What's new

Bangladesh Webs Hacked by Indians

Status
Not open for further replies.
This indian hacking opened the door for hacking any and all important indian business and govt website. Indians has lost any ethical arguments if and when table is turned. Bharti airtel is running their business in Bangladesh now and there are plenty of options to disrrupt airtel business. All these are legit actions as indians has brought it upon on themselves.

Another interesting thing to notice is that hindu fundamentalism has reached such an extreme that even average indians directly or indirectly support terror acts of their country and countryman.

Distrupting airtels buisness will only affect Bangladesh.Think abt the thousands of Bangladeshi employees working for airtel.Think abt the taxes the company would pay to the government which can inturn be used for buildings roads etc..even if the company is forced to cease operations it would have only a short term effect(the company has around 200 million subscribers worlwide).so think again.

JUST ACCEPT THE FACT THAT INDIA IS THE BIG DADDY OF SOUTH ASIA.AND IF U WANT TO PROGRESS RESPECT THE BIG DADDY.
 
.
I hope you have heard of Trojans and Backdoors. Now what I can possibly do with them:

1. I can get access to the trojaned system as the system
goes online on the internet.

2. By way of the access provided by the trojan, I can
stage attacks of different types:

Remote Access Trojans
Password Sending Trojans
Keyloggers
Destructive
Denial Of Service (DoS) Attack Trojans
Proxy/Wingate Trojans
FTP Trojans
Software Detection Killers

Ever heard about Netcat or SubSeven

Or I can even use a Sniffer.

Masking IP is a topic, way out of your league, which I will not discuss openly in a forum.

Thanks.

In my earlier post it was already mentioned that the attacker could use different computer to launch the attack. It usually happens to spread the warm or DOS attack. But to hack a website, its most likely that he/she broke the security or password of the system and the attacker is most likely to use his own computer only. But anything can be possible....
 
.
The websites were generally informational in nature. The concern of actual data loss or theft is low.

The issue I see is the hostilities of the average Indian. The constant feeding of unhealthy dosage of false information is trickling down to every Hori and Krishna. Which in turn fostering extremism in the general population.

The unabated BSF shootings on the border. If you have enough support in the general population for border shootings, however despicable that maybe, will go on.

I was quite taken by the level of hostilities shown by a segment of the Indian posters. I hope this is not a true representation of the common Indian folks.

The constant drumbeat of the media is causing a common individual to take on the acts of web vandalism.

The real issues of India been around long before BD came into existence. BD has nothing to do with Kashmir, NE insurgency, and Maoism. However, every time something happens in the NE, someone in the media will write the story with a side of "terrorist finding refuge in the neighboring country."

Maoism is an Indian home grown issue that was exported to Bangladesh SE neighboring West Bengal. i don't hear media talking about that.

The media is constantly telling the folks don't look at NE, the real problem is they are from BD. Don't look at the Naxals, its BD folks coming in by the millions.


I don't think the Indian attacker is aware of whats going on in India or at least the magnitude of the issues.

Bold part-
this part is true for BD nationals also.... have you seen articles posted by BD members here....... each and every one of them is anti india

as far as as BSF is concerned .... no Indian in any way support killing of innocents..... if you have proof against BSF guards please give it to us.... we will bring culprits to justice..........


underlined part -
yah you have seen aggression of Indian posters..... ever cared to watch posts calling to wage Jihad against India????
we have same share of idiots on our side too.....


red part-
please read more about ULFA and HuJI ..... they have some sympathizers on the other side border.....
.

blue part-
we dont deny that naxal movement is a home grown issue
and our media do pin point these topics.......... if you need some reading material/articles i can provide you........
besides
media doesn't tell anything to anyone its just each individual's interpretation of news



in the end i just have one thing to say.........
dont judge us Indians by the action of a few....and please dont conclude anything before investigation is over.....

regards

Jai Hind!
 
.
I hope you have heard of Trojans and Backdoors. Now what I can possibly do with them:

1. I can get access to the trojaned system as the system
goes online on the internet.

2. By way of the access provided by the trojan, I can
stage attacks of different types:

Remote Access Trojans
Password Sending Trojans
Keyloggers
Destructive
Denial Of Service (DoS) Attack Trojans
Proxy/Wingate Trojans
FTP Trojans
Software Detection Killers

Ever heard about Netcat or SubSeven

Or I can even use a Sniffer.

Masking IP is a topic, way out of your league, which I will not discuss openly in a forum.

Thanks.

Why you are saying these irreverently to him? No need to be so smart.

I invite the Indian hackers to hack this site if you can :Welcome to DSE - Dhaka Stock Exchange
 
.
In my earlier post it was already mentioned that the attacker could use different computer to launch the attack.
If you use a different comp in Bangladesh (rather than your home comp) to hack a target in India, it is lame. You will be caught with your pants down in hours.

You need to control a comp in a different geographical location like say Georgia or Russia or Dubai, then use that comp to stage an attack on Bangladesh or whatever country you choose. Is that clear now?

It usually happens to spread the warm or DOS attack. But to hack a website, its most likely that he/she broke the security or password of the system and the attacker is most likely to use his own computer only. But anything can be possible....

I use "**** *** ******' sometimes. Never failed me. Make sense out of those stars and you would understand things. The virtual world is a miracle buddy, there are cyber warriors on internet forums like you, and then there are silent warriors like........those hackers.

It is a world to learn, invent and unleash.
 
.
Stop copy pasting, and come up with original suggestions. If you know some, enlighten me.

I enlightened the mechanism of Trojon horse's briefly. No need to teach me. I know well about what I said. I did not copied and pasted only.
 
.
Well I am not into hacking thing.. only once one of my client asked me to do some dirty thing and I unconciously wrote a virus which Norton had to include that in their virus definition file. I dont want to name the name of that virus for obvious reason...:lol:
 
.
Why you are saying these irreverently to him? No need to be so smart.
I know you do not understand these things. But your mind cannot comprehend these things, or else you could have debated instead of attacking me personally.

I invite the Indian hackers to hack this site if you can :Welcome to DSE - Dhaka Stock Exchange
Now, you are being over-smart. Have you not read the news?, even Google's accounts was hacked a month before. There is nothing safe in the internet as in day to day life. USA is very secure, but people do die of road accidents in US, don't they?

Stop acting like a child and come back to the topic.
Thanks.
 
.
I know you do not understand these things. But your mind cannot comprehend these things, or else you could have debated instead of attacking me personally.


Now, you are being over-smart. Have you not read the news?, even Google's accounts was hacked a month before. There is nothing safe in the internet as in day to day life. USA is very secure, but people do die of road accidents in US, don't they?

Stop acting like a child and come back to the topic.
Thanks.

Why you are teaching me and how do you know that I can't comprehend what I said?

BTW, I'm not gonna answer you anymore.
 
.
I enlightened the mechanism of Trojon horse's briefly.

You mean copying something from the internet and then posting it in this forum. How about posting some footprints about Trojans, since you know the mechanism of Trojan Horse?

No need to teach me. I know well about what I said. I did not copied and pasted only.

Prove it, and get a candy. You can PM me too. If you cannot, ask me, if I have time, I will surely enlighten you, not only the mechanism, but also how to address the issue in writing those.
 
.
So if once a hacker can create a Trojan horse program then hacker can gain access to the computer by installing that in victim’s PC. The purpose of creating the program is to give the hacker the ability to steal the user's personal information, such as credit card numbers or passwords that the user enters. Hackers can also modify files locate on the user's computer and take the control of other softwares.

Feature and the two parts of a Trojan horse:
Client (the part that belongs to hacker).
Server (the part that belongs to victims).

Most Trojan horse programs have two parts. One part is called a server, and the other is the client. The server part is the one that actually infects and invades the victims’ computers. The client part of the program is the one that allows the hacker the ability to invade the infected computer. The hacker uses the client part to send requests to the server part when performing a scan on the Internet. When an infected computer is found, the server part replies to the request of client part from the victim’s PC, and then the hacker links to the infected computer (link between client part and server part in victim’s PC remotely thought Internet ) and invades it and takes the control the victim PC by using the client part.

So we can see that it is very easy to take control of a remote PC by just putting the server part of a Trajan horse in victim’s PC. But the main problems are here that the hackers’ have to face is the server part of most Trojan horses is detected by the victim’s PC Antivirus and the outgoing signals of server past is blocked by the firewall. So the hackers’ have to use different strategies e.g. encryption of the server part by various method e.g. hex codes editing to avoid detection by AV. And this encryption process is the most challenging part of hacking and thus hacking is getting tougher day by day. So if the hacker can make his server part undetectable in victim’s PC somehow (very tough) then hacking is very easy.

How to avoid becoming a trojan horse victim-
run a good firewall program such as Zone Alarm or like those outlined on the Firewall page of this website. Also, use software made specifically to sniff out trojans like The Cleaner and don't forget to keep it updated.
don't download an executable program just to "check it out" - if it's a trojan, the first time you run it, you're already infected!
be aware that downloading blindly from people or sites, whether you know about them or not, is risky.
you must be sure what the file is before opening it if you decide to open it at all
beware of hidden file extensions
if you have programs that give options to automatically open or get files, don't use them
don't be lulled into a false sense of security just because you run anti-virus programs-many don't check for trojans and you must constantly update them
keep up to date at Dark-e.com on the latest threats and how to keep them off your computer

Ways to get rid of trojans-
you may have to do a clean reinstall of your operating system or have someone do it for you
maintain and update a trojan sniffer like The Cleaner which can be run, finding the trojan, and usually cleaning it from your system.
use a commercial anti-virus software program
use a shareware anti-virus program
check sites on the net for help and instruction. (check the "Tools and Links" page)
load a good firewall program to tell you if someone is attempting to access your computer-check the Firewalls page for more.

You copied this to describe a Trojan? :lol:
 
.
You mean copying something from the internet and then posting it in this forum. How about posting some footprints about Trojans, since you know the mechanism of Trojan Horse?



Prove it, and get a candy. You can PM me too. If you cannot, ask me, if I have time, I will surely enlighten you, not only the mechanism, but also how to address the issue in writing those.

To my fellow professional, dont brag about your expertise if you had any in front of a layman. Could you write a poem or paint a Monalisa? May be not.. think about it.
 
.
Why you are teaching me and how do you know that I can't comprehend what I said?

Because you cannot come up with originals. As simple as that.

BTW, I'm not gonna answer you anymore.

Thanks, I am also tired of wannabe hackers spamming my inbox with requests in all the forums I participate.

I do entertain some of them I like.
 
.
To my fellow professional, dont brag about your expertise if you had any in front of a layman.

Thanks, that was nice, but a little rude.

I was not advertising my expertise. Infact I am a layman too, just learning stuffs. I was just correcting the novice information the other poster had posted and seemed hell bent on arguing.

Could you write a poem or paint a Monalisa? May be not.. think about it.

I wish I could! But hey!, geniuses are born once a lifetime.
 
.
@iajdani

I was talking to EW. Why that hell guy interrupted me and said I only copied from Internet without understanding those matters? Because he and you could not accept the fact that I know little about those even I’m not professional. He was acting like over smart. And you damn supported him without understanding the fact why I said those to EW. I was not overacting. I know whatever I wrote and I copied just the last portion to ease my typing. Damn. And that hell Indian wants to teach me, lol. I know better people then him.
 
Last edited:
.
Status
Not open for further replies.

Pakistan Affairs Latest Posts

Back
Top Bottom