Hacking’s ethical side
He is all of 24. But his work and expertise speak far beyond his years. Dressed in a pair of casual tees and jeans, at first glance he looks like any other boy next door. But that’s exactly what he isn’t. Meet Ankit Fadia, a well known ethical hacker, computer security expert and cyber terrorism guru!
Fadia’s tryst with the cyber world began quite early in life. He wrote his first book when he was 14. Titled, the ‘The Unofficial Guide to Ethical Hacking,’ it became a bestseller worldwide, selling 3 million copies.
But what’s so ‘ethical’ about being a hacker? His eyes light up on hearing the obvious question. “I had coined the term when I was writing my first book. The idea basically was that you have the knowledge that a criminal has but you do not misuse the information. The term wasn’t widely used before this…but now it is well known,” he says.
He also has to his credit cracking an encrypted email sent by the Al-Qaeda terrorist network for a classified intelligence agency after the Sept 11 attacks. Recently, he was contacted by the Navi Mumbai police after the Mumbai terror attacks to decode the Voice Over Internet Protocol (VoIP) conversation.
Currently, the cyber whizkid has his hands full. He shuttles frequently between Mumbai, Malaysia and New York advising companies, government bodies and security agencies on cyber security issues. Besides hosting a show on a popular television channel, he is working on some of his other TV concept formats. He has also devised research reports to prevent celebrity hacking. “Social networking has become immensely popular now. Celebrities are also at risk, often giving out their location specifics on status updates on these sites. This is creating problems for the police.
I have presented a report to the government and the police department on this so that awareness can be created on the issue.”
And there is something lined up for kids as well in his ambitious plans. A board game, ‘Hack Attack’ for children aged 9 years and above is expected to be launched in the next 6 weeks. “Children nowadays are getting more exposed to technology. It is necessary to inculcate the dos and don’ts for them. They are going to love it,” he says with a smile.
As we wrap up the conversation, Ankit carries forward his cyber training agenda by presenting me a book on email hacking. “It’s the easiest one that I have written but let me sign it for you,” he says enthusiastically.
His signature reads, “Happy Hacking.”
His signature reads, “Happy Hacking.”
Book Index
0007 Spy Software, 112
A
AAAA, 23
Access Point, 190
ACK, 17, 44, 45, 46, 47, 178
ACK Scan, 46
Active Reconnaissance, 24
Active Sniffing, 135
Active Stack Fingerprinting, 55
ActiveWhois, 18
Actual Spy Spyware, 112
Advanced Port Scanner, 51
Advanced Stealth Email Redirector, 115
Algorithm, 18, 88, 95
Angry IP Scanner, 42
AOL, 99, 113
Apache, 31, 34, 56, 145, 146, 151
ARP Spoofing, 136
Asterisk Key, 92
Availability, 1
B
BlackWidow, 20, 172
Burp, 20, 173, 174
C
CacheRight, 19, 153
CGI-BIN, 17, 36
CIFS, 63, 64
Clearing Tracks, 5
Common Computer virus types, 19, 118
Competitive Intelligence, 12
Computer virus, 19, 117, 118
Computer Worms, 19, 119, 120
Confidentiality, 1
Connect Scan, 45
Cookie, 166, 167
CoolWebSearch, 112
CORE IMPACT, 17, 58
Cracker, 2
cURL, 174
D
Default Pages, 17, 35
Directory Listings, 16, 31
Distributed Denial of Service, 182
DNS Enumeration, 18, 72
Domain Inspect, 18
Domain King, 18
Domain Name Service, 16, 17, 23, 72
DoS, 20, 107, 177, 178, 181, 182, 184, 185
Duplication, 19, 139
E
ElcomSoft, 18, 81, 82
Error Message Interception, 19, 170
Error Page, 171
Error Pages, 35
Ethical Hackers, 3
Exploit, 2
F
FIN, 17, 44, 46, 47
FIN Scan, 46
Floppy Scan, 54
Fraggle, 180
Fragmented packet Port Scan, 48
FTP, 17, 48, 60, 75, 77, 98, 100, 101, 104, 107, 113, 114, 133, 145, 151, 174
G
Gaining Access, 5
Google Hacking Database, 37
Google Proxy, 30
H
Hacker, 2
Hacker Classes, 3
Hacking Life Cycle, 3
Hacktivism, 2
Half Open Scan, 17, 45
HTTP, 18, 25, 55, 60, 75, 76, 77, 107, 111, 145, 151, 153, 154, 166, 168, 173, 174
Httprint Fingerprinting, 56
HTTPS, 60, 174
HTTrack web site copier, 14
I
iCMD, 108
ICMP, 24, 25, 41, 42, 47, 135, 178, 180, 204
ICQ, 100, 113
IDLE Scan, 47
IIS, 31, 34, 35, 145, 146, 147, 148, 149, 153, 154
IISxploit.exe, 149
IMAP, 60, 70, 75, 77
Instant Source, 20, 171, 172
Integrity, 1
IP Scan, 4
IRC, 19, 120, 122, 180
ISAPI, 148
J
John the Ripper, 91
K
KARMA, 20, 201
KerbCrack, 91
Kerberos, 89
Keylogger, 18, 97, 98, 99, 100, 101, 106, 107, 120
Kismet, 20, 192, 194, 199
L
L0phtcrack, 78
LAN Manager, 18, 85, 87, 88, 95
Land, 179
LANView, 52
LDAP, 18, 60, 71, 72, 174
LDAPenum, 72
LinkDeny, 154
Login Pages, 36
Look@Lan, 17, 42, 43, 69
M
MAC Address, 19, 139
MAC Filtering, 200
MAC Flooding, 138
MAC Makeup, 142
MAC Shift, 143
Mail Bomb, 181
Maintaining Access, 5
Malware Infections, 120
Metasploit, 19, 155, 156, 157, 158, 159
MSN, 99, 113
MX, 23, 24
N
Nemesy, 183
NeoTrace, 26
Nessus, 17, 57, 58
NetBus, 18, 107, 109, 110
NetStumbler, 20, 193
Network Scan, 4
NMAP, 17, 49, 157
NNTP, 60, 75
NTLM v1, 18, 86, 87, 88
NTLM v2, 18, 87
Null Scan, 17, 47
NVIDIA, 78, 81
O
Online Devices, 36
OOB, 181
Operating System Fingerprinting, 54
Ophcrack, 91
P
Panther 2, 184
Parameter Tampering, 167, 168
Passive Fingerprinting, 55
Passive Reconnaissance, 16, 7
Passive Sniffing, 135
Password Types, 73
People Search Web sites, 12
Physical Location, 22
ping, 21, 42, 52, 135, 178, 180
Ping of Death, 20, 178
POP3, 43, 60, 75, 77, 107, 133
Port scan, 4
Print Monitor, 115
Privilege escalation, 96
ProcessMonitor, 126
Promiscuous, 19, 134, 135
promiscuous mode, 133, 134, 135, 140
PSH, 44
PWdump, 90
R
Rainbow Crack, 78
Reconnaissance, 4
Remote Code Execution, 165, 166
Rouge Access Point, 20, 201
RST, 44, 45, 46, 47
Running Processes, 126
S
Salted, 18, 81
Sam Spade, 21
Scanning, 17, 4, 41, 43, 45, 183, 193, 194
SC-KeyLog PRO, 100
Script kiddy, 2
Secure 1st Password Recovery, 93
Security, 1
Securityfocus.com, 10
ServerMask, 153
Session, 87, 166, 167, 169, 170
Shadow Security Scanner, 60
SMAC, 143
SMB, 63, 64, 75, 85, 148
SMTP, 17, 60, 69, 70, 71, 77, 107, 133
Smurf, 180
Sniffer, 133
SNMP, 17, 42, 43, 52, 60, 63, 68, 69
SNMP Enumeration, 17, 68, 69
Snork, 181
Specific Directory, 32
Specific File, 33
Specific File Extension, 34
Spytector, 101
Spyware countermeasures, 115
SQL, 58, 160, 161, 162, 163, 164, 204
SQL injection, 160, 163
Startup Items, 19, 127
Stealth Recorder, 113
SuperScan 4, 50
SupperScan 4, 17, 66, 67, 68
SYN, 17, 20, 44, 45, 46, 178, 179
SYN Flooding, 178
SYN Stealth, 17, 45
SysKey, 89
System Drivers, 19, 128, 129
T
Tcpdump, 141
TCPView, 125
Teardrop, 178
Telephone Spy, 114
Telnet, 55, 60, 75, 77, 133
TELNET, 174
The Perfect Keylogger, 98
three-way handshake, 43, 45, 179
Tiny, 108
Trace Data Packets & Discover Network Range, 24
U
UDP Scan, 47
Unicode, 93, 148, 149, 165
URG, 44, 47
USB Scan, 54
V
Vulnerability, 2
Vulnerability Databases, 9
Vulnerability Research Web sites, 9
Vulnerability Scan, 4
Vulnerability Scanners, 57
W
Warbusing, 190
WarCycler, 190
WarDriving, 190
Warnibbling, 190
Warstrolling, 190
Web Data Extractor, 14
Web site defacement, 147
Web site Watcher, 15
WEP, 20, 189, 195, 196, 197, 198, 199, 200
WiFi Hopper, 20, 193, 194
Window Scan, 46
Windows Hacking Tools, 90
Wireshark, 19, 140, 141
WPA, 20, 189, 195, 196, 197, 198, 199, 200, 205
X
Xmas Tree Scan, 47
XSS, 19, 151, 164, 165
Y
Yahoo Messenger, 94, 113