Skip to main content

KEVIN MITNICK

GREATEST HACKER IN THE WORLD:

KEVIN MITNICK:




     Kevin mitnick is an American hacker. Born on 6 August 1963( age 58 years) van nuys, los angels, California, United States. He is a security consultant, author and convicted hacker. He is the number 1 hacker in the world. The U. S department of justice called him the "Most wanted computer criminal in history".

EDUCATION:





     He grew up in Los angels and studied in the James monroe high school is located in Fredericksburg, virgina. During the time he became an amateur radio operator. He later studied at Los Angeles pierce College and USC. He worked as a receptionist for Stephen s. Wise temple. He called by the other names The condor, the dark side hacker. 

Hacking Activities:





      At age 12 mitnick use the social engineering and dumpster diving to bypass the punch card system used in los Angeles bus system. Dumpster diving is a retrieve information that could be used to carry out an attack on a computer network. In U. S. A it is not a crime. He used this two attacks to ride any bus in the greater area using unused transfer slips. He found a dumpster next to the bus company garage. He use social engineering attacks to obtain the informations including usernames and passwords and modem phone numbers.At the age of 16 he first gained unauthorized access to computer network in 1979.His friend gave him the phone number of "The Ark".Ark is a system name. This system was used to maintain the source code for DEC's RSTS/E operating system software. RSTS/E an acronym for Resource sharing time sharing extended was a multi user time shared operating system developed by DEC. He hacked DEC(Digital Equipment Corporation's) and copied the company's software.At that incident in 1988 he went to the prision and three years supervised release. Before the end of supervised release he hacked into pacific bell voicemail computers. According to U. S department of justice mitnick cracked dozens of computer networks while he was fugitive. In 1995 February, FBI arrested Kevin mitnick at his apartment Raleigh, North Carolina, he arrested for wire fraud. He found with the cloned cellular phones, and multiple pieces of false identification. He used cellular phones to hide his location and copied valuable proprietary software from largest cellular telephones and computer companies. Five years in prison for various computer crimes. In December 1997,the yahoo website was hacked, displaying a message called for mitnick's release. Yahoo website been infected with a computer worm that would wreak havoc on Christmas Day unless mitnick was released. In 1999 mitnick pleaded guilty to four counts of wire fraud, as a part of a please agreement before the United States district court for the central District of California in Los Angeles. He was sentenced to 46 months in prison plus 22months for violating the term of his 1989 supervise release sentenced tor computer fraud. He was released on January 21,2000.During his supervised release it ended on January 21,2003.He prohibited to use any other technologies other than a landline telephones. Mitnick winning a ruling in his favor in Court to access internet.




 John markoff and Tsutomu shimomora who are the part of the pursuit of mitnick wrote the book take down about mitnick's capture. In 2000 he does security consultant for Fortune 500 companies and the FBI, and world largest companies and teaches the social engineering classes to dozens of companies and government agencies. Mitnick now runs the mitnick security consulting LLC, a computer security consultancy and is part owner of KnowBe4. He gives a awareness training and simulated phishing testing. 



In 2002 , skeet ulrich and Russell wong potrayed Kevin mitnick and Tsutomu shimomora in the movie track down( base on the book take down and also known as take down outside the United States). The miramax made a movie about kevin's life. The film is a American crime thriller movie. It is directed by Joe Chappelle with as screen play by Howard A. Rodmann. 

MITNICK'S BOOKS:
          
         In his 2002 book, The Art of Deception, mitnick States he used social engineering attacks to gained passwords and codes. He did not use software programs or hacking tools for cracking passwords or exploiting computers. 

The Art of Intrusion: The Real story behind the exploits of hackers, intruders and deceivers. 

The Art of deception: controlling the human element of security, are both mandatory readings for security professionals. 

The Art of invisibility: The world's most famous hacker teaches you how to be safe in the age if big brother and big data. 

His last book "Ghost in the wires: my adventure as the world most wanted hacker".

Comments

  1. Really nice post! Thanks and God bless Really nice post! Thank you for posting this blog and sharing this useful information. I have not been hacked but I enjoyed this article to the core. Thanks https://www.hackerslist.co/

    ReplyDelete

Post a Comment

Popular posts from this blog

ETHICAL HACKING

ETHICAL HACKING: ๐—›๐—ถ๐—ถ ✋๐˜„๐—ฒ๐—น๐—ฐ๐—ผ๐—บ๐—ฒ ๐˜๐—ผ ๐—บ๐˜† ๐—ฏ๐—น๐—ผ๐—ด ๐—ด๐˜‚๐˜†๐˜€☺. ๐—ง๐—ต๐—ถ๐˜€ ๐—ฏ๐—น๐—ผ๐—ด ๐˜†๐—ผ๐˜‚ ๐—ต๐—ฎ๐˜ƒ๐—ฒ ๐˜๐—ผ ๐—น๐—ฒ๐—ฎ๐—ฟ๐—ป ๐—ฎ๐—ฏ๐—ผ๐˜‚๐˜ ๐˜๐—ต๐—ฒ ๐—ฒ๐˜๐—ต๐—ถ๐—ฐ๐—ฎ๐—น ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ๐ŸŽญ๐—ถ๐—ป ๐˜€๐—ถ๐—บ๐—ฝ๐—น๐—ฒ ๐—˜๐—ป๐—ด๐—น๐—ถ๐˜€๐—ต. ๐—ฆ๐—ผ ๐—ฑ๐—ผ๐—ป'๐˜ ๐—บ๐—ถ๐˜€๐˜€ ๐˜๐—ต๐—ถ๐˜€ ๐—ฏ๐—น๐—ผ๐—ด ๐˜๐—ผ ๐—น๐—ฒ๐—ฎ๐—ฟ๐—ป ๐—ณ๐—ฟ๐—ถ๐—ฒ๐—ป๐—ฑ๐˜€๐Ÿ˜˜  ๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด?                                                   ๐—ง๐—ต๐—ฒ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ๐˜€ ๐—ฎ๐—ฟ๐—ฒ ๐—ณ๐—ถ๐—ป๐—ฑ ๐˜๐—ต๐—ฒ ๐˜„๐—ฒ๐—ฎ๐—ธ๐—ป๐—ฒ๐˜€๐˜€ ๐—ฎ๐—ฏ๐—ผ๐˜‚๐˜ ๐˜๐—ต๐—ฒ ๐—ฐ๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ ๐—ผ๐—ฟ ๐—ฎ๐—ป๐˜† ๐—ป๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐˜๐—ผ ๐—ฎ๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐˜๐—ต๐—ฒ ๐—ฐ๐—ผ๐—ป๐˜๐—ฟ๐—ผ๐—น ๐—ฎ๐—ป๐—ฑ ๐˜๐—ต๐—ฒ๐˜† ๐—ฐ๐—ฎ๐—ป ๐—ฑ๐—ฒ๐˜€๐˜๐—ฟ๐—ผ๐˜†,๐˜€๐˜๐—ฒ๐—ฎ๐—น ๐—ฑ๐—ฎ๐˜๐—ฎ ๐—ถ๐˜€ ๐—ฐ๐—ฎ๐—น๐—น๐—ฒ๐—ฑ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด.  ๐—ง๐˜†๐—ฝ๐—ฒ๐˜€ ๐—ผ๐—ณ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด?  ✴๐—ช๐—ฒ๐—ฏ๐˜€๐—ถ๐˜๐—ฒ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ✴๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ✴๐—˜๐—บ๐—ฎ๐—ถ๐—น ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ✴๐—˜๐˜๐—ต๐—ถ๐—ฐ๐—ฎ๐—น ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ✴๐—ฃ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ✴๐—–๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด Web...

TOP 10 Famous Hackers In The World

TOP MOST 10 FAMOUS HACKERS IN THE WORLD: 1.JONATHAN JOSEPH JAMES :                                                               Jonathan Joseph James was an american hacker. His native in southflorida . He was a Grey hat hacker. In a mysterious PBS meeting, he proclaims,"I was simply glancingaround,playing around. What was a good time for me was a test see what could draw off".He was at the age 15 at the time he broke into NASA PCs and steal the programming worth around $1.7 million and also he caught more than the 3000 hidden messages from government employees and going to form the DTRA(Defense Threat Reduction Agency)a division of the United States Department Of Defense. On May 18,2008 at 25  years old he committed suicide by the gunshot. 2.KEVIN MITNICK:            ...