coding/HTML/hacktest/index.html

do your worst Sup Forums

>Forward slashes
Busted

accessing the internetwork webpage descriptor...

well done nerd (in a good way)

Average user has no open ports to even try to damage. All you can do is email scams or javascrupt shit.

see d-link bugs. there are remote code execution bugs in router firmware.

tfw they'd have to pay for the $10 one cause I've got gigabit

Well then you get the first world response instead.
>hello sir, we have had a complaint
>apparently you are threatening to kill your entire family unless you get $1,000,000
>i live alone
>oh okay, bye

Geo location,drugs and raid

>he doesn't have fwknop and fail2ban

I guess you're running a honeypot or something.

The first thing I do on new servers is changing the ssh port.

>SSH port changed
>only key logins allowed
>root SSH login disabled
>fail2ban installed
Am I resonably safe?

fi.m.wikipedia.org/wiki/Karhu-ryhmä

Retards posting LAN IPs instead of WAN IPs, funfags

You fell for the bait mate

>what is hadoop

I had a guy take over my modem/router, had the box replaced. Is there any way he could infect a simple unmanaged switch?

You have no idea about laws and technology

Check your router and OS for Vulns

I line your style.

>What is the most damaging thing this professional black hat can do
He could burn himself or consider suicide
He could also get run over by a bus and become a retard
There's lots of damaging things that black hat could do.

I have to use a proprietary router (I'm at my parents right now) so if they used a backdoor they could probably access all my unencrypted traffic and gain wider access to the LAN.

find out i'm into pegging

Malcolm in the Middle attack you and redirect your browser to a spoof site to steal your Runscape account.

Social Engineer your irl name and address from your isp. Then send you pizzas from his moms basement.