Skip to main content

Pakistani Hackers Hacked Bangladesh Google Domain


Earlier today, Pakistani hackers from Pak Cyber Attackers have targeted Google Bangladesh domain and shown the deface page on www.google.co.bd domain .
A hacker called Faisal Leet have hacked into the domain registry of Bangladesh Telecommunications Company Ltd (BTCL), from where Google country domain was also registered. Hackers have modified the DNS records of Google Bangladesh and redirects all users to deface page. This technique is also know as DNS poisoning.
HackRead reports that the hacking group behind this takeover is generally known for breaching high profile Indian government and law enforcement websites. This is the first time the group has targeted a Bangladesh domain.
The Internet users in Bangladesh were shocked when they witnessed their search engine giant’s domain displaying “Pakistan Zindabad” (Long live Pakistan) slogan. Confused with the situation, users took it to Twitter to get the clear picture of what’s going on.
OMG! https://t.co/E8gmKTnYuO (#Google #Bangladesh ) has Hacked #Googlehacked pic.twitter.com/wcjvYcabhX 
__Hasibul Kabir(@hkhasib) December 20,2016
On this issue Google had quickly redirects its users to its main international .com domain i.e. www.google.com.
This is not the first time that hackers have targeted Google domain. Earlier also Pakistani hacker called LEET have hacked numbers of Google countries domain. Not only Google, he had also targeted other high profiled sites including Microsoft, Yahoo, Bing, AOL, and many Indian NIC servers.

Comments

Popular posts from this blog

Ethical Hacking Modules And Pdf Full Download

DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about Ethical Hacking Modules. Here Download All Module(Pdf) Content Module 01 Exploit Writing Module 02 Using Metasploit Framework Module 03 Footprinting Module 04 Google Hacking Module 05 Scanning Module 06 Enumeration Module 07 System Hacking Module 08 Trojans and Backdoors Module 09 Viruses and Worms Module 10 Sniffers Module 11 Social Engineering Module 12 Phishing Module 13 Hacking Email Accounts Module 14 Denial of Service Module 15 Session Hijacking Module 16 Hacking Webservers Module 17 Web Application Vulnerabilities Module 18 Web based Password Cracking Techniques Module 19 SQL Injection Module 20 Hacking Wireless Networks Module 21 Physical Security Module 22 Linux Hacking Module 23 Evading IDS Firewall and Honeypot Module 24 Buffer Overflows Module 25 Cryptography Module 26 Penetration Testing Module 28 Wri...

Hacker HighSchool(old and best collection) 13 ebooks

DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about Hacker High School(old and best collection) 13 ebooks. Here Download Also Module and Lab PDf File.. Name Of  Ebooks:- 1.System_Identification 2.Malware 3.Attack_Analysis 4.Forensics 5.Email_Security 6.Web_Security_and_Privacy 7.Passwords 8.Legalities_and_Ethics 9.Glossary 10.Being_a_Hacker 11.Windows_and_Linux 12Ports_and_Protocols 13.Services_and_Connections Download Now Note: First Download Full Module(For Understand) and Then Download Full Lab Pdf...... Enjoy ......Keep Visit.. :))

HACKING - GUIDE Learn Ethical Hacking Within 12 Hours!(PDF Tutorial)

DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about  Ethical Hacking Guild. Table of Contents:- Hour 1: Introduction to Hacking and Types of Hackers 1.1 What is hacking? 1.2 Types of Hackers 1.3 What is Cybercrime? 1.4 What is ethical hacking? 1.5 Do we need ethical hackers? 1.6 Legality of ethical hacking Hour 2: Build your Kali Linux hacking environment! 2.1 Caution for Beginners: Do not be ‘that guy.' 2.2 What is Kali Linux? Step 1: Download the software you need Step 2: Install VMware Station Player Step 3: Set up Kali Linux on VMware Step 4: Install Kali Linux Step 5: Login to Kali Linux on VMware Hour 3: An Introduction to the Linux Terminal and CLI 3.1 The Terminal Emulator 3.2 The Shell 3.3 The Command Prompt 3.4 Executing Commands 3.4.1 Execute commands without arguments or options 3.4.2 Execute commands with arguments 3....