Showing posts sorted by relevance for query hacking. Sort by date Show all posts
Showing posts sorted by relevance for query hacking. Sort by date Show all posts

Live Hacking Team Release Updated Linux Distro for Penetration Testing

The Live Hacking project, led by Dr. Ali Jahangiri, is pleased to announce an updated version of its security orientated Linux distribution the “Live Hacking DVD”. Designed for penetration testing and ethical hacking, the new release has updated over 140 packages including Metasploit and Firefox.
The Live Hacking Linux distribution is a ‘Live DVD’ meaning that it boots and runs directly from the DVD without needing to be installed on your hard disk. Once it starts you can use the included utilities to perform penetration tests and ethically hack on your own network to ensure that it is secure from outside intruders.
New in this release is Metasploit Framework 3.6 which can be used to test your network using the framework’s internal database of known weaknesses and exploits. New to V3.6 are post-exploitation modules that can be run on exploited systems to perform actions such as gathering additional information, pivoting to other networks and elevating system privileges. V3.6 also adds 15 new exploits making a total of 648 exploit modules, 342 auxiliary modules and 23 post modules.
“The Live Hacking Linux distribution has been a great success. It is downloaded on average 50 times per day and we have had over 4,500 downloads in the first three months of this year alone.” said Dr. Ali Jahangiri the project leader. “We are keen to keep the distro up to date and we are planning to add more features and tools in the future.”
The Live Hacking DVD is part of the Live Hacking family which includes the LiveHacking.com security and penetration testing website. LiveHacking.com is an essential resource for security professionals and those wishing to educate themselves about security. The web site has security related news, features and articles plus educational videos about using some of the security tools found on the Live Hacking DVD.

LiveHacking.com also has information about Dr. Jahangiri’s book “Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts”, as well as details of the Live Hacking Workshops which Dr Jahangiri runs internationally, to introduce IT professionals to the world of ethical hacking.

 

 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

A Tribute to The 10 Most Infamous Student Hackers of All Time

A Tribute to The 10 Most Infamous Student Hackers of All Time

Since last two years, we the VOGH team has been covering all the latest cyber security updates. But today lets do some thing different. One of our frequent reader and fan Katina Solomon has requested us to share a fantastic article. Everyday VOGH draws headlines of hackers around the world and their activities. While trying to maintain speed with time, we usually forgot our past. Today we will take you into the past, where we will discuss about those heroes, who are always been ill treated by the society & the system while revamping those heroes into cyber-criminals or infamous hackers. Its our question to our humanity "Did the system has done justice with them??" 
Hacking has always been inherently a young person’s game. The first usage of the word “hacker” was to describe pranksters meddling with the phones at MIT. Many hackers have cited boredom, a desire for change, or the thrill of going somewhere one is not supposed to go as their motivation for hacking, all of which could apply to scores of common activities on college campuses. While today’s hacking scene is dominated by large hacking groups like Anonymous and Masters of Deception, many of the greatest hacks ever have been pulled off by college, high school, and even middle school kids who rose to infamy armed only with a computer and the willingness to cross the bounds of legality.
  1. Sven Jaschan: In the words of one tech expert, “His name will always be associated with some of the biggest viruses in the history of the Internet.” The viruses: the Sasser and NetSky worms that infected millions of computers and have caused millions of dollars of damage since their release in 2004. The man behind the viruses proved to be not even a man at all, legally. Seventeen-year-old hacker Sven Jaschan, a student at a computer science school in Germany, claimed to have created the viruses to become a hero by developing a program that would eradicate the rampaging Mydoom and Bagle bugs. Instead he found himself the subject of a $250,000 bounty courtesy of Microsoft, for which some of his classmates turned him in.
  2. Jonathan James: In 2000, at the age of 16, James, or “C0mrade” as he was known in the hacker community, infamously became the first juvenile federally sentenced for hacking. The targets of his notorious hack jobs were a wing of the U.S. Department of Defense called the Defense Threat Reduction Agency, NASA, and the Marshall Space Flight Center in Huntsville, Ala. (By hacking the latter James gained the ability to control the A/C in the International Space Station.) All of these were pulled off “for fun” while James was still a student at Palmetto Senior High in Miami. Unfortunately, the fun ran out when James was tied into a massive identity theft investigation. Though insisting he was innocent, James took his own life, saying he had “no faith in the justice system.”
  3. Michael Calce: Yahoo. CNN. Ebay. Amazon. Dell.com. One by one in a matter of days, these huge websites crashed at the hands of 15-year-old Canadian high school student Michael Calce, aka “MafiaBoy.” Armed with a denial-of-service program he called “Rivolta” that overloaded servers he targeted, the young hacker wreaked $7.5 million in damages, according to court filings. Calce was caught when he fell victim to a common ailment of teenage boys: bragging. The cops were turned on to him when he began boasting in chat rooms about being responsible for the attacks. On Sept. 12, 2001, MafiaBoy was sentenced to a group facility for eight months on 56 counts of cybercrime.
  4. Kevin Mitnick: Before performing hacks that prompted the U.S. Department of Justice to declare him “the most wanted computer criminal in United States history,” Kevin Mitnick had already made a name for himself as a hacker in his school days, first at Monroe High School in LA and later at USC. On a dare, Mitnick connived an opening into the computer system of Digital Equipment Corporation, which some fellow hackers then used to steal proprietary source code from the company before ratting on him. While still on probation for that crime, Mitnick broke into the premises of Pacific Bell and had to go on the run from police in the aftermath, during which time he hacked dozens of systems, including those of IBM, Nokia, Motorola, and Fujitsu.
  5. Tim Berners-Lee: “Scandalous” is a synonym for “infamous,” and for this legendary computer scientist, knight of the British Empire, and inventor of the World Wide Web to have been a hacker in his school days is certainly a juicy factoid. During his time at Oxford in the mid-’70s, Sir Tim was banned from using university computers after he and a friend were caught hacking their way into restricted digital areas. Luckily by that time he already knew how to make his own computer out of a soldering iron, an old TV, and some spare parts. And also luckily for him, he will always be revered as the father of the Internet.
  6. Neal Patrick and the 414s: In the early ’80s, hacking was still a relatively foreign concept to most Americans. Few recognized the enormous power hackers could hijack with a few strokes on a keyboard, which explains why a young group of hackers known as the 414s (after a Milwaukee area code) were virtual celebrities after they hacked into the famous Los Alamos National Laboratory, the Memorial Sloan-Kettering Cancer Center, and elsewhere. While today hacking a lab where classified nuclear research is conducted could earn you a one-way ticket to Guantanamo, the 17-year-old ringleader and high school student Neal Patrick was on the cover of Newsweek. The group members got light sentences but prompted Congress to take a stronger role in cybercrime.
  7. Robert T. Morris: The first ever Internet worm, the Morris Worm derived its name from Cornell grad student Robert Tappan Morris. In 1988, Morris released the worm through MIT’s system to cover his tracks, which would seem to contradict his claims that he meant no harm with it. But that’s exactly what resulted: the worm spread out of control, infecting more than 6,000 computers connected to the ARPANET, the academic forerunner to the World Wide Web. The damages reached as high as an estimated $10 million, and Morris earned the ignominious distinction of being the first person prosecuted under the Computer Fraud and Abuse Act. Morris got community service but was apparently not considered too infamous to be offered his current job as a professor at MIT.
  8. George Hotz: To some, George Hotz (aka “geohot,” aka “million75,” aka “mil”) is a public menace, a threat to electronic businesses everywhere. To many, Hotz is a hero. The high-schooler shot to fame/infamy in 2007 at the tender age of 17 by giving the world its first hacked, or “jailbroken” iPhone. He traded it for a new sports car and three new iPhones, and the video of the hacking received millions of hits. Apple has had to grudgingly come to terms with jailbreaking, seeing as the courts have declared it legal, but Sony Corp. is definitely not OK with such tampering. When Hotz hacked his PlayStation 3 and published the how-to on the web, the company launched a vicious lawsuit against him. In turn, the hacker group Anonymous launched an attack on Sony, stealing millions of users’ personal info.
  9. Donncha O’Cearbhaill: According to the FBI, this 19-year-old freshman at Trinity College Dublin is one of the top five most wanted hackers in the world. Well, he was; now that he’s been arrested he’s not really “wanted” anymore. The Feds contend the young man is a VIP member of the Anonymous and LulzSec hacking groups that have already been mentioned and whose targets have included the FBI, the U.S. Senate, and Sony (in the Hotz backlash). It seems “Palladium” (O’Cearbhaill) took the liberty of listening in on a conference call between the FBI and several international police forces who were discussing their investigations of the hacking groups. He could be sentenced to up to 15 years in prison if convicted for that hack alone.
  10. Nicholas Allegra: Just as George Hotz moved on from the Apple hacking game, Brown University student Nicholas Allegra is also hanging up his jersey. “Comex,” as he is known to millions of rooted iPhone fans, created the simple-to-use Apple iOS jailbreaking program JailbreakMe in 2007 and has since released two newer versions of it. However, Comex seems to have gone over to the dark side, accepting an internship with the very company whose products he became famous exploiting. Still, Allegra’s hacking skills are so advanced (one author puts him five years ahead of the authors of the infamous Stuxnet worm that corrupted Iran’s nuclear facilities) and so many people availed themselves of his talents, he will forever live in hacking infamy.

We want to dedicate the above post to the legendary hacker, who left us -Jonathan James aka “C0mrade”. Also the post is a tribute to all the so called 'infamous hackers'. You are our heroes and inspiration, you will always be there in our soul. Team VOGH salutes you...... 


-Thank you Katina & Online Degrees




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

China Denies hacking-attack claims over Gmail


China denied it supports hacking activities and said it is part of global efforts to combat computer security threats Thursday, a day after Google disclosed some of its email users suffered hacking attacks that orginated within the country. Google disclosed Wednesday that personal Gmail accounts of several hundred people, including senior U.S. government officials, military personnel and political activists, had been breached. Google traced the origin of the attacks to Jinan, China, the home city of a military vocational school whose computers were linked to an assault 17 months ago on Google's systems. China is firmly opposed to activities that sabotage Internet and computer security, including hacking, Foreign Ministry spokesman Hong Lei told reporters Thursday. Hong said hacking was a global problem and Chinese networks had also been targeted by hackers, but he gave no specifics. He said China was working to crack down on the problem, but he didn't respond when asked whether it would investigate this specific incident. "Allegations that the Chinese government supports hacking activities are completely unfounded and made with ulterior motives," Hong said. Google said all of the hacking victims have been notified and their accounts have been secured. 

This time around, the hackers appeared to rely on tactics commonly used to fool people into believing they are dealing with someone they know or a company that they trust. Once these "phishing" expeditions get the information needed to break into an email account, the access can be used to send messages that dupe other victims. China's Ministry of Industry and Information Technology, which has a hand in regulating the Internet, referred questions about the allegations to another regulatory agency, the State Council Information Office, which asked that questions be faxed and then did not respond. 
The Pentagon said Thursday it had very little information since the reported breaches involved personal accounts rather than government email. And since the accounts were not official, the U.S. Department of Defense was unaware if the targeted individuals were defense employees, the statement said. 
The latest attacks aren't believed to be tied to the more sophisticated assault last year. That intrusion targeted the Google's own security systems and triggered a high-profile battle with China's Communist government over online censorship. The tensions escalated amid reports that the Chinese government had at least an indirect hand in the hacking attacks, a possibility that Google didn't rule out. 
The previous break-in prompted Google to move its Chinese-language search engine off the mainland so it wouldn't have to censor content that the government didn't want the general public to see. The search engine is now based in Hong Kong, which isn't subject to Beijing's censorship rules. China's official Xinhua News Agency blasted Google in an unsigned commentary on Thursday saying the company "provided no solid proof" to support its claims that the hack attacks originated in China. Xinhua said Google's compaints had "become obstacles for enhancing global trust between stakeholders in cyberspace."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Exclusive Interview of Ankit Oberoi Managing Director Innobuzz





Exclusive Interview of Mr. Ankit Oberoi, Co- Founder and Managing Director of Innobuzz Knowledge Solution with Voice Of GREYHAT

VOGH: 1st of all thank you very much for giving us time

Innobuzz: Your most welcome

VOGH: I am aware of that you are a very busy person so I do apologize for taking your time

Innobuzz: Not an issue at all

VOGH: I am aware of that Innobuzz is one of the leading ethical hacking training institute of India so how do you feel as being the director of Innobuzz?

Innobuzz: It is a pleasure to serve the company which I co-founded along with Mr. Atul Agarwal back in 2007.
I have learned a lot during this journey and I am happy to see the success this venture has shown

VOGH: okay
Sir Please share your views on the hacking and security filed

Innobuzz: Information Security and Ethical Hacking is still a niche Technology and has a long way to go. As we know that Internet penetration in Indian and other developing countries is low, I feel that this will rise considerably in the next few years and as the usage increases, so will the misuse. Demand for Ethical Hackers will rise here along with the requirement for services and products related to Information Security.

VOGH: I must have to admire your thoughts
sir kindly tell us what do u think of modern days hacker?

Innobuzz: Hackers today are much smarter and in a much large number today, as compared to a few years ago. There is no formal Statistics for what I am citing, but I feel the average technical knowledge among hacker is only going up and mostly young people which are even less than 15 years of age are contributing to the List. Besides this, Security is a cat and mouse race, so it is obvious that the future will have much smarter hackers and security professional alike. Only way to survive, is to keep yourself updated.

VOGH: I got information form your site that Innobuzz has sucessfully tarined more than 5500 CISE(ethical hackers), My question is can hacking be ethical?

Innobuzz: Of Course, the term Hacker originally referred to people who love Technology and who would explore it by going a step forward. Similarly, Ethical Hacking refers to the usage of same techniques which the Black Hats do, but at the end of the day, the holes are fixed, thereby helping the security of a system, instead of damaging it.

VOGH: U have a huge experience on this filed what is ur suggestion to our readers that how they can prepare themselves in this particular field?

Innobuzz: Get as much knowledge and experience as you can. The more you get, the less you will feel it is. Information Security & Ethical Hacking is one such field where the only thing which can take you forward is passion. I am representing a Training Company, but I will still say that our Training on Ethical Hacking will be of no use unless the student has interest, passion and the zeal to learn it!

VOGH: my next question who is your favourite hacker?

Innobuzz: Renowned and famous - Kevin Mitnick. I have read his books, and the kind of intellect this man posses is commendable.

VOGH: there are lots of other companies who are giving the ethical hacking training, so why Innobuzz?

Innobuzz: To provide a unbiased reply, I will leave for the readers to decide themselves :) Just do your search and talk to the Alumni of all the options you have, before taking a decision. Make sure you don't select a unprofessional company just to save a few bucks., after all, it is your career!

VOGH: U have gained a huge reputation over the industry, but While gaining that what seems to be the biggest trouble you ave ever faced?

Innobuzz: In order to build reputation, one must do what is ethically correct and be righteous. At times, we have made losses to make sure whatever we do is ethically correct.

VOGH: Tell me some person whom u want to thank for ur achievements. Is there any one with out whom this will never happen?

Innobuzz: There are a lot of people without whom this would have been not possible. This list includes our employees who work day-night to make it happen and our competitors who left the gap in the system, which we found and grew.

VOGH: what is your view about voice of greyhat?
also please give some suggestion by which we can make VOGH more successful?

Innobuzz: It is a great site and sites like this which promote information security are the future.
I am sure VOGH can partner with various sites and companies, online + offline, arrange contests, get guest writers to achieve more fame.

VOGH: thanks for your comment about us
what are the upcoming event of innobuzz?

Innobuzz: Your welcome, Innobuzz has gone global and we are soon expanding into many more countries!

VOGH: hope not only hope we do believe that you will break all the records and kiss the sky of success

Innobuzz: Thank you

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Harry Potter author J.K. Rowling Was Also The Victim UK Phone Hacking Scandal



In the ongoing investigation into the U.K. phone hacking scandal, Harry Potter author J.K. Rowling has been identified as one of the main targets of the illegal operations.
The phone hacking and privacy violations have created quite a stir as journalists at News International has been accused of the crimes and names such as actress Sienna Miller, Member of the Parliament Tessa Jowell and Price William have been identified as victims of the crime.
The investigation into the phone hacking has been building for months and recently Scotland Yard has demanded that the news groups reveal their phone-hacking sources, which the paper is presently refusing to do. Some investigation into the claims also includes belief that members of Scotland Yard itself were helping cover up the phone hacking until the doors blew off.
News Corporation, the parent company of News International, is chaired by Rupert Murdoch. While Murdoch is trying to keep his hands clean of the situation, his son James Murdoch has been called in to answer a number of questions in the case. The phone hacking scandal has caused the termination and resignation of a number of individuals at News International.
The recent news with J.K. Rowling named as a victim comes after revelations of the investigation led to an inquiry, which will take place in October 2011. Other than Rowling, Sienna Miller and Hugh Grant, the parents of murdered schoolgirl Milly Dowler testified that their phone was hacked while the police were still searching for their daughter.
Rowling, one of Britain's richest individuals thanks to Harry Potter is a reluctant public figure, fighting back in court against the media when pictures of her children have been published. 

-News Source (Examiner) 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

25 Year Guy Charged For Hacking NBN (National Broadband Nework)

 
An unemployed truck driver has been charged with hacking into an Australian broadband network provider and could have caused significant damage to the national Internet infrastructure, police said Wednesday. The 25-year-old man, who will appear in a New South Wales state magistrates court Wednesday, faces charges of hacking into one of the National Broadband Network's service providers and numerous other businesses and websites in Australia and overseas since May, Australian Federal Police manager Grant Edwards said. The suspect, from the rural town of Cowra, cannot be publicly named until he appears in court.
The investigation began in January when Sydney University reported that its website had been hacked and defaced. Police said Wednesday that there was no evidence that any personal information had been stolen from any of the businesses hacked.

"We'll allege in court today that the man could have potentially caused considerable damage to Australia's national infrastructure by attacking the National Broadband Network," Edwards told reporters.
The Sydney-based wholesale Internet provider, Platform Networks, is one of 13 contracted by the government-owned company NBN Co., which is rolling out one of the world's fastest fiber-optic broadband networks at a cost of 36 billion Australian dollars ($39 billion).

The alleged hacker has been charged over the NBN hacking with one count of unauthorized modification of data to cause impairment. He faces up to 10 years in prison if convicted.
Police have also charged him with another 48 counts of unauthorized access of restricted data. Each count is punishable by two years in prison.
Police say more charges are likely and that more hackers could be arrested.
The suspect used the online moniker "Evil" and his information technology skills were self-taught, Edwards said.
"We'll allege that he's motivated by ego in his illegal hacking and proving his skills after complaining that he could not get work in the IT industry," he said.
The case's chief investigator, police Supt. Brad Marden, said there was no evidence that any personal information had been stolen from any of the businesses hacked.
"The main activities that have occurred on those systems _ and again because he is motivated by ego _ is to deface and damage the systems rather than extract information," Marden told reporters.
NBN Co. assured customers in a statement that its network had not been affected by the hacking.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Hacker Denied Bail in Singapore, Accused For Hacking Prime Minister Website

Anonymous Hacker Denied Bail in Singapore, Accused For Hacking Prime Minister Website

A Singapore court in this week has denied bail of accused anonymous hacker charged for hacking high value government websites. Last month a Singaporean hacker named James Raj was extradited from Malaysia. He was charged for hacking the Ang Mo Kio district website, whose MPs include Prime Minister Lee Hsien Loong, under the banner of worlds most dangerous hacktivist community Anonymous. The alleged hacking was among a string of cyber attacks that have also targeted the websites of Premier Lee and President Tony Tan as well as pro-government media, in a row over Internet freedom in the city state. This 35 years old hacker was deeply linked with Anonymous and he was covered himself with nickname "The Messiah".  District Judge Soh Tze Bian said Raj, posed a flight risk because he previously jumped bail and fled to Malaysia after being slapped with illegal drugs consumption charges in 2011. 
Police have previously said Raj was also linked to other hacking attacks, including on the website of a charity associated with the ruling People's Action Party. Two Singaporean men have so far been charged with defacing the president's website. Police have said that there are no links between Raj and these suspects. 
The round of attack from Raj took place three days before a self-proclaimed spokesperson for Anonymous appeared in a video on October 31 to demand the scrapping of a recent Singapore law requiring news websites to obtain annual licences. The Internet licensing rules, which came into effect in June, have sparked anger among bloggers and activists who say they are designed to muzzle free expression. Singapore strictly regulates the traditional media, but insists the recent licensing rules do not impinge on Internet freedom. 

-Source (Global Post)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Your Car At Risk, Hackers Can Attack Modern Cars Remotely


Hackers could attack modern cars without even touching them, as new car models roll off the line loaded with complex IT systems running millions of lines of software code, it's become evident that hacking a car to gain external control of it is possible. While actual cases in the field are rare, the industry is moving to secure its systems and prevent cars from becoming a major target said by Brian Jackson a security researcher. In the exclusive report he said: An unsuspecting driver opens her door and steps into her new car, placing her smartphone on the dash as it connects with the in-car infotainment system for hands-free features. Little does she know there's a Trojan virus on her phone just waiting to be connected to a car – and it executes malicious code on the vehicle's embedded software. Suddenly a hacker has the ability to track her car, unlock the doors, or even control the climate controls and speaker volume.
It sounds like a scene out of the next James Bond film, but the above scenario could be a reality today. As auto makers look to woo consumers with snazzy in-car technology features, they are also opening up personal vehicles to the underground community of hackers that have long targeted computer users. In-car IT systems such as Ford's Sync or General Motor's OnStar could be opening up exploits that allow hackers to take control of your car without even laying hands on it.
While complex in-car IT systems are so new that actual car hacking cases in the field are virtually non-existent, researchers have demonstrated it's possible. But investigations into car hacking by police may be impossible at this point because of a lack of forensics capability to detect malware. All the more reason for security vendors like McAfee, now a division of Intel Corp., to push car manufacturers to pay serious attention to security.
“It shouldn't be the responsibility of the consumers to have to secure these systems,” says Tim Fulkerson, senior director of marketing at McAfee embedded security group. “Just as manufacturers have built in seat belts and air bags, now that they're moving to software innovation, they need to bring software security into these vehicles.”
Best known for its PC antivirus software, McAfee is now working with car makers to build secure enough systems that consumers won't end up buying virus scan software for their ride. When it comes to car makers and securing IT system, Fulkerson says it “is certainly not their area of expertise.”
Perhaps that's why a team of car-hacking researchers from the University of Washington and the University of California at San Diego have had so much success. Dubbed the Center for Automotive Embedded Systems Security (CAESS), the team demonstrated in May 2010 how a criminal with physical access to a car could implant malware. Then in August 2011, the team showed an external car hacking attack could be mounted through various paths including Bluetooth and cellular radio.
One such attack was executed after the researchers reverse-engineered a car's telematics operating system and found the program responsible for handling Bluetooth functions. From there, they planted a Trojan horse (a piece of malicious software) on an HTC Dream smartphone that monitors for new Bluetooth connections and if it finds a telematics unit, sends the payload.
Researchers were also able to use special hardware to “sniff” the MAC address of the Bluetooth connection needed for pairing new devices with the telematics unit. After cracking the password through brute force, or machine-assisted repeat attempts, the Trojan could be uploaded from a device in the attacker's hands.
But seeing such an attack executed in the wild today is unlikely, according to Patrick Neal, a program coordinator for crime and intelligence analysis at the B.C. Institute of Technology (BCIT). He had his students explore car hacking methods identified by the CAESS group and others. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Interview of Bangladesh Cyber Army with Voice Of GREYHAT




Exclusive Interview of the Admin Bangladesh Cyber Army with Voice Of GREYHAT:-


VOGH :  I have heard a lot about BCA now I want to know about BCA from admin himself so will you plz?


BCA  : Yes, Now days, BCA is a leading security team in Bangladesh. But Interesting thing is, It’s started from a Facebook Group. And Only 5 people are in starting time. But now it has 250+ people in Group.  And we also have our own website, and forum. And many people know us, and Like us 


VOGH : whats the aim of BCA? Means you people must have some objects over here
may I know what are those?


BCA : BCA will be the best cyber security team in bd. basically BCA will help BD people to self defend from others hacker. We will protect all the BD site from others hacker. We will be the ultimate hacking team in next gen. we will prove whole world that BD guys can do anything for their country. We just love our country.


VOGH : How many members are there in BCA?


BCA:  All the BD people are our members. And other’s people who love BD 


VOGH:  What type of achievements BCA has got?


BCA :As far as we think this is only our beginning. Tons of web sites have been hacked till now from BCA team. We hired from BD gov security team called RAB (rapid action battalion) for something under cover mission related about technology. we have protected 150+ web site from others hacker. people love us. People want us. thats it.


VOGH : I am aware of that Bangladeshi hacker’s hacked Google and Airtel, tell what is your view on those topics. And also briff that hacking.


BCA : Yes, It was a Big Hacking. And he was also a good Hacker. But sad thing’s is, he didn’t use his skill in right way, and he destroys many website in his own country. And many harmful hacking done by him.


VOGH: When BCA will make their own forum or security team?


BCA : BCA Now Work on it, and Very soon it will be launched.


VOGH : Tell us some thing about the Bangladeshi hackers.


BCA : Yes, There are many Hackers now in Bangladesh, and they doing very good job. Some of Big Hacks are already done by Bangladeshi Hackers. And also many website secured and penetrate by Bangladeshi People. And in our maximum Hackers are don’t doing  any harmful Hacking. And they Love Bangladesh and Bangladeshi People 


VOGH : let me know is there any one who really helped u guys to form BCA?
means do u want to give thanks to any body regarding the set up and publicity
BCA : Yes we wanna ThnX to Alshe Dupor. He provided our host to maintain our forum. And Also ThnX you and your Group for Our Publicity


VOGH : There are lots of other security team and forums, what is your view about them?
BCA : Yes, There is Many Security team and Forums. Some of them are very good, some are good and some are not so good. It’s Depend what are they doing.


VOGH : Name your favourite hacker.
BCA : There is Many Hacker and their work I Like.  But Kevin Mitnick is Best One 


VOGH : what’s your next object?
BCA : Our Next object is Approval from BD Gov, As a Security Team 


VOGH : We always hard a term "ethical hacker", my question is can hacking be ethical?


BCA : Why Not? If you apply your knowledge on positive things, Help people to Improve Their Cyber Security, and don’t do any harmful things, then it can be Ethical.


VOGH : Thanks a lot for giving voice of GREYHAT so much time. All the very best for BCA.


BCA : Thank you too.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#CFP - Call For Papers Nullcon Delhi 2012 (International Security Conference)

#CFP - Call For Papers Nullcon Delhi 2012 (International Security Conference)
After the success of Goa, now its the preparation time for nullcon Delhi to showcase cutting edge security technologies and discuss new attack vectors and security threats among the Corporate world and the Government sector. The event brings together thought leaders, Corporates, Government and security professionals all under one roof. Being the official media partner, Team Voiceofgreyhat wishes all the very best for Nullcon Delhi 2012.


Categories:-

The talk time duration includes time for questions and answers (5-10 minutes).
  1. Research Category (40 mins - 1 hr) - is a deep knowledge technical track that includes new research, tools, vulnerabilities, zero days or exploits.
  2. Technical Category (30 mins - 1 hr) - comprises of known security issues, case studies, twist to an existing research, tool, vulnerability, exploit or research-in-progress. Although this track is fairly technical, it covers known techniques and analysis and is specially created for security professionals who are not too much into new research, are auditors, management professionals and newbies.
  3. Desi Jugaad (1 hr) - is our signature research category talk and includes any local Indian/Asian hacks.

Submission Topics:-

  1. One of the topics of interest to us is Desi Jugaad(Local Indian/Asian Hack) and has a separate track of its own. Submissions can be any kind of local hacks that you have worked on (hints: electronic/mechanical meters, automobile hacking, Hardware, mobile phones, lock-picking, bypassing procedures and processes, etc. Be creative!)
  2. The topics pertaining to security and hacking in the following domains(but not limited to):
    • Hardware Hacking(ex: RFID, Magnetic Strips, Card Readers, Mobile Devices, Electronic Devices)
    • Tools/exploits/Zero-days (noncommercial)
    • Programming/Software Development security and weaknesses
    • Network vulnerabilities.
    • Information Warfare, cyber espionage, cyber crime, cyber laws
    • Malware, Botnets
    • Web attacks and application hacking
    • New attack vectors
    • Mobile malware, vulnerabilities, exploits, VOIP and Telecom
    • Virtualization security, hacking VMs, breaking out of VMS etc
    • Cloud security, threats and exploitation
    • Critical Infrastructure
    • Satellite hacking
    • Forensics

Submission Format:-

Email the paper to : cfp@nullcon.net
The subject should be : CFP Delhi 2012 <Paper Title>
Email Body :

  1. Name
  2. Handle
  3. Track (& Time required in case of General/Business track)
  4. Paper Title
  5. Country(and City) of residence
  6. Organization and Designation
  7. Contact Number
  8. Have you presented or submitted this paper at any other conference(s) or magazine(s)?
    Yes, No. If yes, where? and how this submission is different from the previous ones. Note that new research talks already given elsewhere or are due to be given elsewhere prior to nullcon will be considered as Technical category talks unless they consist of cutting edge and ground breaking technology, which is at the judgment of the review committee.
  9. Are you releasing an open source tool?
    Yes/No. (If yes, please include the source code for review)
  10. Are you releasing an exploit?
    Yes/No. (If yes, please include the source and vulnerability details for review)
  11. Are you releasing a new vulnerability/Zero-day?
    Yes/No. (If yes, please send us the details, including reproduction procedure, for review)
  12. Why do you think your paper is different/innovative (for all tracks) and how does it qualify as new work/research(for Research track only)?
  13. Are there any live demonstrations (These earn you good points during review)?
    Yes/No. (If Yes, how many? Also please explain each demo)
  14. Brief Profile ( less than 500 Words)
  15. Paper Abstract - Please provide detailed working or your research/work. The more details you provide the better it is for the reviewers. Please keep the abstract to the point. Please do not try to hide the technical details or say “I can't disclose it till bla bla” as it does not help the reviewers in any way and may give your paper a low score because of insufficient information available in the abstract.
  16. Your high resolution photo (attached)

Important Dates:-

CFP Opens: 25th April 2012
1st round of Speaker list Online: 10th June 2012
CFP Closing Date: 30th June 2012
Final speakers List online: 10th July 2012
Conference Dates: 26th-29th September 2012 


For Detailed Information Click Here 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

'Mickey Virus' The Upcoming Bollywood Movie Based on Hacking

'Mickey Virus' The Upcoming Bollywood Movie Based on Hacking 

'Mickey Virus' many of you may think it may be the name of another cyber threat, but let me assure you that; its not a virus or cyber threat. Mickey Virus is the name of an upcoming Bollywood movie based of hacking and cyber world. Sounds interesting, yes it is as this is the first Indian movie which have been subjected to such fields. Before Mickey Virus, we have seen several Indian movies where the matter hacking have been shown, among them we can take the name of  16 DECEMBER, Players & so on. But the main difference between those movies and Mickey Virus will be, here the main story is based on cyber world and specially hacking. According to sources popular television anchor Manish Paul is set to make his Bollywood debut with "Mickey Virus", where he plays a computer hacker. The film hits the screens May 17. Directed by debutant Saurabh Verma, the film also features actor Manish Chaudhary of "Rocket Singh: Salesman Of The Year" fame. "The film is called 'Mickey Virus' and Manish Paul has acted in it. Other than this, we have Manish Chaudhary, who was also there in 'Rocket Singh...'," Verma told IANS.
With Delhi as its backdrop, the story of the film revolves around computer hackers. Asked if Verma harboured any apprehensions since the cast and the crew of the film are relatively new, he said: "I have no apprehensions. The film is such, it has been made for people like us. It is extremely interesting." Verma has been in showbiz for the past 15 years, but was involved in the distribution and production aspects of the film industry. "I always had this movie in mind. I have been in this business for many years now. This film was not made overnight. The pre-production itself took about six months," he said.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Another Romanian Hacker Get Busted on Pentagon & NASA Server Hacking Charges

Another Romanian Hacker Get Busted on Pentagon & NASA Server Hacking Charges
Yet another Romanian hacker get busted on charges of hacking into Pentagon and NASA servers, stealing confidential data. The hacker have posted all the stolen information on his personal blog. Razvan Manole Cernaianu, an information technology student who allegedly used the online alias "TinKode," offered a software program for sale on his blog and also showed a video that demonstrated how he compromised the servers, officials said. Romanian officials said they were working with the FBI and NASA representatives on the case. An FBI spokesman in Washington, D.C., did not immediately have comment this afternoon. The U.S. Embassy in Bucharest said Cernaianu "used sophisticated hacking tools to gain unauthorized access to government and commercial systems." The case demonstrates that "countries and agencies around the globe" could cooperate "to counter these types of threats," it said.
This is not the first time earlier another 26 year aged Romanian Guy face imprisonment for hacking into NASA servers. Also If you dig the history you will find that previously NASA was hit many times by the hackers from different part of the world. Such as Spamers targeted NASA, TeaMp0isoN hacked NASA official forum, Chinese Hackers hit NASA satellites, Indian hacker minhal stole secrete  information from NASA and so on.


-Source (Diicot)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

SunTrust Bank Account Of Deer Chase Elementary School Hacked


Cyber criminals hit a school. About $6,000 was stolen from a SunTrust Bank account for Deer Chase Elementary School in September by a “fraudulent hacking group” based in Florida, Richmond County schools. The same group accessed Deer Chase’s PTA fund in 2010, using debit transactions to pay for $8,000 of child support payments and cellphone and cable bills, bank statements show.
In both cases, SunTrust refunded most of the money, and Svehla said the bank has taken over the investigation into the matter. A SunTrust representative, however, would not comment on the issue nor confirm that a hacking group had accessed the accounts.
In Richmond County, about six people a month become victims of Internet hacking, which is a 60 percent increase since 2008, according to the sheriff’s office. Although school system officials said the Deer Chase incidents are the first time in at least 20 years that a school account has been hacked, there are precautions now that might prevent more problems in the future. Brian Rivers, an information security officer at the University of Georgia, said anyone or any organization can become a target for hackers. If Internet users accidentally end up with malicious spy software installed on a computer, any credit card or account number they type on a Web site is visible to a hacker.
Hackers can also get financial information on a person from banks or collect personal information from other organizations and use it to steal someone’s identity, he said.
“That’s why there’s such a big business around hacking systems,” Rivers said.
About 6,563 cybercrimes in Georgia were reported to the FBI’s Internet Crime Complaint Center in 2010, which Rivers said is significant; the country’s worst year for hacking was 2008.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hollywood Celebrities Nude Photo Hacker Sentenced to 10 Years in Prison

Hollywood Celebrities Nude Photo Hacker Sentenced to 10 Years in Prison 

Photo hacking case of Hollywood celebrities takes another direction, as Christopher Chaney, who pleaded guilty to hacking into the e-mail accounts of Scarlett Johansson and other celebrities including Mila Kunis, Christina Aguilera and few others, has been sentenced to 10 years in prison by the  federal judge in Los Angeles. Chaney was arrested last year as part of a year-long investigation  of FBI dubbed Operation Hackerazzi. At a hearing on Monday, U.S. District Court judge S. James Otero said that Chaney's conduct demonstrated a "callous disregard to the victims," some 50 in total, including two non-celebrities who the judge noted was stalked by Chaney for more than 10 years. The prison term was accompanied by an order to pay $66,179 in restitution. Chaney pleaded guilty to nine offences, including illegal wire-tapping and unauthorized access to computers. In his guilty plea, Chaney admitted to having repeatedly hacked email accounts over a period of at least eleven months. He hacked into email accounts by taking advantage of the "forgotten password" feature on web interfaces and using publicly available information to answer security questions. 
Chaney admitted that as his hacking scheme became more extensive, he began using a proxy service called “Hide My IP” because he wanted to “cover his tracks” and not be discovered by law enforcement agents. Even after his home computers were seized by law enforcement, Chaney used another computer to hack into another victim’s e-mail account. As a result of his hacking scheme, Chaney obtained private photographs and confidential documents, including business contracts, scripts, letters, driver’s license information, and Social Security information. On several occasions, after hacking into victims’ accounts, Chaney sent e-mails from the hacked accounts, fraudulently posing as the victims and requesting more private photographs. Chaney e-mailed many of the stolen photographs to others, including another hacker and two gossip websites. As a result, some of the stolen photographs were posted on the Internet.
"I don't know what else to say other than I'm sorry," Chaney said. "I could be sentenced to never use a computer again and I wouldn't care." For detailed information about this case click here.







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Sun Email Is Still Under Control Of Lulzsec


"The ironic twist will be that my own friends will take me down and not these idiots who hide behind the patriot veil," said Sabu. However, despite the very real possibility that his former hacking mates will expose him, Sabu doesn't plan to stop hacking or go into hiding. "I'm at the point of no return. Not trying to sound like a bad ass, however, it's the truth," he concluded.
The 4GB worth of email stolen by the LulzSec hacking group from The Sun tabloid site earlier this year are sitting on a server in China, according to "Sabu," the outfit's alleged leader.
"We got them stashed on a Chinese storage server. Alongside the dumps of a whole bunch of hits we did," Sabu said during a question and answer session held on Reddit this weekend. LulzSec kept corporate IT security departments on their toes for weeks back in May and June when the group randomly attacked many companies for fun.
The hacking group said they disbanded on June 26, after 50 days of mayhem that left thousands of innocent users with their personal information and passwords exposed, only to re-emerge a month later. On July 18, at a time when new revelations were being made in the News of the World phone hacking case, LulzSec attacked its sister publication, The Sun. The hackers managed to post a fake story on the newspaper's website and claimed to have copied its email database.
The group originally intended to publish the email, but later decided against it, allegedly because they could have badly affected the court case against those involved in the scandal. It's not clear if the messages will be released when the case is over and who else except Sabu has access to them.
For a while LulzSec seemed to be one step ahead of the authorities, its members apparently confident that they couldn't get caught. However, several people associated with the group were eventually identified and arrested.
Such was the case with Jake Davis, an 18-year-old teenager from the U.K., who used the online alias "Topiary" and played a spokesperson role within LulzSec and Anonymous. "I miss Topiary. We became brothers," said Sabu during the Reddit Q&A session. "Lost too many friends. Will probably never talk to them ever again," he added.
Last month the FBI arrested a 23-year-old man from Tempe, Ariz., named Cody Kretsinger who is believed to be a former LulzSec member known as "recursion." Sabu claims that arresting recursion was probably the closest authorities got to him.
It's not clear if by closest he refers to his location or to information that could lead to him being caught. He remains defiant and doesn't believe that the FBI can catch him without help.



-News Source (Computer World)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous Member Arrested In Serbia

Anonymous Member Arrested In Serbia
Serbian authorities confirmed that they have arrested a member of the Anonymous hacking group in the Balkan country. Prosecutor Branko Stamenkovic has told the media that the suspect was involved in a hacking attempt on several official websites earlier Thursday. Stamenkovic says police have raided homes of several people and found "evidence of criminal activity." He says the arrested suspect faces charges of cyber sabotage and up to five years in prison if convicted. A group calling themselves Anonymous Serbia have recently surfaced in the Balkan country. They have claimed responsibility for the hacking of the sites of a commercial television station and a popular folk show.
It seems that the time is not going good for hacker collective Anonymous. Few days ago key members of Lulzsec and Anon get busted by FBI. It is reported that the arrests were made possible after turning the group’s "senior leader", Hector Xavier Monsegur aka "Sabu", 28, who is believed to be a cooperative witness after the FBI turned him last June. Earlier in this month Interpoll arrested 25 suspected Anonymous hacker as part of Operation Unmask. In February three Greek teenagers have been arrested for hacking into the Ministry of Justice website, also in January a 22 year aged student arrested in south-western Poland for allegedly hacking the prime minister's website and local authority said that he was a part of Hactivist Anonymous. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The Karachi Press Club’s website got hacked


The Karachi Press Club’s website www.karachipressclub.com had been hacked on Monday and its pages defaced by hackers who claimed in their messages that they were Indian and were known by their alias “IMMORTALS”. They posted a ‘Jai Hind’ cry on the website after redoing it in a matrix like screen. The defaced page looked similar to the defacing Pakistani hackers had done to the website of India’s Central Bureau of Investigation in early December 2010. Both countries have had a rich history of tit-for-tat website hacking that has seen internet security companies on both sides of the border stretched to the limit.
Hacking attacks had grown in number and intensity with Pakistani hackers breaking into the Indian CBI website which started off a mini war as Indian hackers retaliated, hacking in to 36 Pakistani websites. In March of this year, the official website of Pakistan Muslim League –N was hacked and defaced, with the hackers calling on the party leaders to end corruption. The attack, contrary to tradition, was not claimed by any hacker group. Oddly though, the homepage was defaced in a manner similar to the earlier CBI website and the current Karachi Press Club website. 

Retaliation
The Pakistani ‘tat’ came mere hours after the Indian ‘tit’, with a Pakistani hacker group “KhantastiC  Haxor”, hacking into an Indian website www.pressclubofindia.org , and posting a note on its now defaced homepage. The message from the Pakistani hacker group claimed that their retaliatory hack was a warning to Indian hackers to stop hacking Pakistani sites. KhantastiC Haxor claimed that they did not harm any site component, nor was it their intent to leak information contained within the website.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...