Skip to main content

Pakistani Hackers Hacked Bangladesh Google Domain


Earlier today, Pakistani hackers from Pak Cyber Attackers have targeted Google Bangladesh domain and shown the deface page on www.google.co.bd domain .
A hacker called Faisal Leet have hacked into the domain registry of Bangladesh Telecommunications Company Ltd (BTCL), from where Google country domain was also registered. Hackers have modified the DNS records of Google Bangladesh and redirects all users to deface page. This technique is also know as DNS poisoning.
HackRead reports that the hacking group behind this takeover is generally known for breaching high profile Indian government and law enforcement websites. This is the first time the group has targeted a Bangladesh domain.
The Internet users in Bangladesh were shocked when they witnessed their search engine giant’s domain displaying “Pakistan Zindabad” (Long live Pakistan) slogan. Confused with the situation, users took it to Twitter to get the clear picture of what’s going on.
OMG! https://t.co/E8gmKTnYuO (#Google #Bangladesh ) has Hacked #Googlehacked pic.twitter.com/wcjvYcabhX 
__Hasibul Kabir(@hkhasib) December 20,2016
On this issue Google had quickly redirects its users to its main international .com domain i.e. www.google.com.
This is not the first time that hackers have targeted Google domain. Earlier also Pakistani hacker called LEET have hacked numbers of Google countries domain. Not only Google, he had also targeted other high profiled sites including Microsoft, Yahoo, Bing, AOL, and many Indian NIC servers.

Comments

Popular posts from this blog

Ethical Hacking Modules And Pdf Full Download

DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about Ethical Hacking Modules. Here Download All Module(Pdf) Content Module 01 Exploit Writing Module 02 Using Metasploit Framework Module 03 Footprinting Module 04 Google Hacking Module 05 Scanning Module 06 Enumeration Module 07 System Hacking Module 08 Trojans and Backdoors Module 09 Viruses and Worms Module 10 Sniffers Module 11 Social Engineering Module 12 Phishing Module 13 Hacking Email Accounts Module 14 Denial of Service Module 15 Session Hijacking Module 16 Hacking Webservers Module 17 Web Application Vulnerabilities Module 18 Web based Password Cracking Techniques Module 19 SQL Injection Module 20 Hacking Wireless Networks Module 21 Physical Security Module 22 Linux Hacking Module 23 Evading IDS Firewall and Honeypot Module 24 Buffer Overflows Module 25 Cryptography Module 26 Penetration Testing Module 28 Wri...

Big List of Darknet (Deep Web) Hidden Websites 2017

Todays I will Share All Deep Web Link.I Hope I All Use Only For Education Purpose Only &  I am not responsible  Search Engine   http://3g2upl4pq6kufc4m.onion/ – DuckDuckGo Search Engine  http://xmh57jrzrnw6insl.onion/ – TORCH – Tor Search Engine  http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page – Uncensored Hidden Wiki  http://32rfckwuorlf4dlv.onion/ – Onion URL Repository  http://e266al32vpuorbyg.onion/bookmarks.php – Dark Nexus  http://5plvrsgydwy2sgce.onion/ – Seeks Search  http://2vlqpcqpjlhmd5r2.onion/ – Gateway to Freenet  http://nlmymchrmnlmbnii.onion/ – Is It Up?  http://kpynyvym6xqi7wz2.onion/links.html – ParaZite  http://wiki5kauuihowqi5.onion/ – Onion Wiki  http://torwikignoueupfm.onion/index.php?title=Main_Page – Tor Wiki  http://kpvz7ki2v5agwt35.onion – The Hidden Wiki  http://idnxcnkne4qt76tg.onion/ – Tor Project: Anonymity| Online   http://torlinkbgs6aa...

Hacking Web Apps full Pdf

DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about Hacking Web Apps  full PDF  Several people deserve thanks for helping move this book from concept to completion. The Lorimer crew provided endless entertainment and unexpected lessons in motivation. The development team at Elsevier helped immensely. Thanks to Chris Katsaropoulos for urging this book along; and Alex Burack, Dave Bevans, Jessica Vaughn, Meagan White, and Andre Cuello for shepherding it to the finish line. Finally, it’s important to thank the readers of the Seven Deadliest Web Attacks whose interest in web security and feedback helped make the writing process a rewarding experience. Here Download Also Module and Lab PDf File..   Chapter :- CHAPTER 1 HTML5 CHAPTER 2 HTML Injection & Cross-Site Scripting (XSS) CHAPTER 3 Cross-Site Request Forgery (CSRF) CHAPTER...