Wednesday 5 February 2014

Top 10 Ethical Hackers in India | Best Indian Hackers | Indian Ethical Hackers


Ankit Fadia  is an independent computer security and digital intelligence consultant with definitive experience in the field of Internet security based out of the Silicon Valley in California, USA. He has authored 14 internationally best-selling books on numerous topics related to Computer Security that have been widely appreciated by both professionals and industry leaders the world over. His books have sold a record 10 million copies across the globe, have been translated into Japanese, Korean, Portuguese and Polish and are also being used as reference textbooks in some of the most prestigious academic institutions around the world. He was one of eight people named MTV India's Youth Icon of the Year for the year 2008.

Sunny Vaghela is one of the countries pioneer Information Security & Cyber Crime Consultant. The young and dynamic personality of Sunny has not only assisted in solving complex cyber crime cases but has also played an instrumental role in creating awareness about information security and cyber crimes. During his graduation at Nirma University he developed projects like SMS Based Control System, Voice Recognition Based Control System exhibiting his sharp acumen for technology. At the age of 18, Sunny exposed loopholes like SMS & Call Forging in Mobile Networks. The technology that allowed to send SMS or Make Call to any International Number from any number of your choice. At PresentHe is Director & Chief Technical Officer at TechDefence Consulting Pvt Ltd which is rapidly growing security services & investigation consulting organization focusing on Cyber Crime Investigations,Cyber Law Consulting,Vulnerability Assessment & Penetration Testing,Information Security Training.

#3 ) Trishneet Arora

Trishneet Arora has authored for book "The Hacking Era” with several technical manuals and given countless lectures, workshops and seminars throughout his career. He trained IPS Officers, Crime Branch Cell, Banks and IT Experts. He  solves cyber crime cases with agencies, Trishneet Arora also known as Social Networking Specialist, solved many cases like Fake Profiles, Tracing on Facebook, Email Tracing and money fraud investigations. He has been interviewed by Various Newspapers, News Channel’s, TV Channels, Blogs and Communities Namely The Economic Times, The Times of India, Indian Express, Dainik Bhaskar, Punjab Kesri, Daily Post, Fastway News, PTC News, The Tribune, Dainik Jagran, Punjabi Tribune, Punjabi Jagran and more. He is currently Chief Technical Officer at TAC Security Solutions. Trishneet and  Mr.Yashwant Sinha (Former Finance Minister of India) were keynote speakers at Bussines Relation Conference, Gujarat


#4 ) Vivek Ramchandran
Vivek Ramachandran is a world renowned security researcher and evangelist. His expertise includes computer and network security, exploit research, wireless security, computer forensics, embedded systems security, compliance and e-Governance. He is the author of the books – “Wireless Penetration Testing using Backtrack” and “The Metasploit Megaprimer”, both up for worldwide release in mid 2011. Vivek is a B.Tech from  and an advisor to the computer science department’s Security Lab. In 2006, Microsoft declared Vivek as one of the winners of the Microsoft Security Shootout Contest held in India among an estimated 65,000 participants. The competition was aimed at finding leading Security Experts in India. Vivek was also awarded a Team Achievement Award by Cisco Systems for his contribution to the 802.1x and Port Security modules in the Catalyst 6500 series of switches. These are high end security features used in Enterprises
#5 ) Koushik Dutta
Koushik Dutta is responsible for Clockworkmod recovery and Rom Manager for Android rooting and the core member of famed UnrEVOked team. He has been a .net developer from heart and had his internship initially at Microsoft and is a former MVP. He decided to leave Microsoft and hack Android cellphoneslike there was no tomorrow. Sony approached him after geohot humped them like anything but he politely declined .
#6 ) Aseem Jakhar
Aseem is a renowned security researcher with extensive experience in system programming, security research and consulting. He has worked on various security software including IBM ISS Proventia UTM appliance, Mirapoint messaging/security appliance, anti-spam engine, anti-virus software, multicast packet reflector, Transparent HTTPS proxy with captive portal, bayesian spam filter to name a few. He is well known in the hacking and security community as the founder of null - The open security community the largest security community in India. The focus and mission of null is advanced security research, sharing information, responsible vulnerability disclosure and assisting Govt./private organizations with security issues.His research includes Linux remote thread injection, automated web application detection and dynamic web filter. He has authored several software projects such as Jugaad, EyePee and Kunsa due to be released under an open source license.
#7 ) Sai Satish
Sai Satish is an young Entrepreneur, Founder & CEO of Indian Servers. Administrator of Andhrahackers (Top hacking awareness forum in INDIA).Author of “HACKING SECRETS” an Internationally sold hacking book, a renowned Ethical Hacker & Cyber Security Expert. Thousands of college students and professionals got benefited by his lectures which are delivered at 90+ colleges all over the WORLD. He worked as Microsoft Student Partner, Corporate .Net Trainer . He was rewarded by IAS officers for pentesting on government sites, which helped to them to improve security and safe transactions and Forensic Investigator. He was interviewed by Many International, national and regional news channels like Dap News(caombodia), AAjtak, The Hindu,Deccan Chronicle, Zee TV,TV9, NTV, Eenadu , Sakshi etc.
#8 ) Benild Joseph
Benild Joseph  the 20 years old world renowned Ethical Hacker | Information Security Consultant | Speaker | Author in Indian IT Industry was born in Calicut, A City of Kerala. Currently Acting as the Chief Executive Officer of “Th3 art of h@ckin9“ – International IT Security Project. He has his credit to many registered and pending patents in cyber forensic and information security domain. He specializes in Web Application security, Penetration testing and Forensic investigation. His research interests include Computer Security, Networking, Data Forensic, Virtualization, Web Application Vulnerability and Information Security. He has been interviewed by several print and online newspapers where he has shared his experiences relating to Ethical Hacking, Scope in Indian Information Security field, Cyber War and Cyber Crimes.
#9 ) Falgun Rathod
Falgun Rathod is one of the countries pioneer Information Security & Cyber Crime Consultant. Falgun has solved number of complex cyber crime cases and has also played an instrumental role in creating awareness about information security and cyber crimes. He is a Founder & Director of Cyber Octet Pvt Ltd - a Company providing Training on Ethical Hacking and Information Security as well as Cyber Crime Consultants. He has been assisting many agencies & companies and conducted numerous workshops and seminars in the Colleges about Information Security and Ethical Hacking. He is also the member of OWASP (open web application security project), invited member at ICTTF (International Cyber Threat Task Force), CSFI (Cyber Security Forum Initiative), DSCI (Data Security Council of India).He is also Invited Article Writer at PenTest Magazine based in Poland. He was featured in March 2012 Issue of PenTest Mag on the Cover Page of Magazine.
#10 ) Rahul  Tyagi 
Rahul  Tyagi  is  a  sovereign  computer  security  consultant  and  has state-of-the-art  familiarity  in the  field of computers.  Recently Tyagi conversed with several media channels to create consciousness in people regarding the threats and terror of hacking. He was also invited as a speaker in the principal ethical hacking conference DEF CON, Chennai where he presented his research paper amongst other security experts. His research paper has also been published globally on exploit-db and packetstormsecurity, which are world renowned research paper database communities. Rahul Tyagi is presently working as the brand ambassador of TCIL-IT Chandigarh as Corporate Ethical Hacking Trainer. He also provides his services to ‘Cyber Security & Anti hacking Organization of India’ as Vice-President. Additionally, he is the Technical Head of News Paper Association of India as well.

Snowden leaks: GCHQ 'attacked Anonymous' hackers

Snowden leaks: GCHQ 'attacked Anonymous' hackers

GCHQ disrupted "hacktivist" communications by using one of their own techniques against them, according to the latest Edward Snowden leaks.
Documents from the whistle-blower published by NBC indicate UK cyberspies used a denial of service attack (DoS) in 2011 to force a chatroom used by the Anonymous collective offline.
A spokeswoman for GCHQ said all the agency's activities were authorised and subject to rigorous oversight.
But others say it raises concerns.
Dr Steven Murdoch, a security researcher at the University of Cambridge, said using a DoS attack to overwhelm a computer server with traffic would have risked disrupting other services.

Introduction to GCHQ

The UK government's communications-focused intelligence agency, employing about 5,000 people.
It stands for Government Communications Headquarters.
The agency is based in Cheltenham, Gloucestershire, and also operates two smaller sites in Cornwall and North Yorkshire.
Its two key roles are:
  • To identify threats from intercepted communications. It says these include terrorism, the spread of nuclear weapons, regional conflicts around the world and threats to the economic prosperity of the UK.
  • To serve as an authority on information assurance - meaning that it advises the government and organisations running the UK's critical infrastructure how to safeguard their systems from interference and disruption.
The foreign secretary is answerable in Parliament for GCHQ's work.
"It's quite possible that the server was used for other purposes which would have been entirely unrelated to Anonymous," he said.
"It's also likely that most of the chat that was going on about Anonymous was not to do with hacking because the people who join Anonymous are fairly wide-ranging in what they think it is legitimate to do.
"Some have gone into criminality but many others just go out and organise protests, letter-writing campaigns and other things that are not criminal."
Campaign group Privacy International is also worried.
"There is no legislation that clearly authorises GCHQ to conduct cyber-attacks," said head of research Eric King.
"So, in the absence of any democratic mechanisms, it appears GCHQ has granted itself the power to carry out the very same offensive attacks politicians have criticised other states for conducting."
The UK government's Cyber Security Strategy document, published in 2011, says officials should take "proactive measures to disrupt threats to our information security", but also notes that any such action should be consistent with freedom of expression and privacy rights.
Hacker arrests The latest documents are published alongside an article part-written by Glenn Greenwald.
The journalist is one of only two people reported to have access to all whistle-blower Edward Snowden's leaked documents.
GCHQ GCHQ has not discussed the specifics of the operations included in the Snowden leaks
The article highlights that the Joint Threat Research Intelligence Group (JTRIG) is the division identified as being responsible for the DoS attack - a unit whose existence had not previously been publicly disclosed.
The documents indicate the unit also spied on and communicated with chatroom users to identify hackers who had stolen information.
In one case, agents are said to have tricked a hacker nicknamed P0ke who claimed to have stolen data from the US government. They did this by sending him a link to a BBC article entitled: "Who loves the hacktivists?"
"Sexy," P0ke is alleged to have commented.
But when he clicked the link it is reported that JTRIG was able to bypass measures he had taken to hide his identity, although it is not clear how.
BBC article GCHQ is said to have tricked one hacktivist by sending him a link to a BBC article
NBC reports that P0ke - a Scandinavian college student - was never arrested despite GCHQ learning his true name.
But the leaks indicate others were imprisoned as a result of JTRIG operations.
One paper highlights the case of Edward Pearson - a hacker known as GZero - who was sentenced to two years in jail in 2012 for illegally acquiring credit and debit card details registered with PayPal.
A transcript of a chatroom conversation indicates that Pearson had contacted GCHQ agents claiming he knew a hacktivist they were investigating, unaware of the agents' true identity.
'Grey area' In addition to Anonymous, the documents list LulzSec, the A-Team and the Syrian Cyber Army as hacktivist groups GCHQ was concerned about.
In one case it appears simply warning activists that carrying out their own DoS attacks was illegal had the desired effect.
NBC reports that the notice was posted via Facebook, Twitter, email, instant messenger and Skype.
One alleged GCHQ document states that one month later 80% of those contacted had stopped using a hacktivist chatroom.
LulzSec logo Several of the Lulzsec hackers have been arrested after carrying out DoS attacks
But the documents also indicate that GCHQ was willing to use DoS attacks itself as part of an operation codenamed Rolling Thunder, which prevented hacktivists using a chatroom for 30 hours in September 2011.
GCHQ has a longstanding policy of not commenting on specific intelligence-gathering procedures, but a spokeswoman said all its work was "carried out in accordance with a strict legal and policy framework".
Even so, one cybersecurity expert said he had mixed feelings about the latest leaks.
"We have to remember that cyberspooks within GCHQ are equally, if not more, skilled than many black-hat hackers, and the tools and techniques they are going to use to fight cybercrime are surely going to be similar to that of the bad guys," said Andrew Miller, chief operating officer at Corero Network.
"Legally, we enter a very grey area here; where members of Lulzsec were arrested and incarcerated for carrying out DoS attacks, but it seems that JTRIG are taking the same approach with impunity."