Skip to main content

Indian Hackers V/s Bangladeshi Hackers


They Call it "Cyber war" - but In actual they are destroying Cyber Space of their own Country by Defacing Sites for a matter that can't be solved by Ministry like this. The cyber attacks was started two days back from both sides. Indian Hacking Group Indishell become active once again against Bangladesh Black Hat Hackers.


The whole issue of these Hacks by Bangladeshi Hackers are because of BSF brutality at the India-Bangladesh border zone as they mentioned on Defaced Pages.
In Return Indian hackers hacked a little over30 government websites of Bangladeshyesterday. Bangladeshi hacking group Bangladesh Cyber Army then showed up to save their country's cyber space they started attacking back.


Bangladesh Cyber Army and other Bangladeshi Hackers took down around 30 Indian Government websites and 4 other high-profile websites in last two days. Most of sites become victim of DDoS attacks resulting them to shut-down. Here is the list of the 34 sites. Also a hacker named R3x0Man hacked 255 Indian websites.

Another hacker JingoBD of Bangladesh Cyber Army hacked 45 websites. Other hackers of the same group hacked other 68 websites.

Because of this unmeaning Cyber War most of on either side are down or under attack. Besides, Indonesian, Pakistani and few more hackers are also supporting Bangladeshi Hackers.

38 Bangladesh Government sites Defaced by Indian Hackers

Indians hacking Group "Indishell" took down 38 Bangladeshi government websites on Saturday, including ministry of  the ministries are communications, youth and sports, primary and mass education , Trading Corporation of Bangladesh.

The Deface page include the name of hackers - Love the Risk, Amal Landhe, Lnx Root, Silent Killer. In the hacked pages, between two eyes resembling Indian flags, the hackers wrote, "We have an EYE on you. Indishell is non other that Indian Cyber Army Hacking group, who already deface most of the Pakistani Govt sites in Past. 

Most of the Hacker Sites either Restored or Hosting Suspended by Providers, or Under maintenance. The Complete list of Hacked Sites and Mirrors of All hacks are listed below.
Hacked Sites:

http://www.www.moef.gov.bd/
http://www.mincom.gov.bd/
http://www.cga.gov.bd/
http://www.bdlaws.minlaw.gov.bd/
http://www.mopme.gov.bd/
http://www.rdcd.gov.bd/
http://www.moysports.gov.bd/
http://www.mole.gov.bd/
http://www.bfri.gov.bd/
http://www.moind.gov.bd/
http://www.mopt.gov.bd/
http://www.lgd.gov.bd/
http://www.minlaw.gov.bd/
http://www.dmrd.gov.bd/
http://www.nlaso.gov.bd/
http://www.publiclibrary.gov.bd/
http://www.ictd.gov.bd/
http://www.gemco.gov.bd/
http://www.cddl.gov.bd/
http://www.mosict.gov.bd/
http://www.gaziwires.gov.bd/
http://www.boiler.gov.bd/
http://www.bcsadminacademy.gov.bd/
http://www.lawjusticediv.gov.bd/
http://www.moedu.gov.bd/
http://www.guchhogram.gov.bd/
http://www.cca.gov.bd/
http://www.nmst.gov.bd/
http://www.legislativediv.gov.bd/
http://www.etl.gov.bd/
http://www.latc.gov.bd/
http://www.drr.gov.bd/
http://www.mhn.bcc.net.bd/
http://www.bnnssddhk.org.bd/
http://www.msw.gov.bd/
http://www.bffwt.org.bd/
http://www.molwa.gov.bd/
http://www.fd.gov.bd/
from : the hacker news

Comments

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principles. Objects must be properly classified

List of Company Slogans

·          3M : "Innovation" ·          Agere Systems : "How Communication Happens" ·          Agilent : "Dreams Made Real" ·          Airbus : "Setting the Standards" ·          Amazon.com : "…and You're Done" ·          AMX : "It's Your World. Take Control" ·          Anritsu : "Discover What's Possible ·          AT&T : "Your World. Delivered" ·          ATG Design Services : "Circuit Design for the RF Impaired" ·          ATI Technologies : "Get In the Game" ·          BAE Systems : "Innovating for a Safer World" ·          Ball Corporation : "The Leader in Small Space and Rocket Systems" ·          BellSouth : "Listening, Answering" ·          Blackhawk : "Powering DSP Development" ·          Boeing : "Forever New Frontiers" ·          Bose Corporation : "Better Sound Through Research" ·          Bowers & Wil

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત