AnonReBoot wrote: So something like wireshark, or cain and able wont help in this matter? bc when he got my IP i was in a room with him and a few others , and i didnt click no links or nothing
And you never visited his IMVU homepage? Or the homepage of any of the other 'jokers'. You still don't know when he got your IP only when he told you he had it. The amount of data wireshark or any other sniffer collects is enormous. Nobody is going to capture data from a room, isolate your packets from everyone elses, and pinpoint your IP in a couple of minutes.
I just got my sniffer (similar to wireshark) updated and reinstalled and will be capturing some traffic today to see what I can see. I'll post results later.
If someone really got your IP from a room chat, then he has a tool I want.
-- Tue Apr 03, 2018 9:07 am --
OK, results. I won't post the complete analysis 'cause I don't want to spam the thread but if anybody wants it, I can PM you the notes. First the test conditions. I rebooted my PC, ran CCleaner for cookies, started my VPN and only opened one webpage to My IMVU and started the client (IMVULite). After establishing a private chat with a friend, I ran netstat -an, netstat -af and started my sniffer capturing 60,000 packets. Here some general info that everyone might find interesting:
1) Even with so little going on, I had 35 active TCP/IP connections!
2) 5 of those were cookies from Amazon, Microsoft, Google and a web security firm named CloudFlare - despite CCleaner. Unfortunately, the payload did not indicate who CloudFlare set the cookies for.
3) Amazon, Google, Facebook and YouTube all used IMVU apis to get my User Name and Customer ID over other (non-cookie) connections. Google, FB and YouTube at least encrypted them, Amazon gets them in clear text. :/
4) IMVU uses Akamai Technologies for hosting.
5) IMVU's api server also exchanges User Name and CID in the clear. :/
6) IMPORTANT! The IMVU Message Queue packets (chatting and realtime web page, avi card, etc. updates) were all encrypted after the initial handshake with the client. It may just be gzip which only compresses the data for performance purposes or it may be real encryption. I don't have the skills to tell.
Most importantly I didn't find any active IP connections to my chat partner. No searchable info (i.e. sent in clear text) in any packet payload regarding their IP, name, or CID, all of which I know and could search for. So again, I don't know how they got your IP but pretty sure it wasn't by sniffing a chat or using netstat.