When someone tries to exploit a loophole on your computer, let it install itself into a false sandbox, monitor what’s happening, record session information and reverse-install modified versions of it’s zombie software until you trace the route back to the hacker’s original machine itself, the install a master control on the hacker’s machine and send off all the information gathered to the FBI and Justice Department. In the meantime, all of the zombie machines are converted into data-gathering zombie look-alikes that no longer transmit spam, but still have the control channels open, and report back to a central control location so they can be permanently turned off. Deployed the right way, this could be the first major bite against the hackers.
This would be a great tool to install on Linux as well as Windows machines.
This is an amazing idea, and it seems you have thought a lot about it, as much as I would like to see your wish come true, I don’t know if it would work. As it would transmit the machines IP and all needed tracking info, what makes you think that the hacker is on his own network? They can be stealing a neighbors network or using a Cafe machine, there are so many possibilities it is not possible to create a full proof program to do this.
Justin hit the nail on the head on that one.
I tend to “float about” with m laptop and often find
unsecured wireless networks to “feed” off of
as well as all the public access machines
growing by the hour in numbers it’s about impossible
to really capture the true source of an attack.
It’s also pretty easy to “spoof” an IP these days…
BUT !!!
This is the genius behind a good Firewall like Comodo Firewall
and Antivirus program Like Comodo Antivirus!
They do a very good job indeed of keeping your machine/s
safe and secure as long as you are vigilant in keeping them up to date
as well as getting those confounded never ending security patches
from what ever OS you’re running…
A little common sense in using email and websites helps a lot too…
Scripting exploits are all the rage these days so if you’re planning on
surfing through a lot of unknown internet waves it’s best to disable
or not allow scripts to run in email and web pages…
Tracking though is a tough call even the CIA/NSA/FBI etc., has a rough time doing that…
Someone attacks your pc,
a full screen 3d alert pops up showing a big red blinking “INTRUDER ALERT” and a Star Trek like annoying siren.
Then a 3D earth flies in, “starting trace”…, symphonic stress music is played, a line slowly is drawn from one hop to another…but:
a big fat “ACCESS DENIED” shows up (again, red and blinking) and oh, there is an input field to enter a password. So lucky today. A Matrix-Code like screen shows up and slowly assembles the password.
…not to offend anyone. just a few hollywood clische comming to my mind
And I know, a Comodo version would’t be like that. ;D
I don’t know about the Star Trek bells & whistles, but a simple, effective and accurate traceroute application that resolves to an actual ISP and MAC address, including all the hops along the way, would be nice.
The option to then port scan and, upon finding any open port, delivery and display of a suitable “I know who you are and your ISP has been informed!” pop-up on the offending machine would be a bonus too.
Most ISPs are registered organisations and have anti-abuse policies and contact email addresses available.
Automating this process within a simple application would be very useful. (:CLP)
Unfortunatley, far too many “heroes” hide behind the perceived anonymity of the internet.