Jump to content

Protection against hacking programs


martinez369

Recommended Posts

Hi, I have a question for you how to protect yourself from kali linux and other hacking programs, what ports should be blocked as generally as possible to protect against them because antiviruses and firewalls are not enough, although I have Malwarebytes installed. I note I have never used kali linux or parrot OS so please be understanding

Link to post
Share on other sites

Kali Linux is not a "hacking program".  It is a flavour of a Linux based Operating System.  Under this Operating System one may install various tools and utilities that may be used in a malicious fashion such as hacking into another computer.

Hacking is an external event or process.  That is from the POV of being on the outside and tries to gain ingress such as within a platform, place or enclave.  Once an OS is installed on a platform, it is integral to that platform.  To be used in a hacking process one would go from the POV of that platform and attempt ingress on another, eternal, platform or enclave.

Reference:

https://en.wikipedia.org/wiki/Security_hacker
https://en.wikipedia.org/wiki/Cybercrime

 

 

Edited by David H. Lipman
Edited for content, clarity, spelling and/or grammar
Link to post
Share on other sites

Don't install software and/or utilities that are unvetted or you do not know what they do or how they are to be used.  That is think before you act.

I don't understand the question of "...being tracked on the Wi-Fi network by unauthorized persons".

Tracking is a process of following, in a physical or logical sense, a person or entity as it travels through a given space such Geography or Cyberspace.  For example a hunter tracks an animal in the pursuit of a kill.  Or a device can be planted on an automobile that tracks where that automobile traverses on a map.

WiFi is a radio and communication specification that has limited range of less that 300 feet or 10  100 metres.   Thus it is not a viable communication protocol for tracking.

On the other hand Global Positioning System (GPS) and Cellular Networks are viable communication protocols for tracking.

 

Edited by David H. Lipman
Edited for content, clarity, spelling and/or grammar
Link to post
Share on other sites

  • Root Admin

Stop reading the tinfoil hat articles on the Web. Simply because something is possible in the lab the time and effort for someone to do is intensive.

Unless you're a State level actor, no one is going to spend that kind of effort on trying to attack your home system with such methods.

 

 

  1. Recommend using a Password Manager for all websites, etc. that require a password. Never use the same password on more than one site.
    https://www.howtogeek.com/240255/password-managers-compared-lastpass-vs-keepass-vs-dashlane-vs-1password/
  2. Make sure you're backing up your files https://forums.malwarebytes.com/topic/136226-backup-software/
  3. Keep all software up to date - PatchMyPC - https://patchmypc.com/home-updater#download
  4. Keep your Operating System up to date and current at all times - https://support.microsoft.com/en-us/windows/windows-update-faq-8a903416-6f45-0718-f5c7-375e92dddeb2
  5. Further tips to help protect your computer data and improve your privacy: https://forums.malwarebytes.com/topic/258363-tips-to-help-protect-from-infection/ 
  6. Please consider installing the following Content Blockers for your Web browsers if you haven't done so already. This will help improve overall security

Malwarebytes Browser Guard

uBlock Origin

 

Further reading if you like to keep up on the malware threat scene: Malwarebytes Blog  https://blog.malwarebytes.com/

 

 

  • Like 1
Link to post
Share on other sites

,,Unless you're a State level actor, no one is going to spend that kind of effort on trying to attack your home system with such methods."only that someone is doing it and I do not know how to track him and how to block this possibility of attack, so he writes on the forum for someone to help me and explain how to protect myself against such attacks ??

Link to post
Share on other sites

  • Root Admin

Reinstall Windows, Reset your Router

 

Greg Carmack - MVP 2010-2020 -Clean Install Windows 10
https://answers.microsoft.com/en-us/windows/forum/windows_10-windows_install/clean-install-windows-10/1c426bdf-79b1-4d42-be93-17378d93e587

How to Create a Local Account While Setting Up Windows 10
https://www.howtogeek.com/442792/how-to-create-a-local-account-while-setting-up-windows-10/

 

 

Please ensure that you have the user manual for your router. Then perform a factory reset.

How To Reset Your Router
https://setuprouter.com/networking/how-to-reset-your-router/

 

Depending on one's preferences and the Router's capabilities please consider the following.

  • Disable acceptance of ICMP Pings
  • Change the Default Router password using a Strong Password
  • Use a Strong WiFi password on WPA2  using AES encryption or Enable WPA3 if it is an option.
  • Disable Remote Management
  • Create separate WiFi networks for groups of devices with similar purposes to prevent an entire network of devices from being compromised if a malicious actor is able to gain unauthorized access to one device or network. Example: Keep IoT devices on one network and mobile devices on another.
  • Change the network name (SSID).  Do not use your; Name, Postal address, or other personal information.  Make it unique or whimsical and known to your family/group.
  • Is the Router Firmware up-to-date?  Updating the firmware mitigates exploitable vulnerabilities.
  • Specifically set Firewall rules to BLOCK;   TCP and UDP ports 135 ~ 139, 445, 1234, 3389 and 5555
  • Document passwords created and store them in a safe but accessible location.

 

 

Link to post
Share on other sites

  • Root Admin

I'm sorry but this is not a training facility and those subjects can be quite complex.

We do not endorse any of these links, but it may be a good resource for you to review

https://www.sans.org/cyber-security-courses/blue-team-fundamentals-security-operations-analysis/

https://www.cdse.edu/Training/Security-Training-Videos/

https://www.simplilearn.com/free-online-cyber-secuity-courses-article

 

Link to post
Share on other sites

Here are some steps to take...

  • Have situational awareness.  Know what is going on and understand the threat landscapes.
  • Patch software as they are needed.
  • Implement Strong Passwords  that are unique and not repeated and don't share them.
  • Don't Browse the Internet willy nilly.
  • Don't install unvetted software.  Only install well known software or software backed by a support network which show that it is actively maintained and updated.

 

 

Edited by David H. Lipman
Edited for content, clarity, spelling and/or grammar
Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.