Welcome to today’s tutorial. Here, I will be showing you how to get a hacker’s IP once you have identified the Trojan or other malicious software. You might think this would be very difficult or require special technical skill, but you will see that it is really not that hard. In other words, we will be looking at how easy it is for the feds to grab a sloppy Hacker’s IP and pursue them.
- First open Wireshark.
Click on Wireless Network Connection or Local Area Connection (Depending on your Connection type) and click Start.
- Go to the filter and type “dns“.
Now you will see all connections using dns.
- Next we are going to use Sandboxie.
Sandboxie is a useful tool used to analyse files before completely letting them in your system. You can run any Virus in Sandboxie and once you terminate all processes your, computer is not infected, so it will not add bad stuff to startup or anything.
Go to the RAT (Trojan or Virus your anti-virus has identified), right-click and Run Sandboxed.
- Now you are infected, but the virus is trapped inside Sandboxie, you can easily kill the process. Please note that a hacker can still control your computer and view your personal information. Make sure you CLEAR ALL SAVED PASSWORDS in ALL your web browsers, RATs can easily grab your saved passwords on web browsers FROM SANDBOXIE.
- Head back to Wireshark, on the right side you will now see a connection between your computer and the RAT’s no-ip or other dns masker. (no-ip is a common service used by hackers to mask their numeral IP address and make it look like something legitimate)
Try to look for something like blahblah.no-ip.biz or blablah.zaptop.org. Here is a list of free No-ip domains which is what you should look for:
- This is what it will look like:
- Once you got the RAT server’s no-ip, open cmd and type:
- Hit enter and you will get his IP!
- Now, depending on your skill-set and knowledge… You can decide what you want to do next. Some ideas might be:
- Call the Feds (ha ha, yeah they’ll get right on that!)
- Track down the ISP that owns that IP and follow file some sort of complaint… (Is that the complaint box right next to the recycle bin?)
- Retribution? (DDOS, Port Scan, Metasploit, etc…)