First introduce the organization before zero.
Security focus
http://www.xfocus.net/
On August 26, 1999, it was created by Xundi, and the founder also has Quack and Casper. Later Stardust, ISNO, GLACier, Alert7, Benjurry, Blackhole, Eyas, Flashsky, Funnywei, Refdom, Tombkeeper, Watercloud, Wollf et al. Have also joined recently. Site homepage style has always been very simple. The organization has currently become the most authoritative information security site in China, and is also a domestic organization closest to the world.
At present, some domestic technical comparison articles are submitted by the author to the site, and some of the domestic well-known technologies will have a two master to go here. The atmosphere of discussion technology is OK. And some network security companies are also concerned about the forum here. The author of the popular famous scanning tool X-Scan is the organization of the organization.
Since 2002, a information security summit will be held each year, attracting many well-known online security experts at home and abroad to participate. The meeting involved many areas and received attention. Created a good academic exchange atmosphere. I wish this organization get better better.
China Red Guest Alliance (to dissolve)
http://www.cnhonker.com/
Borrowing this opportunity to explain that only this Hui Alliance is worthy of the true red guest alliance.
This organization is formed by Lion in December 2000. I have led many members to participate in the Chinese and American hackers in 2001, and the famous "rivers and lakes". However, this era has already passed away, and the past is also lost, and only memories of people left. On the last day of 2005, Lion announced official dispersion on the homepage. Perhaps many people are difficult to understand. However, this also the truth of someone. Now there is N Red League outside, I don't pay attention to them. Blessing Lion, Bkbll et al. I am lazy to Sharpinner.
Chinese eagle
http://www.chinawill.com/
Like the Red Guest Alliance, it was founded in 2000 and participated in the Chinese and American hackers in 2001. The stationmaster Wantao is also a member of the early Green Corps. And also participated in several network wars before 2000. The tissue is still not falling. There is no big incident in recent years. So many people have no impression on him. I hope they will get better.
Evil eight
http://www.eviloctal.com/
In 2002, it was created by the cyclist of ice sheet. At that time, it was operated in group mode, and it has developed to have more than 30 people's information security team. The home page is very simple, but the content of the forum is very rich, involving many areas, often go to the academic data there, the forum management is the best in the forum I have ever seen. And the discussion atmosphere is also very good. The monks have a relatively enthusiastic, and the technology is relatively enthusiastic. I wish this organization get better. I am full of expectations for this team.
Phantom
http://www.ph4nt0m.org/
Founded in 2001, it has developed to 20 people now, and the recent organization has launched a Wiki platform (http://www.secwiki.com), which involves wireless networks, viruses and anti-viruses, and hacker technology. All friends can go there to graffiti. Opened forum in 2002, the current technical discussion atmosphere of the Forum is still still, and it is also very enthusiastic. I believe that this organization can go.
Whitecell
http://www.whitecell.org/
A pure technology exchange site founded in 2001. At that time, the core members had Sinister, figs, etc., are famous for domestic famous masters. After 2002, it was closed, and recently it was back. Homepage and forums are still very simple. I hope this return will bring you a new meteorological.
China Safety Net
Http://www.safechina.net/2001 founded in April, after several revisions, the team also developed a lot, I was familiar with Yellow, Phoenix et al. By now, this website is still in revision, but the forum is still open, there is still discussion space here. People in the organization are also good. I hope that there will be a big change after this revision :).
Eighth Army
In 2000, Chen Sanzong was established, and after several revision. Become a VIP site, the resource collection is still good. The monks often go there to find a proxy server, and the speed of the update is still ok. The discussion atmosphere in the forum is not very enthusiastic. I hope that the future will be better.
For two years, the hacker organization established
BCT
http://www.cnbct.org/
An organization of a special excavation script vulnerability was established at the end of 2004. It has been developed for a year. At the bottom with H4K_B4N, fpx is some contact. I feel that this organization is good, although there is no implied thing, this silent research technology is still worth carrying forward, and it is much better than those shakes. Some vulnerabilities are collected on the website, which is better to do. I hope to continue to work hard and grow better.
Firefox Technology Alliance
http://www.wrsky.com/
An organization established in 2004 is committed to cracking from the organization. It is very controversial for their organization, and once he suffered a violent refusal service attack, it caused the website to grow up for a few months, and now is a forum system. For this organization, there is still controversial so far. I hope to calm down as soon as possible.
Hacker technology
http://www.hackart.org/
The organization established in 2003, which was previously used by Joac's entire station, and later closed. It is also a recently reopened site, using the forum system, and the mandatory man and Jambalaya there are good friends. Their technology is still nice. Now that the forum is very popular, it is obviously the old station to reopen, knowing the people don't have much, I hope to recover the vitality in the future, continue to develop.
The three major commercial hackers sites in China.
Hacking base
http://www.hackbase.com/
Established in 2003. Stationmaster Dragon Brother.
Black Eagle Base
http://www.3800cc.com/
Business hacking site created by Mit.
Huaxia Hacker League
http://www.77169.com/
Site created by a strange dog in 2004.
In fact, the number of hackers is not worth a lot, I am just a few famous.
Let's talk about the characters, now there are more and more hackers, I focus on the masters who have a system and vulnerability, of course, they have to make anything about invasion. Note that this is not ranking, not the first is the most powerful, and the last one is the worst technology, if this is wrong.
Because sometimes thinking about the effort, I will enter the cow's Blog and some forums to see, so you can easily remember, know who wrote.
Let's find http://www.0x557.org/ ~ kkqq/ first, then in the article and the forum from the security focus.
Alert7
QQ: 415451
Email: alert7@xfocus.org
http://blog.xfocus.net/index.php?blogid=12
The core member of the security focus is once tonic. Exquisite Linux operating system, there is a study on the vulnerability under Linux.
Baozi (FATB)
QQ: 48448355
http://blog.xfocus.net/index.php?blogid=3
The invasion under Windows and Linux is very proficient.
Coolq
QQ: 49462335
http://coolq.blogdriver.com/coolq/index.html
Email: qufuping@ercist.iscas.ac.cn I am also known at the summit of the security focus 05, is a student of the Institute of Software Research Institute of the Chinese Academy of Sciences, which is very studied for Linux. In the last phase of Phrack Magazine has his article "Hacking Grub for Fun and Profit" is also one of the three Chinese people published in this issue. In addition, there is also "Ways to Hide Files in Ext2 / 3 FileSystem"
BKBLL (Dumplogin)
Email: bkbll@cnhonker.com
http://blog.0x557.org/dumplogin/
The core member of China's Hongke Alliance, with Lion has participated in the Chinese and American hackers. There is also research on Windows and Linux. Works have "Analysis of POSIX Subsystem Permissions to Improve Vulnerability"
Flashsky
QQ: 16202253
Email: Flashsky@xfocus.org
http://www.qjclub.net/blog/user1/497/index.html
Security focus core member. The buffer overflow on the Windows operating system, that year, he published Ni vulnerabilities in Microsoft. Microsoft also condemned the security focus. Now, in the Queen Star.
Flier Lu
Email: Flier@nsfocus.com
http://flier_lu.blogcn.com/
The masters of the Green Alliance, the WINDOWS operating system kernel, works with "MS.NET CLR Extended PE Structure" Automatic Verification Windows NT System Services Description Table "" CLR China Code Access Security Detection Implementation Principle ", etc.
Funnywei
QQ: 25044885
Email: funnywei@xfocus.org
http://blog.xfocus.net/index.php?blogid=28
Security focus core members, familiar with the Windows operating system. Works have "WindowsXPSP2 overflow protection"
Glacier
QQ: 1937435
Email: glacier@xfocus.org
http://blog.xfocus.net/index.php?blogid=15
Security focus core members, proficient in Windows programming, network programming, Delphi, etc. It is the author of Ice Trojan and the famous scanning software X-Scan.
ICBM
Email: Icbm@0x557.org
http://blog.0x557.org/ICBM/
Exquisite Linux operating system kernel and vulnerability. Beginning in the Queen Star. The article "Building PTRACE INJECTING SHELLCODES" is the author of Linux kernel vulnerability.
Killer
QQ: 6362602
Email: killer@xfocus.org
http://blog.xfocus.net/index.php?blogid=2
Safety focus irrigation area. Proficient in reverse engineering, program crack.
PJF
QQ: 85863144
http://pjf.blogcn.com/
The famous test tool Icesword (ice blade) author. Many programmers and masters who write rootkit are targets to bypass it. Familiar with the Windows operating system kernel.
Refdom
Email: refDom@xfocus.org
http://blog.xfocus.net/index.php?blogid=11
Safety focus core members, "anti-spam technology analysis" author. It seems that people who used to be a red guest alliance.
Stardust
QQ: 6269692
Email: Stardust@xfocus.org
http://blog.xfocus.net/index.php?blogid=7
Security focus core member. Familiar with Linux, proficient in IDS. Works have the "Analysis of Bro Nids" "Snort 2.x Data Search Rule Options" "" Bro Nids Install and Configuration "" "BRO NIDS Installation and Configuration"
QQ: 47347
Email: shellcoder@163.com
http://blog.9cbs.net/sunwear/
Evil Eight Binary Core Member. Was through the Windows operating system kernel. The work has "Method for using NTLDR into RING0 and MGF Virus Technical Analysis" "Analysis" "Intelligent ABC Input Flow Overflow Analysis"
Swan
Email: Swan@xfocus.org
http://blog.0x557.org/swan/
There is a research on the buffer overflow vulnerability. The nearest MS05051 Microsoft Windows DTC vulnerability Exploit is him.
Tombkeeper
QQ: 644909
http://blog.xfocus.net/index.php?blogid=9
Security focus core member. Was through the Windows operating system kernel. The work is
Watercloud
http://blog.xfocus.net/index.php?blogid=6
Security focus core member. Was through the Windows, Linux operating system. Works with
Zwell
Email: Suei8423@163.com
http://blog.donews.com/zwell
Nb Alliance core member. Self-passing the Windows operating system, works with
ZZZEVAZZZZZ
QQ: 49322630
Http://zzevazz.bokee.com/index.html
Phantom brigade core member. People in gray trajectory. Was through the Windows operating system kernel. Works with
Xiao Yi
http://www.netxeyes.org
The authors of stream lighting, chaos, snow and command line SQL injection tools. Chinese second-generation hackers.
Lion
QQ: 21509
Email: lion@cnhonker.com
http://www.cnhonker.com
The original China's Hongke Alliance is a very research on the buffer. Plenty of Linux.Windows.
ISNO
QQ: 1070681
Email: isno@xfocus.org
Safety focus core members, proficient buffer overflow vulnerabilities. The author of the webdav overflow program. Analysis of IdQ, IDA vulnerability overflow, and so on.
Sinister
QQ: 3350124
Email: SINISTER@whitecell.org
White cell members. Self pass the Windows kernel, AIX. Works with
Yuan Ge
Email: yuan@nsfocus.com
Now, in progress in Zhonglian Green League. Exquisite Windows operating system kernel and vulnerability utilization.
WARNING3
Email: Warning3@nsfocus.com
MSN: Warning3@hotmail.com
Excerpt Linux UNIX kernel and vulnerabilities. Now, in progress in Zhonglian Green League. Works with
Sobeit
QQ: 27324838
Email: kinvis@hotmail.com
Wild WINDOWS programming and overflow in the system kernel. The work has "Windows Nuclear Tester Principle Analysis", "Hook Windows API" and so on "Let yourself" disappear "in the NT series operating system" XHACKER
QQ: 66680800
Proficient penetration intrusion and script invasion. Works have the permissions and prevention of virtual websites> How to use hacker technology to track and analyze a target person>
Eyas
QQ: 320236
Email: Eyas@xfocus.org
Security focus core members, familiar with the Windows operating system, Windows programming. The work has the "NT platform dial connection password recovery principle", "WS_FTP ftpd stat command remote overflow analysis"
Lonely swordsman
QQ: 5385757
Email: Janker@hackbase.com
Http://www.janker.org
Excellent programming. And intrusion technology. Winshell author. Chinese second-generation hackers.
Sunx
QQ: 239670
http://www.sunx.org
Overflows have been studied, written by IDA vulnerability and Printer vulnerability. Proficient in assembly. There are many books.
Analysist
QQ: 20116789
Excellent database and script intrusion. There is a research on cross-station scripts and many script vulnerabilities in the early years. The work has "cross-station scripting execution vulnerability details", "security hazards in BBS2000 and BBS3000"
Frankie
http://cnns.net
Was through the Windows operating system, with Linux. China's first generation of hackers.
Rootshell (FZK)
QQ: 1734398
http://www.ns-one.com
Was through the Windows operating system, familiar with the buffer overflow vulnerability. Old generation hacker. Works have the Remote Overflow Problem of Recent Discovered File Systems>.
PP
QQ: 82928
Self-WINDOWS operating system. Quotation: If you want to fly high, you should forget the skyline.
Tianxing
OICQ: 911189
Website: http://www.tianxing.org/
Writing Windows operating system and vulnerability utilization. The RPC vulnerability utilization program and the author of the network assassin, the network guard.
Grip2
QQ: 1007270
Excerpt Linux operating system. Works with
San
QQ: 56941
Was through the Windows operating system and Linux. And it is very research on Windows CE. In the last magazine of Phrack, he published his article.
Hume
QQ: 8709369
Excellent assembly and Windows operating system. Works have "research" research "in SEH IN ASM
Backend
Email: backend@ctionline.org
Excerpt Linux operating system. Translated a lot of articles and a master of the Green Alliance. However, I haven't seen it in the upper reaches of the network for a few years. It is time to see him in reality.
ADAM
QQ: 15898
Email: adam@nsfocus.com
The master of the Green Alliance, the Windows Safety version of the Lord. Self-WINDOWS operating system.
IPXODI
QQ: 16175535
Email: ipXodi@nsfocus.com
I haven't seen him for a long time. Wild Windows operating system and buffer overflow. The work is available in the
zer9
QQ: 573369
Email: zer9@21cn.com
I haven't seen it for a long time. Many articles and tools have been written early. It is also an old man's revolutionary.
WHG
QQ: 312016
Email: WHG0001@163.com
http://www.cnasm.com
I don't know if it is not a member of white blood cells, huh, huh. Virus master. Proficient in assembly. Write a lot of software, such as the Sniff QQ tool and Sniff tool, etc., you can go to his homepage.
LG_WU
Email: lgwu2000@sina.com has seen in the green alliance forum and the security focus, and it is very popular with Linux. Technology is not general.
Wowocock
QQ: 37803144
Self-WINDOWS operating system kernel, compile. In the drive development network and the CVC is clear, the technology is not general. There are many books, but there are few very few. I don't know why this good article is no longer turned!
Baiyuanfan
QQ: 51449276
This kid gives me the impression on the summit. It is very technically worked hard. There is also research on Windows. Work is of course by Byshell.
vxk
QQ: 355852911
The assembly technology is very hard, and the Windows kernel is proficient. I often see him at the CVC Forum.
Ice and blood
QQ: 124839278
The founder of evil eight branches. China's fourth-generation hacker. I feel that this person is very good. It is more recognized to his organization. It is also possible to technology.
Polymorphours (shadow3)
QQ: 120974745
White cell members. Previously called Shadow3. It seems to change the name. Familiar with the Windows operating system, and buffer overflow. Works include
E4GLE
QQ: 1949479
White cell members. Old generation hacker. Exquisition Linux system kernel and viral technology, buffer overflow. Works include
bingle
QQ: 45671342
A brother who knows very early. Many work is very practical.
Wollf
QQ: 228095
Glacier's wife. I can't let him know who I am, or I will die. She is a hacker;) Beauty hacker!
Goodwell
China's early famous hackers - one of the founders of the Green Corps.
Yellow
QQ: 12398890
Core member of China Safety Net. Familiar with the buffer overflow with Windows programming.
Jianghai guest
QQ: 741534
I have seen him when I have participated in a meeting, and I can talk about it, and then I have touched it again when the summit will be. This person is an anti-virus master.
ICMB
Masters in Queens, Linux. There is also a study on vulnerabilities. Don't take your eyes more beautiful ...