:: Your Computer Technical Resource Headquarters! :: Your Computer Technical Resource Headquarters!
Computer Support Forums arrow Internet & Network Support arrow Security & Viruses arrow Topic: Exploiting W2K with mIRC??
July 11, 2020, 02:01:49 PM

Home Forum Rules Help Search Mobile Version Login Register

Welcome, Guest. Please login or register.
Did you miss your activation email?
July 11, 2020, 02:01:49 PM

Login with username, password and session length
 Featured Sites:
New  Looking for cheap hardware and/or software?
Visit our new Online Store where you will be able to purchase from a reputable vendor by country.
  0 Members and 1 Guest are viewing this topic.
Pages: [1] Go Down Print
Author Topic: Exploiting W2K with mIRC??  (Read 968 times)

Karma: +0/-0
Offline Offline

Gender: Male
Posts: 1

Bookmark and Share

View Profile
« on: December 22, 2003, 07:11:11 PM »

System Setup:
* Windows 2000 (with up to date security and service packs)
* Dell Optiplex with direct internet connection (no firewalls)

* Machine being hacked into, and mIRC being loaded

. This question follows from diemenge's post (") concerning mIRC being installed on his Windows machine.

. I have two Windows 2000 machines that have recently been wiped and reinstalled (with the latest security patches and service packs).  The machine is (we believe) being hacked into.  I'm not installing any additional software, but we notice that mIRC becomes installed and various pop-up ads start appearing.  What I am wondering is how typical is it for a hacker to break into a box and install mIRC (it's buried, as we can't readily find where the installation is).  I realize that mIRC has a number of overflows associated with it.

. And even more so, I am wondering a) how are they doing it and b) how do I protect from it?

. Any help or insight would be greatly appreciated.

Pages: [1] Go Up Print 
Jump to:  

Powered by MySQL Powered by PHP

Powered by SMF 1.1.21 | SMF © 2015, Simple Machines

Valid XHTML 1.0! Valid CSS!

This site is NOT responsible for any damage that the information on this site may cause to your system. Everything you try, whether inspired by the response given from this site or not, is entirely at your own risk. All product names and company names used herein are for identification purpose only and may be trademarks or registered trademarks of their respective owners. We are in no way affiliated or representing any of the companies on this site unless specified.
Back to Top
Stop Spam Harvesters, Join Project Honey Pot Fight Back Against Spammers! Get Firefox! Get Thunderbird! View Sylvain Amyots profile on LinkedIn
Back to Top
Google visited last this page September 01, 2018, 11:29:17 AM