Computer hacking?

734
England
Manchester
stiggygonzalez
Hi,I'd like to know whether it's possible for someone to hack someone's computer without an internet connection.
Say I turned the wi-fi adaptor off or just removed it from my computer permanently,could someone hack it wirelessly?
I know people can plant software through external devices like USB and wait til you connect again but what even if I had a new laptop and removed the wi-fi adaptor and never connected to the web,can someone hack it?
 
I read something a few months ago outlining a theoretical way to use a computers microphone as an attack vector by sending high-frequency tones that would be inaudible to the human ear.
 
Hi,I'd like to know whether it's possible for someone to hack someone's computer without an internet connection.
Say I turned the wi-fi adaptor off or just removed it from my computer permanently,could someone hack it wirelessly?
I know people can plant software through external devices like USB and wait til you connect again but what even if I had a new laptop and removed the wi-fi adaptor and never connected to the web,can someone hack it?

Yeah you could hack a computer with out an internet connection, but that's called breaking and entering. Thus the only method I know of would be externally, and usually the preferred method if the information they want is valued enough. Though someone more knowledgeable than me can tell you another method I'm guessing because I don't know of any other one.

I read something a few months ago outlining a theoretical way to use a computers microphone as an attack vector by sending high-frequency tones that would be inaudible to the human ear.

Yeah but wouldn't the microphone have to be on? I think he's asking if he eliminated all open sources of the device such as wifi, camera, microphone. Though maybe not, and if not then you have a good solution.
 
I think with any kind of wireless hardware totally removed the only way to hack it would be to physically break in and get to it. Having said that there might be a way for them to view your screen using radio waves like they used to do with CRT TV's to find out if anyone was watching TV without a licence.
 
What Olivia said, errmm Robin.

Don't know if the emission from Flat panels are enough, but Secret agencies were able to get a copy of your screen only by radio waves. Not in good quality and probably with a lot of interferences. And they needed to be quite close.

If we go on the "conspiracy" level and knowing from Snowden documents that they added their own backdoors in several systems software wise, I wouldn't call it far fetched that they would have tinkered with the hardware.

In fact a few weeks ago I saw on a Tv show that in China, some Iron(wash) and primitive household machines were emitting radiowaves. Turned out it were bugs. To who put them in was not clear. It was only a 2 minute section, so no idea about the legitimacy of it.

Though I find it really creppy that even with your phone turned off, they can still enable your vid and mic feeds. Scary

You want to be sure, buy yourself some Electromagnatic-shielding textile (over internet) and make your own bag. No signal in or out what so ever
 
What Olivia said, errmm Robin.

Don't know if the emission from Flat panels are enough, but Secret agencies were able to get a copy of your screen only by radio waves. Not in good quality and probably with a lot of interferences. And they needed to be quite close.

If we go on the "conspiracy" level and knowing from Snowden documents that they added their own backdoors in several systems software wise, I wouldn't call it far fetched that they would have tinkered with the hardware.

In fact a few weeks ago I saw on a Tv show that in China, some Iron(wash) and primitive household machines were emitting radiowaves. Turned out it were bugs. To who put them in was not clear. It was only a 2 minute section, so no idea about the legitimacy of it.

Though I find it really creppy that even with your phone turned off, they can still enable your vid and mic feeds. Scary

You want to be sure, buy yourself some Electromagnatic-shielding textile (over internet) and make your own bag. No signal in or out what so ever
Or take the battery out, if removeable.
 
Hi,I'd like to know whether it's possible for someone to hack someone's computer without an internet connection.
Say I turned the wi-fi adaptor off or just removed it from my computer permanently,could someone hack it wirelessly?
I know people can plant software through external devices like USB and wait til you connect again but what even if I had a new laptop and removed the wi-fi adaptor and never connected to the web,can someone hack it?

In order to make a wireless connection when all normal connectivity is removed one would normally do one of the following;

* If LAN exists then breach another wireless connection to the LAN (a very common hotel-type attack on travelling laptops with a VPN to home)
* Fit your own wireless device. This is more complex than it sounds as you have to retrieve information from the system without it being clear that an extra device is operating. Normally only large professional organisations make this kind of attack succeed

Of course, it all depends on what you actually want from the target system. If you don't actually want full C&C then;

* The easiest attack of all is on idiots who use unencrypted wireless keyboards, if you want login data then they're an easy source but very proximity-dependent. The next
* A screen attack, just see what's on the screen all the time. This is an easier wireless attack and you can probably buy the kit from Maplins.

Finally, the most obvious attack on a wireless computer with the wireless switched off;

* Install a worm that reactivates the wireless as required.
 
There are various technologies that you can use to spy in on someone's computer. As mentioned above. If you have an ir sensor, or Bluetooth, those could be used. Most new computers don't have IR, most new laptops so have Bluetooth. However, there are issues with that. Bluetooth like all wireless, runs for a radio wavelength. That wavelength, while strong when your within range, allowing good speeds, it doesn't transmit far, or very well through walls. Try out a Bluetooth headset with your phone, see how far you can walk away. Down the hall, maybe to the bathroom? Not far. My point, the hacker hacking you through the Bluetooth. They Would be in your house.

Btw, hacking isn't like they show in tv shows and movies. It's all about as true to life as fast and furious. keystrokes can be watched on wireless keyboards, but only within a short range, monitors can be watched, but a computer has to know what and how it's communicating in order to communicate. So no, there is no magic way to just get into a computer through the air.
 
Last edited by a moderator:
Thanks guys for the very insighful info or 'intel'.:D
So of course there is no 100% secure way of protecting your data on mine or anybody's computer?
If the NSA or any other security agency wanted to find anyone's computer info,take it,control it.alter or just watch what your doing without you being aware,they could?
You could set-up a private network,use private browsers,passwords and all sorts of blocking methods but this isn't enough is it?
Another question,can someone find out where your computers' location without means of wireless communication?
Manufacturers have chips in their products for codes etc,do they have info of your location?
Is someone watching through my computer screen while I'm typing and can trace my location,similar to phone tapping?
 
Another question,can someone find out where your computers' location without means of wireless communication?
Manufacturers have chips in their products for codes etc,do they have info of your location?
Is someone watching through my computer screen while I'm typing and can trace my location,similar to phone tapping?


Say Hello to IP address. IP address can give a general location where you are, But at the same time no. Its quite hard to find where the location is. Unless there some genius.
 
My questions are legitimate ones,so if you haven't got anything constructive to say...
Dear Lord you are 🤬 ignorant.
Legitimate if you are holding national secrets. A bit paranoid if you are just trying to protect your GTP password and some pictures ofv your cat.
 
My questions are legitimate ones,so if you haven't got anything constructive to say...
Dear Lord you are 🤬 ignorant.

Stop acting daft and maybe people won't roll their eyes.

Everyone has said is virtually impossible to access a computer that isn't on a network. You've now latched onto some EXTREME methods that virtually no civilian agencies can employ, and that not government or large agencies would bother employing unless you have state secrets. Or child porn (even then they likely wouldn't bother)

Short of someone physically breaking into your residence and stealing the computer/drives, no one will have access to data that you have off network.

As for your location, an IP address will just have an address logged with your ISP that they can reference. If they want your precise location, much easier to pull it from your phone's GPS. Or just triangulate it from cell tower locations.

Of course, someone so wanted by the system wouldn't have a mobile phone, right?
 
Also I must be clear,my concerns are not just about security agencies,it's just plain hackers looking for financial details,location etc.
I know I'm sounding extreme but if something can be done good/bad people will do it.
I'm guessing these extreme methods are only know to extreme people aswell and you'd have to be one of them to know?
My point is,I want to know if there is a 100% or as close to secure way of protecting your private details/data from people on your computer.
 
If you really want to protect data like that, remove the hard drive and store it in a safe.
 
Of course, someone so wanted by the system wouldn't have a mobile phone, right?

Damn, good spot!

OP, I completely forgot remote BT attacks. I've never seen an example of one done but the theory is that one jacks into the mobile phone via some means (which is a long topic) and then instigates a local attack on BT devices local to the phone.

It's a vaporous theory but do-able.

@Azuremen , don't just think that its large companies or governments who will fund complex attacks. There's a growing market for stolen data and speculative raids are becoming relatively more common. Also, don't think that governments are necessarily ahead of private companies in security research (including hacking), governments buy much of it in from the developer market.

@dice1998 that doesn't work, you need to store the whole machine in a safe. Otherwise I'd simply put a fake hard-drive chassis in your machine that clones your HHD to a wireless SSD hidden nearby as soon as you put it back in the case.
 
The absolute only way you're going to be COMPLETELY safe from hackers is if you wipe your cell phone, computer and all other electronic devices, smash them to bits, shred all important documentation, move to the middle of nowhere Montana or Tibet and live off the land and off the grid.
 
Don't keep your important stuff on a computer?

If you still don't fell 100% safe...
tumblr_n00zke1lgv1so7rsbo2_500.jpg


You do seem a bit paranoid.
 
Also I must be clear,my concerns are not just about security agencies,it's just plain hackers looking for financial details,location etc.
I know I'm sounding extreme but if something can be done good/bad people will do it.
I'm guessing these extreme methods are only know to extreme people aswell and you'd have to be one of them to know?
My point is,I want to know if there is a 100% or as close to secure way of protecting your private details/data from people on your computer.

You realize you can't have a bankcard then? Or do any internet business? Or have records that place any form of payment detail, like medical and rent, etc?

Keep in mind it is easier for some check clerk to pull your credit card info while processing a payment than most internet "hacking" and just spoof it later. Or a variety of other social engineering type schemes are the common attack vector here.

As it stands, it sounds like you don't understand the technology you are using and yet are expressing extreme paranoia about how it could be compromised. On a forum dedicated to a video game.

@TenEightyOne - I'm aware of this, but a lot of this data is collected by intercepting data transfers and such, not wardiving 2.0 via the microphone port of a computer :P
 
it's just plain hackers looking for financial details,location etc.

Why would a hacker target a computer that has no way of transmitting your personal information to them?

They will have much better luck going through your trash and finding your bank statments, and other personal letters that you might dispose of.
 
Why would a hacker target a computer that has no way of transmitting your personal information to them?

They will have much better luck going through your trash and finding your bank statments, and other personal letters that you might dispose of.
Can you expand on this?
I understand going through trash etc but couldn't someone still try and hack?
Unless you mean hypothetically having a computer that never connected to wireless sources?
You realize you can't have a bankcard then? Or do any internet business? Or have records that place any form of payment detail, like medical and rent, etc?

Keep in mind it is easier for some check clerk to pull your credit card info while processing a payment than most internet "hacking" and just spoof it later. Or a variety of other social engineering type schemes are the common attack vector here.

As it stands, it sounds like you don't understand the technology you are using and yet are expressing extreme paranoia about how it could be compromised. On a forum dedicated to a video game.

@TenEightyOne - I'm aware of this, but a lot of this data is collected by intercepting data transfers and such, not wardiving 2.0 via the microphone port of a computer :P
Your right I'm not fully aware of the ways for people to compromise your personal details(on computers),hence why I made this thread.
I'm trying to explore and become more tech savvy when it comes to things like this,so I'm prepared and have some idea of what to do and find any clues about people trying to hack my computer etc.
But I realise there's a lot more to it than I thought.
I thought I'd post on GTP because I've had help off people here before and I'm pretty sure the people here are honest and helpful.
 
Can you expand on this?
I understand going through trash etc but couldn't someone still try and hack?
Unless you mean hypothetically having a computer that never connected to wireless sources?

On laptops you have to enable bluetooth and even then you need to tick the "make PC visible" for people to find it, while yes there might be ways around this most of the time bluetooth is disabled on laptops since USB is faster so these days you just plug your phone in and boom, it shows up in a second.

It is also much easier to mug someone than go to these extreme ways to steal someones data off a computer that never goes on the internet.
 
On laptops you have to enable bluetooth and even then you need to tick the "make PC visible" for people to find it, while yes there might be ways around this most of the time bluetooth is disabled on laptops since USB is faster so these days you just plug your phone in and boom, it shows up in a second.

It is also much easier to mug someone than go to these extreme ways to steal someones data off a computer that never goes on the internet.
Ok thank you I understand.
 
It is also much easier to mug someone than go to these extreme ways to steal someones data off a computer that never goes on the internet.
And they would have to know the machine even existed.
And where it was.
And if it had anything worthwhile to take.

If it's never been online, the answer to the first one is no, they wouldn't.
Again, having never been online, and therefore having no IP address, the only people that would know where it was would be friends and family. Hopefully they aren't a problem.
The third one depends on what it's used for but if it sits in a room, disconnected from everything else, I doubt it.

Short version - you're exponentially more likely to have your personal information stolen from a server you don't control (ie - Amazon) than you are from a personal attack on your home PC. Why would they go after one fish when they can get the whole barrel?
 
TB
The absolute only way you're going to be COMPLETELY safe from hackers is if you wipe your cell phone, computer and all other electronic devices, smash them to bits, shred all important documentation, move to the middle of nowhere Montana or Tibet and live off the land and off the grid.

Tibet is occupied by China, and as for Montana...I think we both know Wyoming is better :sly:
 
If it's being done on the internet, there's probably always a way it could be accessed by another person - unless you were pushing billions of pounds worth of protection against it.

There are so many millions of computer users out there, but only a handful could hold anything of absolutely any value to these people.
 
Back