Any Hackers Here ?

Discussion in 'General Chat' started by priyakochin, Jul 10, 2008.

  1. #1
    Any hackers here at DP ?

    I am thinking of forming an anti-hacker group for helping web masters.
     
    priyakochin, Jul 10, 2008 IP
  2. ja1myn

    ja1myn Banned

    Messages:
    137
    Likes Received:
    2
    Best Answers:
    0
    Trophy Points:
    0
    #2
    I like your idea, and no, I'm not a hacker. In fact, I can't stand computer programming/coding.
     
    ja1myn, Jul 10, 2008 IP
  3. vinay121078

    vinay121078 Active Member

    Messages:
    508
    Likes Received:
    2
    Best Answers:
    0
    Trophy Points:
    53
    #3
    priya, your idea is good, but who come forward to give their names? If so Great.
     
    vinay121078, Jul 10, 2008 IP
  4. priyakochin

    priyakochin Banned

    Messages:
    4,740
    Likes Received:
    138
    Best Answers:
    0
    Trophy Points:
    0
    #4
    I am having some experience in security.
    before two years I was in to that.
     
    priyakochin, Jul 10, 2008 IP
  5. real_skinner

    real_skinner Notable Member

    Messages:
    2,400
    Likes Received:
    61
    Best Answers:
    0
    Trophy Points:
    215
    #5
    What kind a hacker you are looking for?

    If ever you will form this org please let me know if there is anything I can contribute.

    Currently I am a VB.net Programmer for 3 years now.
     
    real_skinner, Jul 10, 2008 IP
  6. Emie.

    Emie. Banned

    Messages:
    1,263
    Likes Received:
    45
    Best Answers:
    0
    Trophy Points:
    0
    #6
    They'll all be here confessing soon enough, I'm sure.
     
    Emie., Jul 10, 2008 IP
  7. C.Whyte

    C.Whyte Peon

    Messages:
    802
    Likes Received:
    18
    Best Answers:
    0
    Trophy Points:
    0
    #7
    Probably anyone worth talking too won't speak up (my thoughts)
     
    C.Whyte, Jul 10, 2008 IP
  8. desertst0rm

    desertst0rm Peon

    Messages:
    330
    Likes Received:
    4
    Best Answers:
    0
    Trophy Points:
    0
    #8
    Most of the sites got hacked were from Microsoft servers. More than 32k Microsoft servers was hacked since January. I think it will be much better if you create a guide to avoid being hacked than creating a group of anti-hacker.

    BTW! What kind of hacker are you looking for?
    JOKE :D
     
    desertst0rm, Jul 10, 2008 IP
  9. Rohit patel

    Rohit patel Prominent Member

    Messages:
    15,770
    Likes Received:
    735
    Best Answers:
    0
    Trophy Points:
    310
    #9
    Well I think this is a great idea because he can save webmaster by providing Anti Hacking service.:)
     
    Rohit patel, Jul 10, 2008 IP
  10. chandan123

    chandan123 Prominent Member

    Messages:
    11,586
    Likes Received:
    578
    Best Answers:
    0
    Trophy Points:
    360
    #10
    so many hackers are there but it seems they are behind DP profiles , paypals :(

    anyway good idea to form an anti hackers group :)
     
    chandan123, Jul 10, 2008 IP
  11. xmartel

    xmartel Active Member

    Messages:
    1,009
    Likes Received:
    11
    Best Answers:
    0
    Trophy Points:
    78
    #11
    I like the idea, good luck with it.
     
    xmartel, Jul 10, 2008 IP
  12. Mr.Boss

    Mr.Boss Banned

    Messages:
    100
    Likes Received:
    0
    Best Answers:
    0
    Trophy Points:
    0
    #12
    i agree good idea..
     
    Mr.Boss, Jul 11, 2008 IP
  13. deb0and

    deb0and Active Member

    Messages:
    141
    Likes Received:
    1
    Best Answers:
    0
    Trophy Points:
    53
    #13
    The problem is you have under estimtated what you are wanting. Most hackers are now white hat or reformed so basically can you trust a reformed hacker? The best break the law get caught and then reform bu they still are a criminal, most take up penetration testing jobs for large firms or start their own consultancy firm. The best "hackers" that are around and not caught will not post on forums or apply to help you for the simple reason you have used the wrong term "hackers"
     
    deb0and, Jul 11, 2008 IP
  14. Abhik

    Abhik ..:: The ONE ::..

    Messages:
    11,337
    Likes Received:
    606
    Best Answers:
    0
    Trophy Points:
    410
    Digital Goods:
    2
    #14
    Wise Idea.. But I guess no one gonna disclose their real identity. :(
     
    Abhik, Jul 11, 2008 IP
  15. Lurznm

    Lurznm Banned

    Messages:
    683
    Likes Received:
    12
    Best Answers:
    0
    Trophy Points:
    0
    #15
    Great, and what would you call your group then?
     
    Lurznm, Jul 11, 2008 IP
  16. priyakochin

    priyakochin Banned

    Messages:
    4,740
    Likes Received:
    138
    Best Answers:
    0
    Trophy Points:
    0
    #16
    Hackers means white hat and black hat hackers are called crackers.
    :p
     
    priyakochin, Jul 11, 2008 IP
  17. deb0and

    deb0and Active Member

    Messages:
    141
    Likes Received:
    1
    Best Answers:
    0
    Trophy Points:
    53
    #17
    Very good :D its nice when someone knows the difference, but dont forget about the grey hats. Basically i am saying you got to be careful even with white hats because from a company point of view you are giveing away all your security measures its a question of TRUST.
     
    deb0and, Jul 11, 2008 IP
  18. deb0and

    deb0and Active Member

    Messages:
    141
    Likes Received:
    1
    Best Answers:
    0
    Trophy Points:
    53
    #18
    you will also find most web hacking is performed by the script kiddies using automated tools. They may know how to use them but the are not smart enough to know how its used and the inner workings.
     
    deb0and, Jul 11, 2008 IP
  19. priyakochin

    priyakochin Banned

    Messages:
    4,740
    Likes Received:
    138
    Best Answers:
    0
    Trophy Points:
    0
    #19
    Yeah we have to consider everything.But can anyone come forward to lead this group ?
     
    priyakochin, Jul 11, 2008 IP
  20. deb0and

    deb0and Active Member

    Messages:
    141
    Likes Received:
    1
    Best Answers:
    0
    Trophy Points:
    53
    #20
    I think if you want some one to lead the group you may need to look further afield, maybe look around some security forums. You will need someone with a great deal of experience, more importantly real world experience.

    I may be wrong but i suspect the knowledge required for this may be out of reach in this forum.

    You need some one with the most of these skills, you may need a few leaders who specialise in certain areas. You really are entering a world of its own my friend.



    - Understanding Ethical Hacking
    - Intro to reconnaissance phase
    - Understanding footprinting
    - Scanning & Footprinting Tools
    - Scanning & Footprinting Books
    - Understanding port scanning
    - Discovering the OS system
    - Discovering services running
    - Understanding enumerations



    - Understanding Web Security
    - Password Hacking & Security
    - IIS web Server Security
    - Web Security Tools
    - Web Security Books
    - Apache Web Server Security
    - SQl injection & Security
    - Cross-Site Scripting (XSS)
    - Web Application Security
    - Authentication & Sessions
    - Prevention & Countermeasures




    - Windows System Security
    - Cracking Passwords
    - Password Recovery
    - Hardware Security
    - Registry Security
    - Win & Networking Tools
    - Win & Networking Books
    - Cisco Security & Hacks
    - Intrusion detection
    - Firewalls & Honeypots
    - Ip Changing & Security
    - Spyware & Anti-Virus Sec




    - Understanding sniffers
    - Packet capturing
    - MAC flooding & ARP poisoning
    - How session hijacking works
    - Sniffing & Hijacking Tools
    - Sniffing & Hijacking Books
    - Spoofing attacks & Security
    - Many Sniffing countermeasures




    - Denial Of Service Attacks
    - Distributed Denial Of Service
    - Types of denial of attacks
    - Tools for running DOS attacks
    - Tools for running DDOS attacks
    - Denial Of Service Books
    - Denial of Service Countermeasures




    - What is Social Engineering
    - Policies and Procedures
    - Online Social Engineering
    - Social Engineering Books
    - Who is Kevin Mitnick
    - The Common Types of Attack
    - Best collection of Ezines
    - Social Engineering Countermeasures




    - Understanding Wireless Security
    - Introduction to 802.11
    - 802.11 Wireless Networks
    - Introduction to WEP
    - How to Find WLANs
    - Cracking WEP Keys
    - Wireless DoS attacks
    - Wireless Security Books
    - Wireless Security Tools
    - Wireless Hacking Tools
    - WEP Key Encryption
    - Securing Wireless Networks




    - Coding Skills Required
    - Windows Programming
    - What is API Coding
    - Linux Programming
    - Open Source Coding
    - ASM, CGI & Perl
    - C/C++, Java & PHP
    - What is Secure Coding
    - HSC Coding Library
    - Reverse Engineering
    - What is a Buffer Overflow
    - Writing your own exploits
    - Understanding Stacks
    - Defense from Buffer Overflows
    - Understanding shellcodes
    - Writing Exploits
    - Coders Professional Books




    - Understanding Viruses
    - Viruses different forms
    - Viruses & Worms Books
    - How Anti-Viruses Work
    - How worms spread & infect
    - Viruses Codes and Tools
    - History of viruses & worms
    - Protection against viruses




    - Introduction to Linux
    - Linux file structure
    - Linux Networking
    - Basic Linux commands
    - How Linux is hacked
    - Rootkits for Linux
    - Compiling Programs on Linux
    - IP Chains and IP Tables
    - Linux Security Tools
    - Linux Security Books
    - Types of Platforms
    - Linux Security Methods




    - Introduction to Encryption
    - Encryption Cracking Techniques
    - Types of Encryptions
    - Understanding hashing
    - Know how MD5 works
    - Basic cryptographic attacks
    - Art of steganography
    - SSH, RSA, PGP, SSL & SHA
    - Algorithm coding
    - Rainbow Tables & Cracking
    - Cryptographic Defence
    - Cryptographic Tools
    - Cryptographic Books
    - Online anonymity
    - Anonymous surfing Tools
    - Understanding Proxy




    - Understanding Trojan horses
    - Understanding Backdoors
    - Understanding Rats
    - Trojan infection mechanisms
    - Intro to keyloggers
    - Overview of Trojan tools
    - Security Tools
    - Trojan & Rats Books
    - How to write your Trojan
    - How to remove a Trojan
    - What are logic Bombs
    - Windows Rootkits
    - Trojan & Rat Encryptions
    - Types of Attack Methods
    - Trojans & Rats Countermeasures
     
    deb0and, Jul 11, 2008 IP