Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Screenviewing (hijacking?)


  • Please log in to reply

#1
kim stitch

kim stitch

    New Member

  • Member
  • Pip
  • 5 posts
Guys,

Hi, I'm hoping to learn the essential facts about a disconcerting incident of remote screenwatching, which occured about a year ago. I realize that, especially as a freshly registered forum member, this may too easily come across as some kind of lame trolling attempt. It isn't; I don't do that; my question is sincere, and you're welcome to have a laugh at me if that's how you figure this one.

Q: Is it possible to, from a remote location and via the internet only, view a screen which is connected only to a PC (WinXP) with no "screenbeam" or any other such network software installed on it?

To explaining why I wish to know this -- here's the background:

1) I posted an "extrasensory perception" challenge* at an "anything goes" forum.
2) Of course, no one was particularly close to getting anything right; except one guy who nigh on nailed everything. The estimated likelihood of that happening by chance is in the ballpark of not going to happen, or 1/billion to infinite.
3 I hadn't installed any "beamscreen" software or such, and I asked that guy whether he was using some means of viewing my screen via the internet. I hadn't even considered that, and still have no idea if that's even possible. My PC was firewalled (Norman) at the time of this incident, and still is.
He said 'no', no computer skills at all involved. His explanation was powers of extrasensory perception; in this particular case, he claimed to have viewed my screen wallpaper through my eyes. This, by the way, is the part where you can laugh all you want at me, if you haven't already.

*) The challenge asked anyone who so wished to try, to correctly name, and/or explain/draw five different items on a jpeg which I used as a wallpaper on the screen:
1 What number is written on the first?
2 The name of which historical figure is on the second?
3 What English word is on the third?
4 What geometrical figure is drawn on the fourth? Answer by drawing it.
5 What object or organism is drawn on the fifth? Answer by drawing it.

stitch
  • 0

Advertisements


#2
dsenette

dsenette

    Je suis Napoléon!

  • Administrator
  • 26,019 posts
  • MVP
without having a connection to your PC then there's no way he could have viewed your screen....most of the normal methods would have required you to have installed something or at least for you to be notified of the viewing...such as VNC or remote assistance (VNC you would have had to install the server on your PC and remote assistance requires you to allow the connection)....there's a chance that the guy was able to install some spyware on your system without your knowledge...but you would have had to have had SOME contact with the guy...or a site related to him or something of that nature...there are slight chances of hacking abilities that would allow him to get into your system without any of these conditions being met (possibly remotely executing code against your ip address...though he wouldn't know your internal ip address of your computer...just that of your router or modem)...the likelyhood of anyone going to this trouble to win such a contest is slim...but not out of the realm of existance..

maybe it's time to start wearing a tinfoil hat?
  • 0

#3
kim stitch

kim stitch

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
Minutes after a PM correspondence with this guy on that forum, I googled and found VNC and such, but as far as I could tell it's essentially like you describe it here.

As far as I know, the only contact I've had with this guy is on that forum. One thing is sure, he's had some contact with me that I'm wasn't aware of at all; I just don't know the nature of that contact.

So, I then was compelled to read all this guy's posts at that forum, in search for anything to suggest he could "hack his way into a paperbag", which he had told me he couldn't. I found a fun and clever guy but no hints whatsoever of computer skills out of the ordinary. Some ESP stuff, but perhaps not tinfoil hat league, certainly insignificant in comparison to that challenge; but enough to raise the suspicion that his interest in that stuff made him to go through the trouble you mention, in order to win that contest. If not, some very amazing ESP exists, and it bugs me that I can't know for dead certain that my PC wasn't hacked.
  • 0

#4
dsenette

dsenette

    Je suis Napoléon!

  • Administrator
  • 26,019 posts
  • MVP
well...it's unlikely that he would have removed the sofware that he used to "hack" you ...if in fact he did...so the software may still be running if he used a software package...go ahead and follow the steps bellow to attach an HJT log and we'll see if there's anything obvious on your computer

Please go HERE and skip to step 5 (Step Five: Posting a Hijack This Log). Follow all of the steps for scanning your computer and generating a log. when the scan is complete, press the "Save log" button. A "Save Log file" dialog box will appear. Type Hijackthis.txt for the file name and make sure that "save as type" is set to "all files". Save this file to a location that you will remember (your desktop is good). Now on your next post ATTACH this newly created txt file with your next post.
DO NOT POST THE CONTENTS OF THE HIJACK THIS LOG. This will encourage others to do this as well and we do not want that..
  • 0

#5
kim stitch

kim stitch

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
I use eTrust PestPatrol, and have deleted some mal-/spyware with it, but at the time of this episode nothing was detected. I have run no PestPatrol, AdAware or other scans since last reboot; this is the fresh HJT txt.
  • 0

#6
dsenette

dsenette

    Je suis Napoléon!

  • Administrator
  • 26,019 posts
  • MVP
looks like you just gave me the 'installed" log or however it's called....which should show everything installed...maybe just attach the regular HJT log as the steps that i suggested state (just in case)

i don't see anything funky off hand...though something could be hiding...
  • 0

#7
kim stitch

kim stitch

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
With the 12kb log (named Hijackthis.txt) I get
"Upload failed. You are not permitted to upload this type of file"

Edited by kim stitch, 01 May 2007 - 10:55 AM.

  • 0

#8
dsenette

dsenette

    Je suis Napoléon!

  • Administrator
  • 26,019 posts
  • MVP
it's probably saved as a .log file....just copy the contents in your post...and i'll make it a .txt file and reatach it
  • 0

#9
kim stitch

kim stitch

    New Member

  • Topic Starter
  • Member
  • Pip
  • 5 posts
edit: HJT log deleted

Edited by kim stitch, 03 May 2007 - 02:55 AM.

  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP