What kind a hacker you are looking for? If ever you will form this org please let me know if there is anything I can contribute. Currently I am a VB.net Programmer for 3 years now.
Most of the sites got hacked were from Microsoft servers. More than 32k Microsoft servers was hacked since January. I think it will be much better if you create a guide to avoid being hacked than creating a group of anti-hacker. BTW! What kind of hacker are you looking for? JOKE
so many hackers are there but it seems they are behind DP profiles , paypals anyway good idea to form an anti hackers group
The problem is you have under estimtated what you are wanting. Most hackers are now white hat or reformed so basically can you trust a reformed hacker? The best break the law get caught and then reform bu they still are a criminal, most take up penetration testing jobs for large firms or start their own consultancy firm. The best "hackers" that are around and not caught will not post on forums or apply to help you for the simple reason you have used the wrong term "hackers"
Very good its nice when someone knows the difference, but dont forget about the grey hats. Basically i am saying you got to be careful even with white hats because from a company point of view you are giveing away all your security measures its a question of TRUST.
you will also find most web hacking is performed by the script kiddies using automated tools. They may know how to use them but the are not smart enough to know how its used and the inner workings.
I think if you want some one to lead the group you may need to look further afield, maybe look around some security forums. You will need someone with a great deal of experience, more importantly real world experience. I may be wrong but i suspect the knowledge required for this may be out of reach in this forum. You need some one with the most of these skills, you may need a few leaders who specialise in certain areas. You really are entering a world of its own my friend. - Understanding Ethical Hacking - Intro to reconnaissance phase - Understanding footprinting - Scanning & Footprinting Tools - Scanning & Footprinting Books - Understanding port scanning - Discovering the OS system - Discovering services running - Understanding enumerations - Understanding Web Security - Password Hacking & Security - IIS web Server Security - Web Security Tools - Web Security Books - Apache Web Server Security - SQl injection & Security - Cross-Site Scripting (XSS) - Web Application Security - Authentication & Sessions - Prevention & Countermeasures - Windows System Security - Cracking Passwords - Password Recovery - Hardware Security - Registry Security - Win & Networking Tools - Win & Networking Books - Cisco Security & Hacks - Intrusion detection - Firewalls & Honeypots - Ip Changing & Security - Spyware & Anti-Virus Sec - Understanding sniffers - Packet capturing - MAC flooding & ARP poisoning - How session hijacking works - Sniffing & Hijacking Tools - Sniffing & Hijacking Books - Spoofing attacks & Security - Many Sniffing countermeasures - Denial Of Service Attacks - Distributed Denial Of Service - Types of denial of attacks - Tools for running DOS attacks - Tools for running DDOS attacks - Denial Of Service Books - Denial of Service Countermeasures - What is Social Engineering - Policies and Procedures - Online Social Engineering - Social Engineering Books - Who is Kevin Mitnick - The Common Types of Attack - Best collection of Ezines - Social Engineering Countermeasures - Understanding Wireless Security - Introduction to 802.11 - 802.11 Wireless Networks - Introduction to WEP - How to Find WLANs - Cracking WEP Keys - Wireless DoS attacks - Wireless Security Books - Wireless Security Tools - Wireless Hacking Tools - WEP Key Encryption - Securing Wireless Networks - Coding Skills Required - Windows Programming - What is API Coding - Linux Programming - Open Source Coding - ASM, CGI & Perl - C/C++, Java & PHP - What is Secure Coding - HSC Coding Library - Reverse Engineering - What is a Buffer Overflow - Writing your own exploits - Understanding Stacks - Defense from Buffer Overflows - Understanding shellcodes - Writing Exploits - Coders Professional Books - Understanding Viruses - Viruses different forms - Viruses & Worms Books - How Anti-Viruses Work - How worms spread & infect - Viruses Codes and Tools - History of viruses & worms - Protection against viruses - Introduction to Linux - Linux file structure - Linux Networking - Basic Linux commands - How Linux is hacked - Rootkits for Linux - Compiling Programs on Linux - IP Chains and IP Tables - Linux Security Tools - Linux Security Books - Types of Platforms - Linux Security Methods - Introduction to Encryption - Encryption Cracking Techniques - Types of Encryptions - Understanding hashing - Know how MD5 works - Basic cryptographic attacks - Art of steganography - SSH, RSA, PGP, SSL & SHA - Algorithm coding - Rainbow Tables & Cracking - Cryptographic Defence - Cryptographic Tools - Cryptographic Books - Online anonymity - Anonymous surfing Tools - Understanding Proxy - Understanding Trojan horses - Understanding Backdoors - Understanding Rats - Trojan infection mechanisms - Intro to keyloggers - Overview of Trojan tools - Security Tools - Trojan & Rats Books - How to write your Trojan - How to remove a Trojan - What are logic Bombs - Windows Rootkits - Trojan & Rat Encryptions - Types of Attack Methods - Trojans & Rats Countermeasures