Hi I am your old blogger shivang and i am back with an interesting story. one of the world’s most notorious black hat hackers goes by the alias Condor, named after the Robert Redford movie, “Three Day’s of the Condor”. This is none other than the notorious, Kevin Mitnick. He has been a major thorn in the side of many companies computer networks since the beginning. His first major “crack” was in 1979, “. . .when a friend gave him the phone number for the Ark, the computer system at Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC’s computer network and copied DEC’s software. . .”This in turn gave him not only the ability to make free phone calls but also listen in and eavesdrop on anyone he pleased.
Kevin’s first run-in with the law was actually caused by an angry girlfriend of one of Mitnick’s associates. After physically breaking into the one of the U.S biggest Computer System for Mainframe Operations, “. . .a database used by many of the nation’s phone companies for controlling the phone system’s basic record keeping functions.”] He stole lists of computer passwords, including the combinations to the door locks at nine Pacific Bell central offices and a series of operating manuals for the COSMOS system. Mitnick was sentenced to three months in a juvenile correction centre and a years probation.
A few years later he was busted using one of the computers at the University of South California’s computers to hack into a computer at the pentagon using their ARPAnet. “The ARPANET (Advanced Research Projects Agency Network) developed by DARPA of the United States Department of Defense, was the world’s first operational packet switching network, and the predecessor of the global Internet.” Before any major harm could be accomplished he was busted by the universities campus enforcement.
A third incident occurred in 1988 when, “Kevin and a friend, Lenny DiCicco, fought a pitched electronic battle against scientists at Digital Equipment’s Palo Alto research laboratory. Mitnick had become obsessed with obtaining a copy of Digital’s VMS minicomputer operating system, and was trying to do so by gaining entry to the company’s corporate computer network, known as Easynet. The computers at Digital’s Palo Alto laboratory looked easiest, so every night with remarkable persistence Mitnick and DiCicco would launch their modem attacks from a small Calabasas, California company where DiCicco had a computer support job. Although Reid discovered the attacks almost immediately, he didn’t know where they were coming from, nor did the local police or FBI, because Mitnick was manipulating the telephone network’s switches to disguise the source of the modem calls.” This being Kevin’s biggest crime to date he pulled off all the stops, by even hacking into the phone companies data base and scrambling the address given off by the modem this dumbfounded the FBI I and added a new charge to wrap sheet, “Evading The FBI”. This time it turns out that Mitnick was his own worst enemy, being cursed with a sense of humour and a big ego Mitnick decided to the prank DiCicco by continuously phoning his boss claiming that, “DiCicco was in trouble with the Internal Revenue Service.” This continuous harassment inevitably cause DiCicco to confess and in turn Mitnick was busted as well. Mitnick then found himself sitting in a court room facing serious charges of count of computer fraud and one count of possessing illegal long-distance access codes. But in an unlikely and controversial turn of events, Mitnick was let off again with what some especially DEC think of as another slap on the wrist and was sentenced to one year in prison and six months in a counselling program for his computer addiction.
After finishing his rehabilitation in 1990 he got a job through his father’s friend at Tel Tec Detective Agency. “Soon after he began, someone was discovered illegally using a commercial database system on the agency’s behalf, and Kevin was once again the subject of an FBI investigation. In September the Bureau searched his apartment, as well as the home and workplace of another member of the original phone phreak gang. Two months later a federal judge issued a warrant for Mitnick’s arrest for having violated the terms of his 1989 probation. There were two charges: illegally accessing a phone company computer, and associating with one of the people with whom he’d originally been arrested in 1981. His friends claimed Mitnick had been set up by the detective firm; whatever the truth, when the FBI came to arrest him, Kevin Mitnick had vanished.”
He then reappeared in 1992 by using hacked law enforcement requester codes to get licences photos of a certain police informer from the Los Angeles D.M.V. Suspicions arose and the F.B.I were called in. They traced the fax numbers and realized it they belonged to a local copy shop, they then staked out this copy shop where then involved in a foot-chase against Mitnick were he escaped. Soon after he was then arrested.
Today Kevin Mitnick, after all his run-ins with the law has turned his life around he now run’s a computer security company named, “Mitnick Security Consulting” and co-authored two books, “The Art of Deception (2002) (Co-authors William L. Simon and Steve Wozniak), which focuses on social engineering, and The Art of Intrusion (2005) (Co-author William L. Simon), focusing on real stories of security exploits.” He really shows you that anyone can turn their life around no matter how many mistakes they’ve made.i am great fan of kevin mitnick… hacking is the passion for kevin… and i bet u can’t become hacker easily…

5 thoughts on “The darkside hacker – Kevin Mitnick

  1. Good – I should certainly pronounce, impressed with your web site. I had no trouble navigating through all the tabs as well as related information ended up being truly simple to do to access. I recently found what I hoped for before you know it in the least. Reasonably unusual. Is likely to appreciate it for those who add forums or something, web site theme . a tones way for your client to communicate. Nice task..

  2. Thank you so much for sharing the idea, I bookmarked this site. I am furthermore seeking out details on router configuration, are you aware the place where I could come across one thing like this? I will return in a little while!

  3. I’m truly enjoying the design and layout of your website. It’s a very easy on the eyes which makes it much more pleasant for me to come here and visit more often. Did you hire out a designer to create your theme? Outstanding work!

Leave a Reply

Your email address will not be published. Required fields are marked *