Saturday, 22 September 2012



Top Indian Hackers | Real Hackers of India


There has been a lot of commotion in the Indian Hacking scene lately, and I expressed some pretty strong views regarding that. Long Live Indian HackersWhen it comes to hacking, every other guy tends to tape the "hacker" word with his name/codename without even realizing its significance. Then there is Facebook ...Have a look at it -

X hacker , Y hacker, big hacker, small hacker , cat hacker, mouse hacker, black hacker, white hacker. Seriously man..What were they thinking ?
Seriously guys..what were they thinking ?! I am still counting the number of “Indian Cyber Army” India has and the number of groups tend to increase recycling all the content, same VIP forums, same deface techniques, zero original research.  
Then there is Ankit Fadiya...dont let me even get started...

In the end tired of all the bullshit around, I decided to cover an article on the REAL INDIAN HACKERS (or Hackers of Indian Origin), folks who are actually dedicated to security and are hackers in real sense. Lets start, shall we ?

Pranav Mistry

Pranav Mistry - The famed 6th sense developer
The famed 6th sense developer,Pranav Mistry is a research assistant and a PhD candidate at MIT Media Lab.SixthSense has recently attracted global attention. Among some of his previous work, Pranav has inventedMouseless - an invisible computer mouse; intelligent sticky notes that can be searched, located and can send reminders and messages; a pen that can draw in 3D; and a public map that can act as Google of physical world. Pranav has commercialized his invention, the sixth sense and SixthSense is now being actively used at NASA. It is rumored that Facebook tried to acquire the technology from Pranav for a reportedly $2 billion and 5% ownership of Facebook, but Pranav decided to open source it instead.

Facebook tried to acquire the technology from Pranav for a reportedly $2 billion and 5% ownership of Facebook, but Pranav decided to open source it instead.
Thats what any real hacker do. Hats Off to him.
Here you can read more about him at Amarjit’s Blog


Koushik Dutta or “Koush”

Koushik Dutta - UnrEVOked Forever :)
“Set Your Phone Free..”
Rings a bell ? Koushik Dutta or “Koush” is responsible for Clockworkmod recovery and Rom Manager for Android rooting and the core member of famed UnrEVOked team. He has been a .net developer from heart and had his internship initially at Microsoft and is a former MVP. He decided to leave Microsoft and hack Android cellphones like there was no tomorrow. Sony approached him after geohot humped them like anything but he politely declined .

Sony approached him after geohot humped them like anything but he politely declined
Bravo for his efforts, we are able to root painlessly using UnREVOked.
Now only if UnrEVOked can release UnrEVOked 3.33 soon :)

Vivek Ramchandran

He was among the Top 10 Indian finalists in the Microsoft shootout competition among the list of 65000 participants.
Vivek Ramachandran has been working in the computer and network security domain, in some form or the other, for the past 7 years and has worked with Industry giants like Reliance, Cisco, Microsoft. He was among the Top 10 Indian finalists in the Microsoft shootout competition among the list of 65000 participants. Then he decided to join Airtight Networks and there discovered Caffe Latte attack attack along with his colleague MD Sohail Ahmad from Airtight Networks ,the wifi hacking technique that doesn't required you to be in active vicinity of the wifi zone. 

That said, he is one of the researcher to lookout.

Almost everybody at NULL Security Community & Garage4hackers
I said it before and I will say it again, the Only active Indian hacking community is NULL community, and the best Indian Hacking Forum where real hackers meet is garage4hackers.com hands on.

Only active Indian hacking community is NULL community
Shoutz to garage crew :)

Folks at Indian Honeynet Chapter
Now we are talking..Indian Honeynet chapter is the collaborative effort of the best geeks and hackers .The focus of honeypot is on Worms and Botnets and developing an Open Source tool to study and counter brute force attacks/ phishing through wifi. Its also being setup as potential web-app honeypot,and aims on improving detection and forensic techniques.  Heading the ship are L Shriram, K K Mookhey, Amit Chugh, Asim Jakhar and a lot of professionals who are dedicated in the field of computer security.


Hari Prasad
The famed security researcher Hari Prasad is the winner of EFF Pioneer award
The famed security researcher Hari Prasad is the winner of EFF Pioneer award, as he along with Alex Halderman, and Rop Gonggrijp were able to study an electronic voting machine (EVM) and found significant vulnerabilities that would not be difficult to execute. For his troubles, Prasad was arrested and jailed in August, held without bail in Mumbai for a week. Though he is now out on bail and in the United States, he still faces criminal prosecution for alleged theft of the EVM and other charges.

The genius of the Indian system is that instead of making machines tamper proof and more efficient, they arrested him.
According to the Indian news agency PTI, the magistrate who released Prasad on bail noted that "no offence was disclosed with Hari Prasad's arrest and even if it was assumed that [the electronic voting machine] was stolen it appears that there was no dishonest intention on his part...he was trying to show how [electronic voting] machines can be tampered with."


Jayant Krishnamurthy

Jayant Krishnamurthy

Jayant Krishnamurthy is a Ph.D. candidate in Computer Science, CMU and his interests include are machine learning, machine reading, common sense reasoning, information extraction, knowledge representation, and their applications in AI and NLP (shamelessly taken from his website). He is one of the researchers who are behind designing MD6 algorithm (yeah you heard it right, the evolution of MD5). He is a top level computer theorist and researcher and is a real life hacker. He teaches computer and network security and you must ahve a look at the problems and solutions at the given link.

For the lighter side,you can have a look at the funny flash movie based on his real life experiences at high school.


I guess, you now have an actual idea of the Indian hackers now :) These guys are real and are deemed worthy of having the hacker emblem with them.


Long Live Indian Hackers
All Rights Reserved by Pro Hack . Copyright 2008 - 20011. Template by Bloggermint .


Kyrion Digital Securities  Feedback Page

Kyrion Ethical Hacking Tutorials

kyrion-hacking-tutorials
Brought to you by Kyrion Hacking Tutorials
Kyrion Ethical Hacking Tutorials is a platform for the Techno-Geeks to exchange their ideas and knowledge in the vast and exciting field of Ethical Hacking and Information Security. You can interact with our reputed Trainers and know interesting facts about them too. We also allow you to post views and information on new-found technologies in this domain that you wish to share with others.
We also bring you a series of Free E-tutorials that would allow you to sit back at home and learn key concepts of Ethical Hacking and Cyber Security.
  • Working Of Zenmap ( Network Scanning Tool )
    June 10, 2012
    Zenmap is the official graphical user interface (GUI) for the Nmap Security Scanner. It is a multi-platform, free and open-source application designed to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles [...]
       
  • Top 10 DOS Attack Tools
    June 7, 2012
    List Of Top 10 DOS Attack Tools : 1.    Jolt2 2.    Bubonic.c 3.    Land and Latierra 4.    Targa 5.    Blast 2 0 6.    Nemesy 7.    Panther 2 8.    Crazy Pinger 9.    Some Trouble 10.    UDP Flood
       
  • WebScarab 5: XSS Haunt
    June 4, 2012
    Today in this tutorial we will discuss about the xss attack using the WebScarab , I’ll introduce to you first with the (XSS)  Cross-Site Scripting is a type of computer security vulnerability typically found in Web applications (such as web browsers through breaches of browser security) that [...]
       
  • WebScrab 4: Web Fuzzing
    June 2, 2012
    Now in this tutorial focus on another great function within Webscarab that is  fuzzing. I define fuzzing as testing the input of an application by trying various parameters that the input may not expect. These parameters don’t have to be random, in my opinion it’s best when you tailor your [...]
       
  • WebScarab 3: Session ID Analysis
    May 31, 2012
    In this tutorial we focus on session ID analysis. If you are not familiar with session ID’s I’ll do a quick explanation. HTTP is a stateless protocol, so it’s equivalent to walkie talkies or CB radios. You’ll send a request and wait for a reply, you don’t have a constantly open communication line [...]
       
  • Web Scarab 2: Proxy
    May 29, 2012
    In this tutorial I’ll tell you about some basic s of HTTP proxy in the WebScarab. HTTP Proxy is very useful when you have to do the Vulnerability assessment of web application, it allows you to record the whole request data packet and respond data packet and after that you can analyze the incoming [...]
       
  • Web Scarab 1: Introduction
    May 29, 2012
    WebScarab is a framework for analyzing web application which is written in Java, so that’s why it is portable to many platforms. WebScarab communicates by using HTTP and HTTPS protocols. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, [...]
       
  • Access Banned Torrent and Video Sites in India
    May 28, 2012
    Some of the ISPs in India have already started blocking torrent websites (The PirateBay, Torrentz, etc.) as well as some legal video sharing websites (like Vimeo, DailyMotion). Nowadays, when someone tries to access these websites, he/she may receive a rather annoying message:  “Access to this site [...]
       
  • Bypass Windows Authentication
    May 27, 2012
    Guys you must be knowing how to break the password of Windows by using some Live OS. But using Live OS is bit complicated and sometimes they take a lot of time to crack a password. So in this tutorial you will see how to bypass Windows OS so that you will not indulge in complicated situation and [...]
       
  • Burp Suite 5: Sequencer | Comparer | Decoder
    May 29, 2012
    Today I”ll tell you about the remaining tools of burp suite i.e Burp Sequencer, Decoder, Comparer . Burp Sequencer The Burp Sequencer tool is used to check for the extent of randomness in the session tokens generated by the Web application. Brute force attacks enumerate every possible combination [...]
       
Headlines by FeedBurner