How to Track Hackers

If you spend a lot of time connected to the Internet, it is only a matter of time before a hacker attempts to gain access to your computer. Proper security and firewalls are usually all that is needed to prevent them from gaining entry, but computer owners who are less focused on system security may have a hacker slipping through their open ports. If you should find yourself in the unfortunate position of dealing with a hacker, just remember that it is entirely possible to identify and track the hacker so his cyber crimes can be reported to the proper authorities.

Instructions

    • 1

      Open the DOS prompt on your computer. The way you get to the DOS prompt depends on what version of Windows you are using. If you are using Windows 95 or Windows 98, click "Start." then click "Programs" and end by clicking "MS-DOS." If you are using Windows NT, Windows 2000 or Windows XP, you will arrive at the DOS prompt differently. In this case, you will click "Start," then click "Run," then type either "cmd" or "command." Windows Vista is the simplest of all, since you only have to click "Start," then type "cmd."

    • 2

      Type the following command into the DOS prompt (without quotation marks): "netstat --a." This will open a routine known as Netstat, which will quickly identify all connections into and out of your computer. Typing "netstat --a" will produce a string of information that identifies your IP address, the port your computer is using for the connection, the "foreign address" of the machine you are connected to, the port that machine is using, and also the status of the connection.

    • 3

      Identify what other Netstat commands are available to you. Type "netstat ?", without the question marks. This should show you what commands are available in your version of Netstat. Typical commands include --a, -e, -n, -p proto, -r and --s. You can also combine multiple commands at once, as you will do in the following step.

    • 4

      Combine two commands to refine your search. First, use the command that identifies all connections and listening ports, which is usually "-a." Second, find the command that lists the information in numerical form, which is usually "-n." Type the command into the DOS prompt as "netstat --an." Note that you may need to change the "a" or "n" to something else, if they are identified differently in your version of Netstat.

    • 5

      Search for additional Internet activity. You should only have one connection, using one port. If a hacker has gained access to your system, an additional port will be in use. Running the command from the previous step will allow you to see what IP address the hacker is using, the hacker's hostname and the port number he is connecting through. It is possible to shut down the port and block the IP address, but for the moment, let's trace down who is gaining access to the computer and track what they are doing.

    • 6

      Run a trace route on the information you have obtained about the hacker. This affords you an idea of where the individual is located and what ISP he is using to connect to the Internet. Run the trace route by returning to the DOS prompt and typing "tracert ip address/hostname." Remove the quotation marks and replace "ip address" and "hostname" with the relevant information that was gathered in the previous step. Trace route will then trace the path of the connection, including any servers the connect must pass through before reaching you.

    • 7

      Print out the information about the intrusion, then use your firewall to block the port and IP address used by the hacker. Send a copy of the information to your local police department, the police department in the location that trace route identified for the hacker, the ISP the hacker uses and to the US Department of Justice's cybercrime website. (Follow the link in Resources.) These organizations may want to have a technician generate a detailed computer log of the intrusion and any past intrusions, so do not delete any log files from your computer.

Related Searches

Resources

  • Photo Credit dweekly, Flickr.com Creative Commons License

You May Also Like

  • How to Track Conversations on Facebook

    How to Install Facebook Conversion Tracking; How to See Past Conversations on Facebook; ... How to Stop a Facebook Hack; How to...

  • How to Reach Hackers When They Are Hacking Your Computer

    In the movies, a hacking attempt is usually accompanied by flashy pop-up windows or signs of programs being remotely installed. ... How...

  • How to Stop Computer Tracking

    Tracking programs allow hackers to record everything you do online, giving them access to personal data such as passwords and financial information....

  • How to Track Computers by an IP

    The IP address is used to track down criminals, hackers, or abusive email senders. Other People Are Reading. How to Trace an...

  • How to Find a Hacker's IP Address

    How to Track Hackers. How to Catch a Hacker. Computer Hackers. Featured. Facebook Pages. Watch Video. Great Games for Your Phone. View...

  • How to Block Hackers on Facebook

    Facebook is continually striving to offer the most secure and private social network on the Internet. Since early 2010 the company has...

  • How to Stop a Facebook Hack

    Facebook, the online social networking site, offers a convenient way to stay in touch with friends and network with colleagues. It provides...

  • How to Report Computer Hackers

    How to Report Hackers to Facebook; How to Track Hackers; Comments. 100001609366656 Jun 23, 2012. ... How to Report a Hacker on...

  • How to Catch a Hacker

    How to Catch a Hacker. ... Track that IP number to a ... MouseHunt is a Facebook application and game in which...

  • Can You Find Out the Person Who Hacked Your Account?

    The Facebook... How to Find Out Who Has Been Accessing My Email Account. An email hacker can gain unauthorized access your email...

  • How Do I Stop Hackers?

    How to Stop Hackers. Years ago, no one had to worry about hackers breaking into their computer and installing Trojan viruses, ......

  • How to Use Netstat Commands

    Netstat is a utility that you can use to display your computer's connections to ... How to Use Netstat to Track ......

Related Ads

View Blog Post

Enter the Geek Vs Geek Giveaway and Win a Roku!