Famous hacker organization

xiaoxiao2021-03-14  192

First introduce the organization before zero.

Security focus

http://www.xfocus.net/

On August 26, 1999, it was created by Xundi, and the founder also has Quack and Casper. Later Stardust, ISNO, GLACier, Alert7, Benjurry, Blackhole, Eyas, Flashsky, Funnywei, Refdom, Tombkeeper, Watercloud, Wollf et al. Have also joined recently. Site homepage style has always been very simple. The organization has currently become the most authoritative information security site in China, and is also a domestic organization closest to the world.

At present, some domestic technical comparison articles are submitted by the author to the site, and some of the domestic well-known technologies will have a two master to go here. The atmosphere of discussion technology is OK. And some network security companies are also concerned about the forum here. The author of the popular famous scanning tool X-Scan is the organization of the organization.

Since 2002, a information security summit will be held each year, attracting many well-known online security experts at home and abroad to participate. The meeting involved many areas and received attention. Created a good academic exchange atmosphere. I wish this organization get better better.

China Red Guest Alliance (to dissolve)

http://www.cnhonker.com/

Borrowing this opportunity to explain that only this Hui Alliance is worthy of the true red guest alliance.

This organization is formed by Lion in December 2000. I have led many members to participate in the Chinese and American hackers in 2001, and the famous "rivers and lakes". However, this era has already passed away, and the past is also lost, and only memories of people left. On the last day of 2005, Lion announced official dispersion on the homepage. Perhaps many people are difficult to understand. However, this also the truth of someone. Now there is N Red League outside, I don't pay attention to them. Blessing Lion, Bkbll et al. I am lazy to Sharpinner.

Chinese eagle

http://www.chinawill.com/

Like the Red Guest Alliance, it was founded in 2000 and participated in the Chinese and American hackers in 2001. The stationmaster Wantao is also a member of the early Green Corps. And also participated in several network wars before 2000. The tissue is still not falling. There is no big incident in recent years. So many people have no impression on him. I hope they will get better.

Evil eight

http://www.eviloctal.com/

In 2002, it was created by the cyclist of ice sheet. At that time, it was operated in group mode, and it has developed to have more than 30 people's information security team. The home page is very simple, but the content of the forum is very rich, involving many areas, often go to the academic data there, the forum management is the best in the forum I have ever seen. And the discussion atmosphere is also very good. The monks have a relatively enthusiastic, and the technology is relatively enthusiastic. I wish this organization get better. I am full of expectations for this team.

Phantom

http://www.ph4nt0m.org/

Founded in 2001, it has developed to 20 people now, and the recent organization has launched a Wiki platform (http://www.secwiki.com), which involves wireless networks, viruses and anti-viruses, and hacker technology. All friends can go there to graffiti. Opened forum in 2002, the current technical discussion atmosphere of the Forum is still still, and it is also very enthusiastic. I believe that this organization can go.

Whitecell

http://www.whitecell.org/

A pure technology exchange site founded in 2001. At that time, the core members had Sinister, figs, etc., are famous for domestic famous masters. After 2002, it was closed, and recently it was back. Homepage and forums are still very simple. I hope this return will bring you a new meteorological.

China Safety Net

Http://www.safechina.net/2001 founded in April, after several revisions, the team also developed a lot, I was familiar with Yellow, Phoenix et al. By now, this website is still in revision, but the forum is still open, there is still discussion space here. People in the organization are also good. I hope that there will be a big change after this revision :).

Eighth Army

In 2000, Chen Sanzong was established, and after several revision. Become a VIP site, the resource collection is still good. The monks often go there to find a proxy server, and the speed of the update is still ok. The discussion atmosphere in the forum is not very enthusiastic. I hope that the future will be better.

For two years, the hacker organization established

BCT

http://www.cnbct.org/

An organization of a special excavation script vulnerability was established at the end of 2004. It has been developed for a year. At the bottom with H4K_B4N, fpx is some contact. I feel that this organization is good, although there is no implied thing, this silent research technology is still worth carrying forward, and it is much better than those shakes. Some vulnerabilities are collected on the website, which is better to do. I hope to continue to work hard and grow better.

Firefox Technology Alliance

http://www.wrsky.com/

An organization established in 2004 is committed to cracking from the organization. It is very controversial for their organization, and once he suffered a violent refusal service attack, it caused the website to grow up for a few months, and now is a forum system. For this organization, there is still controversial so far. I hope to calm down as soon as possible.

Hacker technology

http://www.hackart.org/

The organization established in 2003, which was previously used by Joac's entire station, and later closed. It is also a recently reopened site, using the forum system, and the mandatory man and Jambalaya there are good friends. Their technology is still nice. Now that the forum is very popular, it is obviously the old station to reopen, knowing the people don't have much, I hope to recover the vitality in the future, continue to develop.

The three major commercial hackers sites in China.

Hacking base

http://www.hackbase.com/

Established in 2003. Stationmaster Dragon Brother.

Black Eagle Base

http://www.3800cc.com/

Business hacking site created by Mit.

Huaxia Hacker League

http://www.77169.com/

Site created by a strange dog in 2004.

In fact, the number of hackers is not worth a lot, I am just a few famous.

Let's talk about the characters, now there are more and more hackers, I focus on the masters who have a system and vulnerability, of course, they have to make anything about invasion. Note that this is not ranking, not the first is the most powerful, and the last one is the worst technology, if this is wrong.

Because sometimes thinking about the effort, I will enter the cow's Blog and some forums to see, so you can easily remember, know who wrote.

Let's find http://www.0x557.org/ ~ kkqq/ first, then in the article and the forum from the security focus.

Alert7

QQ: 415451

Email: alert7@xfocus.org

http://blog.xfocus.net/index.php?blogid=12

The core member of the security focus is once tonic. Exquisite Linux operating system, there is a study on the vulnerability under Linux.

Baozi (FATB)

QQ: 48448355

http://blog.xfocus.net/index.php?blogid=3

The invasion under Windows and Linux is very proficient.

Coolq

QQ: 49462335

http://coolq.blogdriver.com/coolq/index.html

Email: qufuping@ercist.iscas.ac.cn I am also known at the summit of the security focus 05, is a student of the Institute of Software Research Institute of the Chinese Academy of Sciences, which is very studied for Linux. In the last phase of Phrack Magazine has his article "Hacking Grub for Fun and Profit" is also one of the three Chinese people published in this issue. In addition, there is also "Ways to Hide Files in Ext2 / 3 FileSystem"

BKBLL (Dumplogin)

Email: bkbll@cnhonker.com

http://blog.0x557.org/dumplogin/

The core member of China's Hongke Alliance, with Lion has participated in the Chinese and American hackers. There is also research on Windows and Linux. Works have "Analysis of POSIX Subsystem Permissions to Improve Vulnerability"

Flashsky

QQ: 16202253

Email: Flashsky@xfocus.org

http://www.qjclub.net/blog/user1/497/index.html

Security focus core member. The buffer overflow on the Windows operating system, that year, he published Ni vulnerabilities in Microsoft. Microsoft also condemned the security focus. Now, in the Queen Star.

Flier Lu

Email: Flier@nsfocus.com

http://flier_lu.blogcn.com/

The masters of the Green Alliance, the WINDOWS operating system kernel, works with "MS.NET CLR Extended PE Structure" Automatic Verification Windows NT System Services Description Table "" CLR China Code Access Security Detection Implementation Principle ", etc.

Funnywei

QQ: 25044885

Email: funnywei@xfocus.org

http://blog.xfocus.net/index.php?blogid=28

Security focus core members, familiar with the Windows operating system. Works have "WindowsXPSP2 overflow protection"

Glacier

QQ: 1937435

Email: glacier@xfocus.org

http://blog.xfocus.net/index.php?blogid=15

Security focus core members, proficient in Windows programming, network programming, Delphi, etc. It is the author of Ice Trojan and the famous scanning software X-Scan.

ICBM

Email: Icbm@0x557.org

http://blog.0x557.org/ICBM/

Exquisite Linux operating system kernel and vulnerability. Beginning in the Queen Star. The article "Building PTRACE INJECTING SHELLCODES" is the author of Linux kernel vulnerability.

Killer

QQ: 6362602

Email: killer@xfocus.org

http://blog.xfocus.net/index.php?blogid=2

Safety focus irrigation area. Proficient in reverse engineering, program crack.

PJF

QQ: 85863144

http://pjf.blogcn.com/

The famous test tool Icesword (ice blade) author. Many programmers and masters who write rootkit are targets to bypass it. Familiar with the Windows operating system kernel.

Refdom

Email: refDom@xfocus.org

http://blog.xfocus.net/index.php?blogid=11

Safety focus core members, "anti-spam technology analysis" author. It seems that people who used to be a red guest alliance.

Stardust

QQ: 6269692

Email: Stardust@xfocus.org

http://blog.xfocus.net/index.php?blogid=7

Security focus core member. Familiar with Linux, proficient in IDS. Works have the "Analysis of Bro Nids" "Snort 2.x Data Search Rule Options" "" Bro Nids Install and Configuration "" "BRO NIDS Installation and Configuration"

QQ: 47347

Email: shellcoder@163.com

http://blog.9cbs.net/sunwear/

Evil Eight Binary Core Member. Was through the Windows operating system kernel. The work has "Method for using NTLDR into RING0 and MGF Virus Technical Analysis" "Analysis" "Intelligent ABC Input Flow Overflow Analysis"

Swan

Email: Swan@xfocus.org

http://blog.0x557.org/swan/

There is a research on the buffer overflow vulnerability. The nearest MS05051 Microsoft Windows DTC vulnerability Exploit is him.

Tombkeeper

QQ: 644909

http://blog.xfocus.net/index.php?blogid=9

Security focus core member. Was through the Windows operating system kernel. The work is and more. I saw him at the focus summit, very handsome.

Watercloud

http://blog.xfocus.net/index.php?blogid=6

Security focus core member. Was through the Windows, Linux operating system. Works with Practice>

Zwell

Email: Suei8423@163.com

http://blog.donews.com/zwell

Nb Alliance core member. Self-passing the Windows operating system, works with

ZZZEVAZZZZZ

QQ: 49322630

Http://zzevazz.bokee.com/index.html

Phantom brigade core member. People in gray trajectory. Was through the Windows operating system kernel. Works with and more.

Xiao Yi

http://www.netxeyes.org

The authors of stream lighting, chaos, snow and command line SQL injection tools. Chinese second-generation hackers.

Lion

QQ: 21509

Email: lion@cnhonker.com

http://www.cnhonker.com

The original China's Hongke Alliance is a very research on the buffer. Plenty of Linux.Windows.

ISNO

QQ: 1070681

Email: isno@xfocus.org

Safety focus core members, proficient buffer overflow vulnerabilities. The author of the webdav overflow program. Analysis of IdQ, IDA vulnerability overflow, and so on.

Sinister

QQ: 3350124

Email: SINISTER@whitecell.org

White cell members. Self pass the Windows kernel, AIX. Works with

Yuan Ge

Email: yuan@nsfocus.com

Now, in progress in Zhonglian Green League. Exquisite Windows operating system kernel and vulnerability utilization.

WARNING3

Email: Warning3@nsfocus.com

MSN: Warning3@hotmail.com

Excerpt Linux UNIX kernel and vulnerabilities. Now, in progress in Zhonglian Green League. Works with

Sobeit

QQ: 27324838

Email: kinvis@hotmail.com

Wild WINDOWS programming and overflow in the system kernel. The work has "Windows Nuclear Tester Principle Analysis", "Hook Windows API" and so on "Let yourself" disappear "in the NT series operating system" XHACKER

QQ: 66680800

Proficient penetration intrusion and script invasion. Works have the permissions and prevention of virtual websites> How to use hacker technology to track and analyze a target person>

Eyas

QQ: 320236

Email: Eyas@xfocus.org

Security focus core members, familiar with the Windows operating system, Windows programming. The work has the "NT platform dial connection password recovery principle", "WS_FTP ftpd stat command remote overflow analysis"

Lonely swordsman

QQ: 5385757

Email: Janker@hackbase.com

Http://www.janker.org

Excellent programming. And intrusion technology. Winshell author. Chinese second-generation hackers.

Sunx

QQ: 239670

http://www.sunx.org

Overflows have been studied, written by IDA vulnerability and Printer vulnerability. Proficient in assembly. There are many books.

Analysist

QQ: 20116789

Excellent database and script intrusion. There is a research on cross-station scripts and many script vulnerabilities in the early years. The work has "cross-station scripting execution vulnerability details", "security hazards in BBS2000 and BBS3000"

Frankie

http://cnns.net

Was through the Windows operating system, with Linux. China's first generation of hackers.

Rootshell (FZK)

QQ: 1734398

http://www.ns-one.com

Was through the Windows operating system, familiar with the buffer overflow vulnerability. Old generation hacker. Works have the Remote Overflow Problem of Recent Discovered File Systems>.

PP

QQ: 82928

Self-WINDOWS operating system. Quotation: If you want to fly high, you should forget the skyline.

Tianxing

OICQ: 911189

Website: http://www.tianxing.org/

Writing Windows operating system and vulnerability utilization. The RPC vulnerability utilization program and the author of the network assassin, the network guard.

Grip2

QQ: 1007270

Excerpt Linux operating system. Works with

San

QQ: 56941

Was through the Windows operating system and Linux. And it is very research on Windows CE. In the last magazine of Phrack, he published his article.

Hume

QQ: 8709369

Excellent assembly and Windows operating system. Works have "research" research "in SEH IN ASM

Backend

Email: backend@ctionline.org

Excerpt Linux operating system. Translated a lot of articles and a master of the Green Alliance. However, I haven't seen it in the upper reaches of the network for a few years. It is time to see him in reality.

ADAM

QQ: 15898

Email: adam@nsfocus.com

The master of the Green Alliance, the Windows Safety version of the Lord. Self-WINDOWS operating system.

IPXODI

QQ: 16175535

Email: ipXodi@nsfocus.com

I haven't seen him for a long time. Wild Windows operating system and buffer overflow. The work is available in the . These articles are all benefiting a lot of people.

zer9

QQ: 573369

Email: zer9@21cn.com

I haven't seen it for a long time. Many articles and tools have been written early. It is also an old man's revolutionary.

WHG

QQ: 312016

Email: WHG0001@163.com

http://www.cnasm.com

I don't know if it is not a member of white blood cells, huh, huh. Virus master. Proficient in assembly. Write a lot of software, such as the Sniff QQ tool and Sniff tool, etc., you can go to his homepage.

LG_WU

Email: lgwu2000@sina.com has seen in the green alliance forum and the security focus, and it is very popular with Linux. Technology is not general.

Wowocock

QQ: 37803144

Self-WINDOWS operating system kernel, compile. In the drive development network and the CVC is clear, the technology is not general. There are many books, but there are few very few. I don't know why this good article is no longer turned!

Baiyuanfan

QQ: 51449276

This kid gives me the impression on the summit. It is very technically worked hard. There is also research on Windows. Work is of course by Byshell.

vxk

QQ: 355852911

The assembly technology is very hard, and the Windows kernel is proficient. I often see him at the CVC Forum.

Ice and blood

QQ: 124839278

The founder of evil eight branches. China's fourth-generation hacker. I feel that this person is very good. It is more recognized to his organization. It is also possible to technology.

Polymorphours (shadow3)

QQ: 120974745

White cell members. Previously called Shadow3. It seems to change the name. Familiar with the Windows operating system, and buffer overflow. Works include and more.

E4GLE

QQ: 1949479

White cell members. Old generation hacker. Exquisition Linux system kernel and viral technology, buffer overflow. Works include

bingle

QQ: 45671342

A brother who knows very early. Many work is very practical.

Wollf

QQ: 228095

Glacier's wife. I can't let him know who I am, or I will die. She is a hacker;) Beauty hacker!

Goodwell

China's early famous hackers - one of the founders of the Green Corps.

Yellow

QQ: 12398890

Core member of China Safety Net. Familiar with the buffer overflow with Windows programming.

Jianghai guest

QQ: 741534

I have seen him when I have participated in a meeting, and I can talk about it, and then I have touched it again when the summit will be. This person is an anti-virus master.

ICMB

Masters in Queens, Linux. There is also a study on vulnerabilities. Don't take your eyes more beautiful ...


New Post(0)