Yes I know it looks like it is the floppy. But I dont have connect to my pc a floppy, and I turn it off in my mobo bios. I dont use a floppy.
Apparently the hacker has to do some kind of mount device procedure, the floppy or the usb or the hard drive in order to make the attack succesfull. Like I said I am not a pro on black hat offensive techniques so I dont know the name for this attack.
I have an intermidiate level at white hat defense techniques I suppose.
The hacker does something like the next video, but not phisically from my home, in my case the hacker does it through internet.
http://www.youtube.com/watch?v=n9Wbgy0DDMQ
The other thing is Ive been dealing with all the attacks this hacker has been doing to me. That when something fishy happends I know that is the hacker doing that. Is like recognising a pattern that is very obvious.
I know this one is tricky. Cause you have to know when it is:
1) A false positive, legitime: A technical problem, internet drop down, a mistake from user, etc,etc,etc...
or
2) A hacker attack: It disgaise like if it is a technical problem to confuse (hacker), internet drop down (hacker), a mistake from user, etc,etc,etc...(hacker)
This 2 formats are very similar or identical, and sometimes the only way to recognising them, is doing a very deep study about the problem.
I am going to show 2 more screenshots of the attack. Just a minute...
Bookmarks