Showing posts with label HACKERS. Show all posts
Showing posts with label HACKERS. Show all posts

Tuesday, December 22, 2015

Top 6 Black Hat Hackers In The World


There are two types of hackers. First one are good hackers who are known as “white hat” hackers and another one which we will be talking about today are called “black hat” hackers.
In this post, I will talk about six famous black hat hackers and their hacks which made them famous or wanted.

1. George Hotz

George Hotz
Young and talented and what is the most important bored teenager, George Hotz wanted to have fun one summer night and as a result he hacked the Sony’s company Iphone. It happened in June of 2007, by that time George was 17. It was a bit of a challenge, because how to hack device with assistant things? The secret is to figure out how “to speak to the device”. He also mentioned that what he did was completely legal. It seems people can be dangerous in certain way when they are bored. Who knows what may happen if crazy smart geek will find thy way of his ideas.

2. Kevin Mitnick

Kevin
Kevin Mitnick is well-known as the most-wanted computer criminal in the United States. He was in high school when he started hacking. For several years he hacked dozens ofcompanies. What interesting, for those “services” he was finally arrested in 1995 at his apartment for hacking. Kevin also has served 5 years in prison, nevertheless despite of his experience he runs his own security firm named Mitnick Security Consulting. The other side of the coin is, however Mitnick published a book that calls “Ghost in Wires”, which is about his upps-and-downs, victories and crushes. He shared that every hack was like a climbing to mountain and he reached the Everest. This is one more proof how talent have pined, because of a boredom.

3. Adrian Lamo

Adrian  
Adrian was called as the most effective and controversial hacker of the 21st century. That is very flattering status. He was famous for breaking into several high-profile computer networks. Lamo might use his gift to help people to consult, what is actually he did, but as exception and compromise. His baby steps in hacking, Adrian Lamo made pretty early and became known for the first time for operating AOL watchdog site. As many others, he was arrested in 2003 and had to correspond for each and every computer crime.Thus, even if Lamo now works as a threat analyst and public speaker, his glory will always follow him, because our past if the part of our “present” and a part of who we are.

4. Gary McKinnon

Gary
This “black hat” McKinnon hacked into 97 United States military and NASA computers. He could be the biggest threat for government. Glasgow-born McKinnon wanted the truth to come out and show itself. In March 2002 Gary was arrested by police. “Black hat” used his hacking skills to “research” his beliefs and evidence of UFOs inexhaustible source of power, into the US government’s computers. He didn’t do that because of boredom, but because of obsession and thirst to hidden knowledge. Probably this computer crime is serious, but forgivable. Man wasn’t going to hack computer system because he was bored or to prove something, we was looking for truth no more than.

5. Jonathan James

Jonathan
Story of Jonathan James is sad, nevertheless his life can be compared to come t – short, but bright. In 1999 teenager at the age of 15 years old hacked into Bellsouth and Miami-Dade school network. Jonathan James damaged NASA Systems, it costed $41,000 to fix the systems. It goes without saying that he made serious damage. To stole software from NASA that worth $1.7 Million is one the biggest computer crimes. He wasn’t after information or justice, he was after money… As they say, never speak ill of the dead. Jonathan James was sentenced 6 months house arrest and banned from using computer, however that didn’t prevent him to commit suicide.

6. Kevin Poulsen

Kevin
This talented “cyber-terrorists” could have great career and almost blow his chance. It seems that this hacker likes contracts and his life reflects it pretty well. He hacked into the US Department of Defense’s Arpanet. However later he worked as a consultant testing Pentagon computer security. Late on Kevin hacked FBI, after that hacked phone lines to radio station of Los Angeles… Poulsen’s life reminded American switchbacks…Certainly he was wanted by FRI and finally they caught him. Despite of such interesting past, Kevin is law-abiding citizen and has several awards of International Academy of Digital Arts and Sciences.

Wednesday, November 4, 2015

Anonymous Hackers to Leak 1000 of KKK Members Details on Million Mask March (Nov 5, 2015)

Anonymous Operation KKK
The Online Hacktivist group Anonymous announced it plans to reveal the identities of about 1,000 Ku Klux Klan (KKK) members on 5th November, the day of the Global Protest movement known as the Million Mask March.
Million Mask March, where protesters don Guy Fawkes masks in hundreds of cities around the world, and march together against the corrupt Governments and corporations.
Ku Klux Klan (KKK) is classified as a White Supremacist Racist group by the Anti-Defamation League and the Southern Poverty Law Center, allegedly having total 5,000 to 8,000 members.

Tuesday, November 3, 2015

Using DroidJack Android RAT Will Put You In Jail


DroidJack is an Android RAT (Remote Administration Trojon) tool used by hackers to steal or record data on injected Android smartphones.
DroidJack can be used to remotely access Android device from a computer and remains hidden from the device owner. It is available on internet for $210/£137 and it is also one of the hottest Android RAT tool on the market, mainly used in Middle East region which affects Android users only.
DroidJack has cool features such as:
  • GPS tracking
  • Send, delete, view SMS
  • View contacts, call logs and make a phone call
  • View history browsers and bookmarks
  • Open an app
  • Turn ON/OFF camera and microphone
According to the spokesman said to BBC that,” A 28-year-old male from Carlisle under suspicion of computer misuse act offences,” this arrest was made in connection with the international DroidJack operation and he has been bailed next 6 months.
Police have raided 13 houses in Germany and one man was arrested in the UK (United Kingdom). Germany suspects that 19 – 51 aged people are involved in DroidJack.
Conclusion: Buying DroidJack Android RAT and installing in on victims device without their permission will put you in danger of being arrested by police.


Friday, May 18, 2012

Askar Sukarelawan Siber Malaysia

Gambar dari myMetro


Perangi penggodam
Oleh Gaddafi Musli
gaddafi@hmetro.com.my


IPOH: Menubuhkan askar sukarelawan siber diterajui belia mempertahankan sistem komputer negara daripada ancaman penggodam luar antara resolusi dicapai pada Malaysian Cyber Conference (MCC) 2012 yang dihadiri 110 peserta terdiri daripada belia dan pengamal siber, di sini.
Pengarah Projek MCC, Afnan Afiq Alias berkata, isu keselamatan siber khususnya laman web rasmi kerajaan harus diambil perhatian berikutan kes penggodaman yang semakin serius.

“Dengan adanya sukarelawan siber, ancaman seperti ini dapat ditangani dengan lebih pantas di samping membantu agensi keselamatan siber menangkis serangan penggodam berniat jahat,” katanya.
Menurutnya kepakaran penggodam sering dipandang negatif berikutan tindakan beberapa pihak yang sering melakukan ‘defacement’ atau mengubah paparan utama laman web kerajaan.

“Pada pandangan saya, mereka sebenarnya hanya mahu mendedahkan kelemahan sistem keselamatan laman terbabit dan tidak mengganggu data yang disimpan. “Bayangkan jika pihak luar yang melakukan penggodaman dan menyalahgunakan data sulit yang disimpan,” katanya ketika ditemui.

Justeru, katanya, penubuhan pasukan ini perlu untuk membantu agensi kerajaan memantau keselamatan laman web mereka terutama yang menyimpan data sensitif.
Afnan memberi contoh kejadian godam membabitkan laman sebuah agensi penguat kuasa, baru-baru ini dengan data seperti pendapatan mengikut negeri didedahkan penggodam tidak bertanggungjawab.

“Saya menyeru belia khususnya yang mempunyai kepakaran godam menyertai MCC dan menjadi sebahagian daripada benteng pertahanan sistem keselamatan siber negara,” katanya.
Sementara itu, Presiden Gerakan Belia Teknologi Informasi (ITYM), Khaireel Azlee Abdul Aziz yang juga antara tulang belakang MCC menjelaskan, tanggungjawab sukarelawan siber bukan sekadar menjadi benteng malah membentuk polisi membabitkan teknologi Komunikasi informasi (ICT) dan belia.

“Golongan ini dapat membantu kerajaan dengan memberikan maklum balas, cadangan serta kehendak mereka memudahkan proses penggubalan polisi,” katanya.

Turut diadakan dalam program berkenaan, forum yang membincangkan fenomena godam serta implikasinya terhadap masyarakat selain perbincangan bersama mengenai kaedah keselamatan siber.


**wahhhh..camney cara mok join tok?? (^_^) best!! best!! Pasukan ASSM

Friday, April 20, 2012

Message from Anonymous: Music has changed!!!



Published on Mar 4, 2012 by
It is time for a change in online music.

Links:
http://www.anontune.com/

Article from wired.com : 


Anontune: The New Social Music Platform From Anonymous In a move sure to attract attention from the music industry, a small group of coders claiming to be part of Anonymous is putting together a social music platform. The rather ambitious goal: Create a service that seamlessly pulls up songs streaming from all around the internet.
The project, called Anontune and still in its infancy, is designed to pull songs from third-party sources like YouTube and let anonymous users put them into playlists and share them — while keeping the service from being shut down by music industry lawsuits.
Reached by e-mail, one of the creators of Anontune told Wired the project was started by a group of anons who met online six years ago on what was then an underground hacking site. The group, mostly focused at the time on “cracking,” began discussing music, favorite artists and what they would do to fix current music business models.
“We would say stuff like, ‘People really use YouTube as a music player yet it really sucks for that purpose … it’s too unorganized,’” the anon wrote to Wired. “And then, ‘YouTube does make a good music player but you can’t play all your songs on it since the obscure ones aren’t uploaded,’ then eventually, ‘Hmmm, what if you were to combine music websites like Myspace, Yahoo, YouTube and others?’”

On the ever-sprawling internet, music can pop up anywhere — Tumblr pages, blogs, The Hype Machine (to name but a few). Almost any song is available at any time, whether posted by legitimate sources or uploaded by fans or pirates, and Anontune would tap into that rich reservoir.
It wouldn’t be the first time Anonymous squared off with the record industry: When popular file-sharing site Megaupload was shuttered by the Justice Department in January, Anonymous retaliated by attacking the websites of the Recording Industry Association of America and the DoJ. The DDoS attacks provide an undeniable look at what Anonymous can do in a copyfight, but if the creators of Anontune succeed, they could make something far more disruptive to the music industry.
The Anontune concept remained nothing more than talk until one day in early December, when an anon posted a link to Anontune and said he planned to make their ideas a reality. The others looked at the site. Although it wasn’t very good, the working prototype got enough people interested in the project that they “formed a team that day and stopped hacking,” the anon said.
The platform has been in development for just a few months, according to the video above (titled “Message From Anonymous: Music Has Changed”). Although Anontune is still very rudimentary, the service is meant to improve the way music is played online.
“It has come to our attention that the state of online music has been sabotaged by the fat hands of corporate involvement,” the Anontune video’s voiceover states. “These changes have led to a world in which your enjoyment of music is controlled and billed by the minute.”
Anontune pulls in music from various sources around the web.
Screengrab: Wired

How Anontune Works (And a Word of Caution)

Anontune works by automating what most people do online manually. After setting up an account, users can build playlists by simply typing in the names of songs they want to hear, or they can choose from the names of songs imported from their iPods. Anontune’s “music engine” — which runs in a user’s browser — then finds the songs on the web. Currently most of the tracks come from YouTube and SoundCloud, but there are plans in the works to add Yahoo Music, Myspace Music, Bandcamp and others. From there, users, of which there are currently fewer than 1,000, just press play.
(A word of caution to curious readers: The system relies on executing a Java applet. Unless you are extremely trusting or using VMWare, you should think very carefully about running code on your machine that was written by members of Anonymous.)
The stated central aims of the service’s creators are to provide a flexible, open platform for users to listen to music without having to pirate it or face legal repercussions — read Anontune’s white paper here (.pdf). True to form, users of the service can largely remain anonymous.
Although the site is still very crude and its origins obscure, the idea of Anonymous — even a few far-flung members of the group — tackling online music is compelling. But Anontune could come into the world with a target on its back, even if it operates using completely legitimate methods, according to Electronic Frontier Foundation attorney Corynne McSherry.
“What we’re seeing here is a situation where the government is getting much more involved in enforcement, and we know that the U.S. government doesn’t like Anonymous all that much anyway,” McSherry said in an interview with Wired. Other music services can attempt to cut deals with music labels to avoid legal hot water, but that’s not really an option here.
“I think content owners, if they feel like the site is a really viable site, they’re going to be pretty nervous [about this],” McSherry said. “Because they like to have people that they can make deals with, and there’s no one to make a deal with in this situation.”
It’s hard not to notice that Anontune is popping up just as the U.S. government’s case against Megaupload is getting heated. Even though Anontune’s creators say the service isn’t a rebuttal to the shuttering of the file-sharing service, its timely unveiling could serve as a model for a different way for Anonymous to respond to incidents (as opposed to, say, directing Low Orbit Ion Cannons at the website of the Recording Industry Association of America).
“The project is not so much a response to Megaupload but a response to the tycoons from the RIAA shutting down music services,” the anon wrote to Wired. “You may have heard about what Anonymous has done in Operation Payback. We believe the underlying reasons for the revolt were (mostly) correct, however their approach is unlikely to change anything in the long run.”
When asked about Anontune by Wired, an RIAA spokesman declined to comment.
Anontune’s creators hope that in its complete version — it’s only about 20 percent there so far, our source said — the service can improve the way people engage with music.
“We have a lot of plans regarding this,” the Anontune co-creator told Wired. “The development of software to assist in achieving musical peak experiences, illumination of the functions and roles of music, psychometric testing based on music preference. It’s all there and this is possibly the most interesting part of the whole project.”
Anontune’s technical aspects can be reviewed online, and the site’s operators are taking donations. Even though its creators are still hurriedly trying to get the service up to snuff, the site has massive goals. One only needs to look at the final note on the above clip’s YouTube page to get a taste.
“We need to think bigger,” it reads. “This is Operation Mozart.”

repost from  http://www.wired.com/underwire/2012/04/anontune-anonymous/?utm_source=googleplus&utm_medium=socialmedia&utm_campaign=googleplusclickthru

Monday, January 23, 2012

Anonymous is Back!!!

Anonymous

By Casey Chan @ gizmodo.com

Anonymous Just Deleted CBS.com and Took Down Universal

Taking a shorter break than their last vacation, Anonymous is back at it already. Reports are coming in that they had completely knocked out CBS.com and are continuing their revenge spree. The CBS takedown wasn't your regular DDoS attack because if you went to CBS.com at the time Anon attacked it, there was nothing except an index page with a single file. That's it. Basically, Anonymous gained access to CBS.com and deleted EVERYTHING.
CBS.com

CBS.com has managed to put itself back up but we'll be on the lookout of Anonymous' next move. This is going to be interesting. Last time Anon went on a revenge spree, well, the DOJ, RIAA, MPAA, Universal, EMI, FBI and others all got a piece of the takedown fun. Update: Looks like they just took down UniversalMusic.com again too!

Update 2: Anon is now going after websites in Brazil. The Hacker News reports that websites of Brazil's federal district, the city of Tangara da Serra and popular Brazilian singer Paula Fernandes have been brought offline in a DDoS attack. Anonymous' message on the affected websites? "If Megaupload is down, you are down too."

Update 3: Vivendi, a French media company involved in music, film, TV, video games, etc., has been brought down too. Vivendi used to own Universal.
More stories at http://gizmodo.com

Wednesday, January 4, 2012

Hi I'm 0xOmar from Group-xp..Largest Wahhabi Hacker Group Of Saudi Arabia


400000 Israeli Credit Cards & Information Leaked by Saudi Arabia Hackers

Hacker says "We daily use these cards to solve our problems, purchasing VPNs, VPSes, softwares, renting GPU clusters, renting cloud servers and much more!". They Claim themselves as part of Anonymous hacking Group from Saudi Arabian. "my goal is reacing 1 million non-duplicate people, which is 1/6 of Israel's population." He said.
Hacker named "0xOmar" from group-xp, largest Wahhabi hacker group of Saudi Arabia claim to Hack lot of Israeli servers, lot of information about Israeli people including their name, address, city, zipcode, Social Security Numbers (Israeli IDnumbers), mobile phone number, home phone number, credit card number (including exp year, month and CVV). According to announcements from the credit card companies, 6,600 of the stolen cards belong to Isracard Ltd., 4,000 to Leumi Card Ltd., and 3,000 to Israel Credit Cards-Cal Ltd. (ICC-Cal) (Visa).

Quick Description of Leaked Data at Pastebin:
  • 4000.htm, it includes 4000+ credit cards and all needed information. All is Israeli.
  • 27000.htm, it includes 27000+ credit cards and all needed information. All is Israeli.
  • Cards1.mdb, it includes 260272 credit cards and all needed information. It includes address, emails and passwords of 260272 Israeli people.
  • Cards2.mdb, it includes 120745 credit cards and all needed information. It includes address, emails and passwords of 120745 Israeli people.
  • IsraCards1.txt, it includes 184 working fresh Israeli credit cards and all needed information.
  • Business.mdb, it includes 22604 Israeli business people details, including, names, addresses, phone numbers, passwords, etc.
  • Judaism.txt, it includes 65 Zionist people who purchased stuff from Judaism web site
  • TblDonate.htm, it includes 500+ people who donated to Israeli Zionist Rabbis.
In response to the cyber attack, Dov Kotler, CEO of Isracard, a unit of Bank Hapoalim said that the credit-card user details that appeared on the page were mostly incorrect or belonged to the cards that were deactivated long ago. The leaked data also contains numerous repeated entries. The credit card companies immediately blocked all the cards on the list and assured the customers that money used to buy from these cards will be duly returned.