Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

nmap scan odd ?am i hacked.


  • Please log in to reply
55 replies to this topic

#1 implieddeny

implieddeny

  • Members
  • 45 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 25 June 2016 - 09:49 AM

Result 1 of my nmap scan with my wired ISP.

 

 

hobbit@hobbit-OptiPlex-GX520:~$ nmap -v sU sT 127.0.0.1

 

Starting Nmap 7.01 ( https://nmap.org ) at 2016-06-25 20:08 IST

Initiating Ping Scan at 20:08

Scanning 3 hosts [2 ports/host]

Completed Ping Scan at 20:08, 0.35s elapsed (3 total hosts)

Initiating Parallel DNS resolution of 3 hosts. at 20:08

Completed Parallel DNS resolution of 3 hosts. at 20:08, 13.00s elapsed

Initiating Connect Scan at 20:08

Scanning 3 hosts [1000 ports/host]

Discovered open port 631/tcp on 127.0.0.1

Completed Connect Scan against 127.0.0.1 in 0.46s (2 hosts left)

Discovered open port 80/tcp on x.x.x.x

Increasing send delay for x.x.x.x from 0 to 5 due to 17 out of 55 dropped probes since last increase.

Discovered open port 8022/tcp on x.x.x.x

Discovered open port 8022/tcp on x.x.x.x

Completed Connect Scan against x.x.x.x in 60.58s (1 host left)

Completed Connect Scan at 20:09, 62.80s elapsed (3000 total ports)

Nmap scan report for sU (x.x.x.x)

Host is up (0.33s latency).

Not shown: 993 closed ports

PORT STATE SERVICE

80/tcp filtered http

135/tcp filtered msrpc

139/tcp filtered netbios-ssn

445/tcp filtered microsoft-ds

1720/tcp filtered h323q931

1723/tcp filtered pptp

8022/tcp open oa-system

 

Nmap scan report for sT (x.x.x.x)

Host is up (0.34s latency).

Not shown: 993 closed ports

PORT STATE SERVICE

80/tcp open http

135/tcp filtered msrpc

139/tcp filtered netbios-ssn

445/tcp filtered microsoft-ds

1720/tcp filtered h323q931

1723/tcp filtered pptp

8022/tcp open oa-system

 

Nmap scan report for localhost (127.0.0.1)

Host is up (0.0020s latency).

Not shown: 999 closed ports

PORT STATE SERVICE

631/tcp open ipp

 

Read data files from: /usr/bin/../share/nmap

Nmap done: 3 IP addresses (3 hosts up) scanned in 76.45 seconds

 

Result 2 of my nmap scan with my mobile ISP.

hobbit@hobbit-OptiPlex-GX520:~$ sudo nmap -sU 127.0.0.1
[sudo] password for hobbit:

Starting Nmap 7.01 ( https://nmap.org ) at 2016-06-25 20:14 IST
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000024s latency).
Not shown: 997 closed ports
PORT     STATE         SERVICE
68/udp   open|filtered dhcpc
631/udp  open|filtered ipp
5353/udp open|filtered zeroconf

Nmap done: 1 IP address (1 host up) scanned in 2.81 seconds
 

 

The first result with IP x.x.x.x,what is this IP ?

I am not running any web server ? I do not own that IP ?

what is going on ?

 

Odd after posting this the initial above result disappeared and than I was getting

a message I was not allowed into this forum ? I had to change ISP to regain access

to the forum.My ISP  seems hacked ,not allowing me to access this site through it.

All other sites allowed.

 

I have screen shots of my scans also.

 

dirty ISP or hacked ISP ??

 

Kindly advice.


Edited by implieddeny, 25 June 2016 - 09:22 PM.


BC AdBot (Login to Remove)

 


#2 Viper_Security

Viper_Security

  • Members
  • 826 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:127.0.0.1
  • Local time:12:58 AM

Posted 25 June 2016 - 10:06 AM

Only half of that made sense to me, and since you are on linux you should be able to type in whois (ip) then it will tell you who owns the ip and im curious as to why you are scanning 127.0.0.1 

 

instead of 192.168.0.1/24 or 192.168.1.1/24?

 

 

Unless you are scanning a specific server, im lost as to why 127.0.0.1, try this and see if the results are different

 

nmap -T4 -A -v -Pn 192.168.0.1/24

 

(192.168.x.x might be different for you it's mainly .0.1 or .1.1)

 

 

Also ISP =Internet Service Provider. (e.g Charter ) they jsut provide the service for you, and 127.0.0.1 is IP for "home"

 

if you think your linux machine is infected open terminal and type in:

 

"sudo chkrootkit -x" then hit enter


Edited by Viper_Security, 25 June 2016 - 10:20 AM.

    IT Auditor & Security Professional

hQBT2G3.png


#3 implieddeny

implieddeny
  • Topic Starter

  • Members
  • 45 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 25 June 2016 - 10:53 AM

1.I found out who owns the IP

 

 

2.I was scanning 127.0.0.1 localhost to check my own computer,maybe open ports

   and I stumbled upon the above results.

 

3.Is the first result indicative of my computer being hacked ?

   what does the first result indicate ?

 

4.I ran rkhunter before nothing.Yes I suspect strongly that I maybe hacked.

    will run the scans again.

 

 

Kindly advice , since the first result shows an IP which I have no clue about ?

And nmap showing it in an localhost scan seemed odd ?


Edited by implieddeny, 25 June 2016 - 11:38 AM.


#4 Viper_Security

Viper_Security

  • Members
  • 826 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:127.0.0.1
  • Local time:12:58 AM

Posted 25 June 2016 - 10:58 AM

Is D**** M*** LLC your ISP?, or do you have affiliation with D***S***S*****? if not then something isn't right


Edited by Viper_Security, 25 June 2016 - 11:48 AM.

    IT Auditor & Security Professional

hQBT2G3.png


#5 implieddeny

implieddeny
  • Topic Starter

  • Members
  • 45 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 25 June 2016 - 11:12 AM

hobbit@hobbit-OptiPlex-GX520:~$ sudo nmap -T4 -A -v -Pn 192.168.10.0/24

Starting Nmap 7.01 ( https://nmap.org ) at 2016-06-25 21:30 IST
NSE: Loaded 132 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 21:30
Completed NSE at 21:30, 0.00s elapsed
Initiating NSE at 21:30
Completed NSE at 21:30, 0.00s elapsed
Initiating ARP Ping Scan at 21:30
Scanning 255 hosts [1 port/host]
Completed ARP Ping Scan at 21:30, 2.02s elapsed (255 total hosts)
Initiating Parallel DNS resolution of 255 hosts. at 21:30
Completed Parallel DNS resolution of 255 hosts. at 21:30, 0.03s elapsed
Nmap scan report for 192.168.10.0 [host down]
Nmap scan report for 192.168.10.2 [host down]

 

[all IP's in this subnet are down 0 to 255

except 1 assigned to my linksys router and 100 to my pc]

Initiating Parallel DNS resolution of 1 host. at 21:30
Completed Parallel DNS resolution of 1 host. at 21:30, 0.03s elapsed
Initiating SYN Stealth Scan at 21:30
Scanning 192.168.10.1 [1000 ports]
Discovered open port 443/tcp on 192.168.10.1
Increasing send delay for 192.168.10.1 from 0 to 5 due to 99 out of 246 dropped probes since last increase.
Increasing send delay for 192.168.10.1 from 5 to 10 due to 285 out of 711 dropped probes since last increase.
Completed SYN Stealth Scan at 21:30, 13.41s elapsed (1000 total ports)
Initiating Service scan at 21:30
Scanning 1 service on 192.168.10.1
Completed Service scan at 21:30, 12.18s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against 192.168.10.1
adjust_timeouts2: packet supposedly had rtt of -174717 microseconds.  Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -174717 microseconds.  Ignoring time.
NSE: Script scanning 192.168.10.1.
Initiating NSE at 21:30
Completed NSE at 21:31, 66.60s elapsed
Initiating NSE at 21:31
Completed NSE at 21:31, 0.00s elapsed
Nmap scan report for 192.168.10.1
Host is up (0.00075s latency).
Not shown: 999 closed ports
PORT    STATE SERVICE  VERSION
443/tcp open  ssl/http Linksys WRT54GL router http config
| ssl-cert: Subject: commonName=Linksys/organizationName=Cisco-Linksys, LLC/stateOrProvinceName=California/countryName=US
| Issuer: commonName=Linksys/organizationName=Cisco-Linksys, LLC/stateOrProvinceName=California/countryName=US
| Public Key type: rsa
| Public Key bits: 512
| Signature Algorithm: md5WithRSAEncryption
| Not valid before: 2006-04-27T08:30:38
| Not valid after:  2016-04-24T08:30:38
| MD5:   45f5 54e3 de2c f1ba 6f63 55fd 7125 1821
|_SHA-1: 5ecc d2c0 1556 e84d 0f05 1d39 ea87 072e 9eb7 419f
MAC Address: 00:0F:66:D3:82:50 (Cisco-Linksys)
Device type: general purpose
Running: Linux 2.4.X
OS CPE: cpe:/o:linux:linux_kernel:2.4
OS details: Linux 2.4.18 - 2.4.35 (likely embedded)
Uptime guess: 0.014 days (since Sat Jun 25 21:11:32 2016)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=204 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Device: WAP; CPE: cpe:/h:linksys:wrt54gl

TRACEROUTE
HOP RTT     ADDRESS
1   0.75 ms 192.168.10.1

Initiating SYN Stealth Scan at 21:31
Scanning 192.168.10.100 [1000 ports]
Completed SYN Stealth Scan at 21:32, 1.63s elapsed (1000 total ports)
Initiating Service scan at 21:32
Initiating OS detection (try #1) against 192.168.10.100
adjust_timeouts2: packet supposedly had rtt of -125295 microseconds.  Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -125295 microseconds.  Ignoring time.
Retrying OS detection (try #2) against 192.168.10.100
WARNING: OS didn't match until try #2
NSE: Script scanning 192.168.10.100.
Initiating NSE at 21:32
Completed NSE at 21:32, 0.18s elapsed
Initiating NSE at 21:32
Completed NSE at 21:32, 0.00s elapsed
Nmap scan report for 192.168.10.100
Host is up (0.000028s latency).
All 1000 scanned ports on 192.168.10.100 are closed
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: phone|general purpose|webcam|storage-misc
Running: Google Android 2.X, Linux 2.6.X, AXIS embedded, ZyXEL embedded
OS CPE: cpe:/o:google:android:2.2 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:2.6.17 cpe:/h:axis:210a_network_camera cpe:/h:axis:211_network_camera cpe:/h:zyxel:nsa-210
OS details: Android 2.2 (Linux 2.6), Linux 2.6.14 - 2.6.34, Linux 2.6.17, Linux 2.6.17 (Mandriva), Linux 2.6.32, AXIS 210A or 211 Network Camera (Linux 2.6.17), ZyXEL NSA-210 NAS device
Network Distance: 0 hops

NSE: Script Post-scanning.
Initiating NSE at 21:32
Completed NSE at 21:32, 0.00s elapsed
Initiating NSE at 21:32
Completed NSE at 21:32, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 256 IP addresses (2 hosts up) scanned in 105.29 seconds
           Raw packets sent: 4112 (178.860KB) | Rcvd: 3844 (166.368KB)
satish@satish-OptiPlex-GX520:~$
 

 

Yes something is definitely wrong.

No never heard of the above.

what is even interesting is :

1.the previous results have vanished.

2.to access this forum I have to change my ISP,

  previously was getting a message

  'sorry you do not have permission to do that'

 

 should i upload screen shots ?


Edited by implieddeny, 25 June 2016 - 09:23 PM.


#6 Viper_Security

Viper_Security

  • Members
  • 826 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:127.0.0.1
  • Local time:12:58 AM

Posted 25 June 2016 - 11:19 AM

MIT huh, and if you have wireshark run that for roughly 10-15 minutes (if you still notice something malicious) and that will record ALL traffic on your internet from there we can do information gather on them (the IP's)(which i do not recommend posting public for yours and others safety/privacy)

 

 

I'm Assuming you are using some security distro of linux since you have nmap on there (e.g Kali, Tails, Parrot, Black Arch etc.)

 

I don't want to get too in detail on how to find out for fear of others misusing the information meant to be educational.


    IT Auditor & Security Professional

hQBT2G3.png


#7 implieddeny

implieddeny
  • Topic Starter

  • Members
  • 45 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 25 June 2016 - 11:22 AM

1.Should I remove the above posts ? fear for my own safety ? the IP's ?

 

2.I am using Ubuntu.

 

3.run wireshark on my pc ?ok,do not have wireshark just installing it.

   I am a basic CCENT level networking person and not much into security.


Edited by implieddeny, 25 June 2016 - 11:24 AM.


#8 implieddeny

implieddeny
  • Topic Starter

  • Members
  • 45 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 25 June 2016 - 11:25 AM

should I remove the previous posts ?

I have removed IP's and names.


Edited by implieddeny, 25 June 2016 - 09:24 PM.


#9 Viper_Security

Viper_Security

  • Members
  • 826 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:127.0.0.1
  • Local time:12:58 AM

Posted 25 June 2016 - 11:35 AM

I see, well this NMAP script will sniff your network for oddities, and you should be fine with the IP's you have posted, Im an IT Consultant/Security Professional with 18+ years exp.

 

 

nmap --script=sniffer-detect 192.168.0.1/24 (or which ever IP corresponds with your home router but include the /24)

 

 

 

Look for:  "Likely in promiscuous mode" if so then someone has likely invaded your internet

 

 

what i meant by safety was your cyber-safety, someone can do a lot with an IP if knowledgeable, but your safety is fine, the security however may not be, also install Nessus. it's free to use for home use only. it will tell you about vulnerabilities in your network and how to fix them

http://www.tenable.com/products/nessus-vulnerability-scanner


Edited by Viper_Security, 25 June 2016 - 11:47 AM.

    IT Auditor & Security Professional

hQBT2G3.png


#10 implieddeny

implieddeny
  • Topic Starter

  • Members
  • 45 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 25 June 2016 - 12:12 PM

ROOTDIR is `/'
Checking `amd'...                                           not found
Checking `basename'...                                      not infected
Checking `biff'...                                          not found
Checking `chfn'...                                          not infected
Checking `chsh'...                                          not infected
Checking `cron'...                                          not infected
Checking `crontab'...                                       not infected
Checking `date'...                                          not infected
Checking `du'...                                            not infected
Checking `dirname'...                                       not infected
Checking `echo'...                                          not infected
Checking `egrep'...                                         not infected
Checking `env'...                                           not infected
Checking `find'...                                          not infected
Checking `fingerd'...                                       not found
Checking `gpm'...                                           not found
Checking `grep'...                                          not infected
Checking `hdparm'...                                        not infected
Checking `su'...                                            not infected
Checking `ifconfig'...                                      not infected
Checking `inetd'...                                         not infected
Checking `inetdconf'...                                     not found
Checking `identd'...                                        not found
Checking `init'...                                          not infected
Checking `killall'...                                       not infected
Checking `ldsopreload'...                                   not infected
Checking `login'...                                         not infected
Checking `ls'...                                            not infected
Checking `lsof'...                                          not infected
Checking `mail'...                                          not infected
Checking `mingetty'...                                      not found
Checking `netstat'...                                       not infected
Checking `named'...                                         not found
Checking `passwd'...                                        not infected
Checking `pidof'...                                         not infected
Checking `pop2'...                                          not found
Checking `pop3'...                                          not found
Checking `ps'...                                            not infected
Checking `pstree'...                                        not infected
Checking `rpcinfo'...                                       not found
Checking `rlogind'...                                       not found
Checking `rshd'...                                          not found
Checking `slogin'...                                        not infected
Checking `sendmail'...                                      not infected
Checking `sshd'...                                          not found
Checking `syslogd'...                                       not tested
Checking `tar'...                                           not infected
Checking `tcpd'...                                          not infected
Checking `tcpdump'...                                       not infected
Checking `top'...                                           not infected
Checking `telnetd'...                                       not found
Checking `timed'...                                         not found
Checking `traceroute'...                                    not infected
Checking `vdir'...                                          not infected
Checking `w'...                                             not infected
Checking `write'...                                         not infected
Checking `aliens'...                                        no suspect files
Searching for sniffer's logs, it may take a while...        nothing found
Searching for rootkit HiDrootkit's default files...         nothing found
Searching for rootkit t0rn's default files...               nothing found
Searching for t0rn's v8 defaults...                         nothing found
Searching for rootkit Lion's default files...               nothing found
Searching for rootkit RSHA's default files...               nothing found
Searching for rootkit RH-Sharpe's default files...          nothing found
Searching for Ambient's rootkit (ark) default files and dirs... nothing found
Searching for suspicious files and dirs, it may take a while... The following suspicious files and directories were found:  
/usr/lib/debug/.build-id /lib/modules/4.4.0-21-generic/vdso/.build-id /lib/modules/4.4.0-24-generic/vdso/.build-id
/usr/lib/debug/.build-id /lib/modules/4.4.0-21-generic/vdso/.build-id /lib/modules/4.4.0-24-generic/vdso/.build-id
Searching for LPD Worm files and dirs...                    nothing found
Searching for Ramen Worm files and dirs...                  nothing found
Searching for Maniac files and dirs...                      nothing found
Searching for RK17 files and dirs...                        nothing found
Searching for Ducoci rootkit...                             nothing found
Searching for Adore Worm...                                 nothing found
Searching for bleepC Worm...                                 nothing found
Searching for Omega Worm...                                 nothing found
Searching for Sadmind/IIS Worm...                           nothing found
Searching for MonKit...                                     nothing found
Searching for Showtee...                                    nothing found
Searching for OpticKit...                                   nothing found
Searching for T.R.K...                                      nothing found
Searching for Mithra...                                     nothing found
Searching for LOC rootkit...                                nothing found
Searching for Romanian rootkit...                           nothing found
Searching for Suckit rootkit...                             nothing found
Searching for Volc rootkit...                               nothing found
Searching for Gold2 rootkit...                              nothing found
Searching for TC2 Worm default files and dirs...            nothing found
Searching for Anonoying rootkit default files and dirs...   nothing found
Searching for ZK rootkit default files and dirs...          nothing found
Searching for ShKit rootkit default files and dirs...       nothing found
Searching for AjaKit rootkit default files and dirs...      nothing found
Searching for zaRwT rootkit default files and dirs...       nothing found
Searching for Madalin rootkit default files...              nothing found
Searching for Fu rootkit default files...                   nothing found
Searching for ESRK rootkit default files...                 nothing found
Searching for rootedoor...                                  nothing found
Searching for ENYELKM rootkit default files...              nothing found
Searching for common ssh-scanners default files...          nothing found
Searching for Linux/Ebury - Operation Windigo ssh...        Possible Linux/Ebury - Operation Windigo installetd
Searching for 64-bit Linux Rootkit ...                      nothing found
Searching for 64-bit Linux Rootkit modules...               nothing found
Searching for suspect PHP files...                          nothing found
Searching for anomalies in shell history files...           nothing found
Checking `asp'...                                           not infected
Checking `bindshell'...                                     not infected
Checking `lkm'...                                           chkproc: nothing detected
chkdirs: nothing detected
Checking `rexedcs'...                                       not found
Checking `sniffer'...                                       lo: not promisc and no packet sniffer sockets
enp2s0: PACKET SNIFFER(/sbin/dhclient[7576])
Checking `w55808'...                                        not infected
Checking `wted'...                                          chkwtmp: nothing deleted
Checking `scalper'...                                       not infected
Checking `slapper'...                                       not infected
Checking `z2'...                                            user satish deleted or never logged from lastlog!
Checking `chkutmp'...                                        The tty of the following user process(es) were not found
 in /var/run/utmp !
! RUID          PID TTY    CMD
! root         7161 pts/4  bash
! root         7178 pts/4  bash
! root         6192 pts/4  dbus-launch --autolaunch 70a3bb36b80c4a5993a651540c0042c5 --binary-syntax --close-stderr
! root         7160 pts/4  su
! root         7177 pts/4  su
! root         7159 pts/4  sudo su
! satish       2517 pts/4  bash
! root        31584 pts/5  /bin/sh /usr/sbin/chkrootkit
! root        32245 pts/5  ./chkutmp
! root        32247 pts/5  ps axk tty,ruser,args -o tty,pid,ruser,args
! root        32246 pts/5  sh -c ps axk "tty,ruser,args" -o "tty,pid,ruser,args"
! root        31583 pts/5  sudo chkrootkit
! satish       7560 pts/5  bash
chkutmp: nothing deleted
Checking `OSX_RSPLUG'...                                    not infected



#11 Viper_Security

Viper_Security

  • Members
  • 826 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:127.0.0.1
  • Local time:12:58 AM

Posted 25 June 2016 - 12:16 PM

if you can, type in "who" in the terminal and that will tell you the device(s) connected directly to you, but if you have not already, download nessus and wireshark and run them, then with the data you got from wireshark use the whois, to find out more info, about any IPs you see that could be suspicious.


    IT Auditor & Security Professional

hQBT2G3.png


#12 implieddeny

implieddeny
  • Topic Starter

  • Members
  • 45 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 25 June 2016 - 09:21 PM

hobbit@hobbit-OptiPlex-GX520:~$ sudo nmap --script=sniffer-detect 192.168.10.0/24
[sudo] password for hobbit:

Starting Nmap 7.01 ( https://nmap.org ) at 2016-06-26 07:47 IST
Nmap scan report for 192.168.10.1
Host is up (0.00073s latency).
Not shown: 999 closed ports
PORT   STATE SERVICE
80/tcp open  http
MAC Address: 00:0F:66:D3:82:50 (Cisco-Linksys)

Host script results:
|_sniffer-detect: Unknown (tests: "________")

Nmap scan report for 192.168.10.100
Host is up (0.000023s latency).
Not shown: 999 closed ports
PORT   STATE SERVICE
25/tcp open  smtp

Nmap done: 256 IP addresses (2 hosts up) scanned in 93.11 seconds
 


Edited by implieddeny, 25 June 2016 - 09:25 PM.


#13 implieddeny

implieddeny
  • Topic Starter

  • Members
  • 45 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 25 June 2016 - 09:34 PM

Should I change my Router ?

I am using Linksys WRT54g or does it need a firmware upgrade ?



#14 Viper_Security

Viper_Security

  • Members
  • 826 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:127.0.0.1
  • Local time:12:58 AM

Posted 25 June 2016 - 09:47 PM

no you should not have to upgrade the firmware (if an update is available, go for it)  and you should be able to just change the password (along with the admin  login/pass) from the Router GUI.


    IT Auditor & Security Professional

hQBT2G3.png


#15 implieddeny

implieddeny
  • Topic Starter

  • Members
  • 45 posts
  • OFFLINE
  •  
  • Local time:01:28 PM

Posted 25 June 2016 - 10:09 PM

1.The Router password is quite complex I do not know how anyone

    could have hacked it ?

 

2.Checked port forwarding on the Router ,no ports were open.






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users