1
I am an avid user of a reverse phone look up site (not naming any names) where you can look up a recent phone number that has called. One of the numbers involves the infamous "Windows Tech Support" phone scam.
Somebody had posted in the thread, claiming that they were able to form a "two-way connection" of sorts. They said that they allowed the scammer to connect to them in a sandbox OS via RDC, and he was able to gain access to the scammer's PC and see what he was doing while the scammer continued with the script.
I am wondering if this is possible, and how the "victim" could have accomplished that?
Given that what you're asking falls under the term "Hacking", I've voted for closing as: This question is not about computer hardware or software, within the scope defined in the help center. – LPChip – 2014-07-12T13:17:40.183
1I'd say it's fine to ask here. This is not necessarily about hacking, but also about preventing yourself from being scammed in a similar manner. – slhck – 2014-07-12T17:07:05.810
That is a fantastic question and welcome to Super User! Anyone who works in security would be keen to learn about this (if they didn't already know). I apologise for the trigger-happy attitude of some of the other "moderators" on here. As a new user to this site you will soon learn that the biggest problem is over-zealous close votes. Once you learn how to phrase things in such a way as to avoid giving users like LPChip an excuse to close your question you will get more out of this site. The fact LPChip has the power to vote to close questions shows this site isn't perfect. Good luck! – Austin ''Danger'' Powers – 2014-07-12T17:50:13.123