Ok ! here is the links about him. Listen it from mouth of others so that you can trust not only to me but waht everyone says. Then I will post many many emails also in same section with header files which are evidence in itself about fact behind this Ankit Fadia.
Source1) - http://lists.grok.org.uk/pipermail/f...er/009654.html
Ankit Fadia ************ is torn apart in this one.
Follow it carefully.
Ankit Fadia says "Asian CIOs need to be more attentive
to the threat of corporate espionage, he cautions.
Source2) - http://en.wikipedia.org/wiki/Talk:Ankit_Fadia
 Looks like Self Promotion This article reads more like a CV rather than a wiki article.
Is this self promotion or what???
Age According to this, Fadia is 22 as of 2006, so I just plain took it out until somebody can fill in the exact date. -- Ricky81682 (talk) 08:57, 12 July 2006 (UTC)
Source3) - http://www.amazon.com/gp/product/cus...nDate&n=283155
1 of 1 people found the following review helpful:Not as 1337 as it seems, August 28, 2006 Reviewer: James R. Mcpherson - See all my reviews
I bought this book thinking that I might learn something new about how to protect my computer. After reading the first little bit I realized I already knew all of it because it was all already on the internet. Pretty much this guy got all of the (basic) tutorials for hacking on the internet and compiled them into a book. Also, almost nothing in this book will work if you have minor network security. All the people that gave this a 5 star rating are not very smart. They are impressed because some tough 1337 hacker told them how to crack into systems wreck havoc. Yeah, right. Save the money and read tutorials on the internet. Do not buy.
Comment | Was this review helpful to you? (Report this)
An Email I recieved from a victim of Ankit Fadia Certified Ethical Hacking
(Alongwith header file for evidence)
a 22.214.171.124; Wed, 06 Dec 2006 11:00:13 +0530
Authentication-Results: mta136.mail.in.yahoo.com from=gmail.com; domainkeys=pass (ok)
Received: from 126.96.36.199 (EHLO wx-out-0506.google.com) (188.8.131.52)
by mta136.mail.in.yahoo.com with SMTP; Wed, 06 Dec 2006 11:00:13 +0530
Received: by wx-out-0506.google.com with SMTP id i26so92296wxd
for <firstname.lastname@example.org>; Tue, 05 Dec 2006 21:30:12 -0800 (PST)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws;
Received: by 10.70.75.14 with SMTP id x14mr629755wxa.1165383011986;
Tue, 05 Dec 2006 21:30:11 -0800 (PST)
Received: by 10.70.133.1 with HTTP; Tue, 5 Dec 2006 21:30:11 -0800 (PST)
Message-ID: <e6d5828d0612052130q2803e7b3jab8e96f334efb65f@mail .gmail.com>
Date: Wed, 6 Dec 2006 11:00:11 +0530
From: "Gaurang Parmar" <email@example.com>
Subject: Want to Know About CEH.
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Disposition: inlineHello,Once i have sended the mail and u have replied me and asked more about
me. thanx for urkind eply. Now a days where r u living??.I m S/W engg. doing a job in small software company @ ahmedabad and
living at Isanpur,Ahmedabad i think u know this place.today i m asking about CEH. it is really a good course to do and have
a good oppertunity to have security expert jobs.Before some day i have registerd for the Ankit Fadia's CEH at reliance
web world and i don't think it is really good content and they only
shows the pre captured ankit's video. only two times we have a video
conference with ankit.May i know what should be good kills should one have to become a hacker.
i found u have not hacking other things then bank esystems means
checking the system.pls tell me more about CEH and how to become CEH from where should i
do CEH in ahmedabad on is it possible to have a online education.Gaurang Parmar
Source5) - http://www.gather.com/viewArticle.js...81474976859028
An out of society & non-standard category in very bad language. Comment on one of my article without any sufficient reasons which is posted on Gather.com
Source6) - http://seclists.org/fulldisclosure/2003/Aug/0298.html
Re: Ankit Fadia bullshit?
This message: [ Message body ] [ More options]
Related messages: [ Next message ] [ Previous message ] [ In reply to ] [ Next in thread]
<address class="headers">From: Cutthroat Truth <cutthroat_truth_at_yahoo.co.uk>
Date: Thu, 7 Aug 2003 12:40:41 +0100 (BST)
</address> Screw that racist remarkAnkit Fadia's website's all web files were deletedSherlock Homes of cyberworld, and self-claimed FBI
Consultant and Self-claimed CIA consultant and
self-claimed ethical hacker got hacked himselfwhat a shame
Source7) - http://groups.google.com/group/lug-i...1fb4f3d1185868
Ankit Fadia : The real picture
From: Prabhat ShandeliyaDear All,Yesterday (03-04-2006)I attended a seminar by a so-called "Hacking Guru"
Ankit Fadia, at DAVV, Indore (MP) auditorium. I just want to share my
feelings with you.The Seminar was a complete failure, though it was attended by about well
over 100 people, but was a complete disaster.The very first thing by which I was offended badly was using the sacred word
"Hacking" to demonstrate something we, the hackers, call cracking. The
seminar topic was "Ethical Hacking", now I want to ask Mr Fadia, what is
unethical about hacking ? Hacking is very positive word and there in no need
to put "Ethical" before it. By the way his seminar topic should be "Ethical
Cracking".If you really want to become a hacker, please read an article by a real
hacker, Eric Steven Raymond (ESR). The man who changed the history by
writing a paper "Cathedral and Bazaar". please read the article here :
people who can not differentiate between hacking and cracking, should
read an article by the GOD of hackers Richad M Stallman (RMS), the man who
started GNU movement all by himself. The gcc (compiler), gdb (debugger),
emacs (editor) are some of the most popular softwares in the world written
by him. Please read the article here :
things Fadia demonstrated were ancient techniques used by crackers to
break into some one's machine. Now a days even 10 year olds can download
these tools from Internet to control others' machines. Can we call them
hackers ?? If he calls it hacking, I doubt if he understands the term even
"Cracking", leave hacking altogether. This childish behavior is called
script kiddie.IP spoofing, SQL Injection, password cracking softwares, Trojan horse
programs, these are the tools of cyber criminals. So I wonder what is the
significance of the term "Ethical" here ??In the entire session I kept waiting for some program or utility, written by
himself. But I don't thing he had something like this to share with
audience. The entire session was demonstration of third party utilities, and
the saddest thing was no mention of the name of any author of any utility.
He didn't care to give some credits to the utility developers. What a shame