Endless Paradigm

Full Version: The Fifteen Greatest Hacking Exploits
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
Okay guys, this may take a bit to read it all, but I thoroughly enjoyed it, and I think a lot of you might too.  *takes a deep breath*   and..... ctrl+c ctrl+v ctrl+c ctrl+v...

Quote:The Birth Of Hacking

The society of the late 1970s and early 1980s was greatly influenced by the arrival of the personal computer; it was during this time that the computing technology was reduced in size enough to fit comfortably into the home and to be called "personal computers" or PCs.

While the number of PC users increased, a rather mysterious fringe element developed within this population: hackers. This term, popularized in 1983 by Newsweek magazine, describes users who prefer to dig into the innards of a computer, rather than simply use it. They are playful and curious, individualistic and smart, and have a passion for computers and networks. And they are also the nightmare of network administrators, security services and even the FBI.

Some hackers have left their marks on the history of computers, becoming idols for a whole class of newer computer users. Let's go back and take a look at these computer gods, some of whom could break every known protection, and even became involved in great virtual manhunts with the powers that be.

[Image: lamo_mitnick_poulsen.jpg]
Adrian Lamo, Kevin Mitnick and Kevin Poulsen

Kevin Mitnick

The most famous, and undoubtedly most gifted hacker in history, made a name for himself in 1981 at the tender age of 17 by getting into a phone exchange, which allowed him to redirect subscriber calls in any way he wanted. In 1983, he achieved his first major coup - and also his first arrest - when he accessed a Pentagon computer. It was his repeated offenses that made him a target of the FBI. He was sentenced to five years in prison in the 1990s, but today he is a security consultant and owns his own company: Mitnick Security.

Kevin Poulsen

The current editor-in-chief of Wired was formerly known for rather different activities. In 1983, when he too was only 17 years old, he made his first intrusions into different networks, resulting in a few run-ins with the US legal system. He continued with his illegal activities until his arrest by the FBI in April 1991. In 1994 he was sentenced to four years in prison.

Adrian Lamo

Lamo has certainly driven the highest number of network administrators insane. From Microsoft to Yahoo!, going through Sun Microsystems, MacDonald's, Cingular, AOL or even the New York Times, he is credited with all types of intrusions and corporate security system violations. He has bypassed protections with disconcerting simplicity: during a broadcast of the NBC Nightly News, the host asked him to prove his talents in front of the camera, and he responded by gaining access to the company's internal network in less than five minutes. Today he is an expert in security and enjoys full freedom of movement, after being under the surveillance of US authorities for many years.

John Draper
[Image: john_draper_hacker.jpg]

Better known as "Cap'n Crunch", Draper was one of the first hackers in history. This moniker comes from the cereal of the same name, inside of which he once discovered a toy whistle (provided as a gift to entice children to ask parents for the cereal). He discovered that he could use the whistle to hack a telephone line and get free phone calls - all that was necessary was to produce a precise tone in the receiver for the method to work. He was arrested in 1976 and sentenced to two months in prison.


Phreaking, The First Movement

[Image: john_draper.jpg]
John Draper

Even before trying to access the computers of the US Navy, geeks had their methods for shocking people and making themselves known. As mentioned just above, John Draper was one of the first hackers, and gained his fame using a child's toy.

A Magic Whistle...

In the late 1960s, after discovering a whistle inside a box of Cap'n Crunch cereal, he started his exploits. He had just become aware that those whistles were capable of generating a 2600 Hz tone, which was the frequency used by telephone lines to signal that a line was active. John Draper became one of the first users of this technique, which was rapidly christened "phreaking".

Draper's method was quite simple. First, he dialed a long-distance number, and while the number was ringing, he would use the whistle to send a tone at a frequency of 2600 hertz. This tone was similar to the one used by the telephone network to signal line status. By imitating this signal, he would make the telephone exchange believe he had hung up and that the line was free, even through the exchange had not received the actual signal corresponding to a call being hung up.
The Instigator of a New Movement

[Image: sifflet_draper.jpg]
Draper's Whistle

Draper's activities were discovered when his telephone company realized that his account showed strange billing patterns. An investigation disclosed the affair, and Draper was arrested in 1972. Prosecuting Draper took a long time, because it was the first time in history that the legal system had dealt with this type of fraud. Four years later Draper was sentenced to two months in prison.

His activities gave birth to a whole movement surrounding phreaking. A hacker and phreaker group arose and gave themselves the name "2600", and many other people also tried to find ways to stop paying for telephone calls.

Blue Box, Phreaking For The Masses

[Image: jobs_wozniak_bluebox.jpg]

Before his arrest, John Draper had a lot of the time to tell his friends about his discovery, and one of them was a personality who is well known in the computer world today, Steve Wozniak. The co-founder of Apple, along with his good friend at the time, Steve Jobs, perfected John Draper's technique and created the Blue Box, a device capable of producing tones at the frequencies needed to fool the telephone system.

Boxes to Call for Free... in the 70s!

The two Steves successfully used their Blue Box to make all sorts of calls, and decided to start selling them. The box's ease of use and small price tag quickly made it a popular object among a group of phreaking enthusiasts.

[Image: blue_box.jpg]
Jobs" and Wozniak's Blue Box

The Blue Boxes were more sophisticated than the simple whistles used by John Draper. They were capable of mimicking all of the tone frequencies used by operators. The most famous story involving the Blue Box tells how Wozniak used it to telephone the Vatican posing as Henry Kissinger. Allegedly, he wanted to speak to the Pope to confess.

Hijacking Lines: Mitnick At Work
[img]http://images.tomshardware.com/2008/03/14/the_fifteen_greatest_hacking_exploits/kevin_mitnick.jpg[img]

Like his predecessors, Kevin Mitnick also started hacking by modifying telephone lines in his neighborhood. In 1981, 17-year-old Kevin and a friend hacked a Computer System for Mainframe Operations (COSMOS) exchange belonging to Pacific Bell in Los Angeles. Once inside the system, he diverted the lines and intercepted all calls going through the exchange.

Subscribers quickly started to complain about what they thought were errors or practical jokes being played by operators. Kevin Mitnick would, of course, answer these calls himself, sometimes even using tasteless jokes.

Mitnick Sows Panic

But Mitnick did not stop there: he continued to latch onto Pacific Bell and its COSMOS system. He was able to enter the system's database, stealing the data of several subscribers. He easily gained access to billing statements, passwords, gateway combinations and even a system manual. He also profited from this access to divert lines for his personal use.

It was not until later that a Pacific Bell technician discovered abnormalities in the COSMOS system. An investigation was launched, quickly leading to the phone booth Kevin Mitnick used to make his calls and access the network; at that point, it was just a matter of waiting for him to appear and catch him in the act. Accused of data degradation and theft, Mitnick benefited from the judges' clemency, and was sentenced to three months in a reformatory and one year of probation.


Kevin Mitnick Enters The Pentagon

[Image: trs_80.jpg]

It was in 1983 that Kevin Mitnick achieved his major coup, a truly impressive hack. At that time he was a student at the University of South California. Using one of the machines at the university, probably a TRS-80 equipped with a Zilog processor at 1.77 MHz, Mitnick gained access to ARPANet, the ancestor of the Internet, which was then reserved for the Army, large corporations and universities.

Mitnick's Early Glories
[Image: pentagone.jpg]

By infiltrating this network, he gained access to the most protected computers of the time, those of the Pentagon. He had access to all files in the US Department of Defense. There was no evidence of data theft or degradation at the time: Mitnick simply followed his curiosity and tested his abilities.

The intrusion was detected by a systems administrator, who sounded the alert. The investigation led to the author of the exploit, and Kevin Mitnick was arrested inside the university campus. He was tried and served his first real sentence for illegally accessing a computer system, spending six months in a young adult detention center.

The Appearance Of Scrambled Communications
[Image: vax.jpg]

In 1987, Kevin Mitnick left his illegal activities behind. He was under probation following his last sentence, so he could not afford any transgressions. However, he would soon use his skills again for shady activities.

One evening, along with his fiend Lenny DiCicco, Mitnick gained access to the internal network of the research laboratory at Digital Equipment Corporation (DEC). This intrusion was not complicated for Mitnick, because DiCicco was an employee of the laboratory in question and served as an accomplice. EasyNet, DEC's internal network, did not withstand the hacker's attacks for long, and he quickly gained access to the whole system.

An Attack Carried Out with an Accomplice

As in his previous attacks, the intrusion was quickly discovered, but this time Mitnick had anticipated it. He scrambled the origin of the calls, rendering all attempts to trace him useless. And this time he was not infiltrating the network because of simple curiosity or as a challenge: he had a definite goal. He wanted to seize the source code of the VMS operating system, used by DEC on its VAX computers.

Our hacker had taken all precautions, but neglected one: his own friend. Mitnick loves games and practical jokes, so one day he called Lenny DiCicco's employer posing as a government agent. He said an employee (DiCicco) was in trouble with the IRS. This joke was not appreciated by DiCicco, who decided to get revenge in his own way.

DiCicco's Betrayal

DiCicco betrayed Mitnick, informing his employer about the latter's activities in the company network. He then contacted the FBI, telling them he could deliver the hacker that was regularly infiltrating the laboratory network. It was during a rendezvous that Mitnick fell for the trap set up by his friend, who was accompanied by two FBI agents for the arrest.

The case proceeded quickly, with DEC accusing the hacker of data theft and having cost the company upwards of $200,000 in security measures. He was sentenced to a year in prison, and had to enter a six-month program to treat his computer dependency.

The Creation Of The First Worm

[Image: robert_tappan_morris.jpg]

Hackers have been fond not only of intruding into networks; they also contributed to the creation of the first Internet worms. The concept of a worm is a bit different from that of classic hacking, but it goes back to the same principles: instead of getting into a network themselves, they send a small program they have coded to do the job. It is from this concept that Robert Tappan Morris, today a professor at the Massachusetts Institute of Technology (MIT), created the first Internet worm.

Once again, it was curiosity that drove Morris to create this worm. According to him, the main purpose of this program was to probe the Internet to estimate its size, that is, know the number of computers connected. At that time the Internet only connected a few machines, and the scope did not seem daunting for this little piece of code. However, Morris neglected a parameter when creating his worm, causing a lot more damage than he had anticipated.

A More Dangerous Worm than Initially Foreseen

[Image: massachusetts_institute_technology.jpg]

The Morris worm, which was sent from computers at MIT, was programmed to probe a computer and copy itself into the system if the machine was not already infected. The problem started when he imagined some system administrators might have the idea of circumventing the menace of this worm, by making it believe the machine was already infected when in fact it was not. Therefore, he modified his code to force a copy to be stored each time the worm accessed a computer, regardless of its infection status.

This caused the worm to spread like wildfire, infecting several thousand machines in a few hours. It was estimated that fixing each infected system cost between $200 and $53,000, depending on the machine. The worm mobilized different programmer teams to stop it, and it took several days for the attack to be neutralized.

Robert Tappan Morris was found guilty of computer fraud, and was sentenced to three years' probation, 400 hours of community service and a fine of $10,050.

A Game With The FBI And A 17-Month Pursuit

[Image: kevin_poulsen.jpg]

Kevin Poulsen is another name that circulated around FBI offices during the 1980s. He was arrested for the first time in 1989, when he was 24 years old. At that time he was charged with several intrusions into telephone and computer servers, with different types of incriminating evidence produced against him. When it came time to appear before a judge, though, he decided to flee, which led to a pursuit that kept the FBI on his trail for 17 months. It was during this period when he achieved his most famous hack.

Poulsen Taunts the FBI

[Image: wired_magazine.jpg]
A game contest launched by a Los Angeles radio station, KIIS-FM, asked its audience to phone in to try to win a Porsche 944 S2, a prize that would go to the 102nd caller. Kevin Poulsen went into action: he took control of all phone switchboard lines, effectively blocking all incoming calls, to ensure that he was the 102nd caller and win the prize. Poulsen profited from his nose thumbing at the FBI, teasing the authorities into searching for him while he again disappeared into the wild.

He was finally arrested by the FBI in April 1991 - it was an anonymous tip that allowed his capture, telling the authorities that Poulsen shopped at a supermarket in the outskirts of Los Angeles. He was charged in 1994, a process that ended with Poulsen being sentenced to four years in prison. This sentence was the heaviest imposed on a hacker at that time.


The Biggest Virtual Case


[Image: vladimir_levin.jpg]

Hacking is not just about curiosity or challenge, sometimes money is involved. Hacking a bank to get some money on the side is the best known example, and can sometimes result in the loss of millions. Such is the case, for example, of Vladimir Levin, who gained a share of infamy by stealing several million dollars under confusing circumstances.

Ten Million Dollars 'borrowed'

[Image: citibank_website.png]

In 1994, Levin infiltrated the internal network of the American bank Citibank, hacking the bank's analog connection and gaining access to several accounts. Once inside, he transferred $10.7 million to accounts in the United States, Finland, Germany, Israel and the Netherlands. He made these transfers with the help of three accomplices, who were instructed to recover the 'borrowed' sums.

His accomplices, however, were arrested when they tried to snatch the 'borrowed' funds. Their interrogation allowed the path back to Levin, who worked as programmer for a computer company based in St Petersburg, Russia, to be traced. He was arrested in March 1995 while on layover at Heathrow airport in London. Legal proceedings against him did not start until September 1997, and were completed in February 1998. He was sentenced to three years in prison.

Mitnick's Capture: A Battle Between Hackers

[Image: avis_recherche_mitnick.gif]
In 1994, Kevin Mitnick was back to his illegal activities, and wanted by the FBI. He was already known worldwide because of his exploits, and his portrait had been distributed all over, encouraging people who recognized him to call the authorities if they spotted him. It was during this year and the one following that Kevin Mitnick would become the object of the most spectacular manhunt launched against a hacker.

Mitnick Attacks a Rival

[Image: tsutomu_shimomura.jpg]

Mitnick decided to attack another hacker and security expert, Tsutomu Shimomura. His attack was well prepared, and to be certain nobody would disturb him, Mitnick launched it on Christmas Day, December 25, 1994. He hacked Shimomura's personal computer using a technique unheard of at the time, IP spoofing, which involves using a bogus IP address to avoid being discovered during an intrusion.

Mitnick was betrayed by Shimomura's firewall, however, which recorded all activity on the target machine. On December 26, Shimomura received a call from one of his colleagues informing him that his machine had been the victim of an intrusion. He quickly established a link to Mitnick, and decided to lend a hand to the FBI in arresting the hacker, by using his own hacking skills.

A Virtual Manhunt

Shimomura obtained carte blanche from the FBI, including authorization to use hacking to find Mitnick. The pursuit became a virtual chase; for example, Shimomura reported that he surprised Mitnick on January 17, 1995, when he infiltrated a network belonging to Motorola in order to 'borrow' the company's security software.

[Image: mitnick_arrestation.jpg]
Mitnick's Arrest

As the chase intensified, they started closing in on Mitnick, who retreated to the city of Raleigh, North Carolina. To find the cell phone Mitnick used to launch his attacks, Shimomura walked the streets of Raleigh for two days equipped with a communications detector. On February 15, 1995, at 2:00 in the morning, the FBI burst into Mitnick's apartment together with Shimomura. When he saw his rival, the fugitive exclaimed: "Hi, Tsutomu! Congratulations!" After a pursuit of almost two years, Mitnick was sentenced to five years in prison, at that time the harshest sentence ever given to a hacker.

16 Years Old And Infiltrating NASA
[Image: jonathan_james.jpg]

After the Army and the Pentagon, any hacker worthy of the name dreams about getting into NASA's servers, the protection of which is renowned. It was in 1999 that a young hacker with the nickname of c0mrade, better known as Jonathan James, accomplished this exploit at the age of 16.

On June 29 and 30, 1999, this young hacker made a mess of NASA using a simple Pentium computer. He gained access by breaking the password of a server belonging to the government agency located in Alabama. He was able to freely roam the network, and 'borrowed' several files, including the source code of the International Space Station.

Panic at NASA

According to NASA, the value of the documents 'borrowed' by James was estimated at around $1.7 million. To stop the attack, NASA was forced to turn off its systems and reboot them, incurring a loss of $41,000. The capture of the young hacker was fast, with NASA doing everything it could to find him.

However, his young age allowed James to avoid prison. A few lawyers estimated that, had he been an adult at the time, he would have spent at least ten years in prison for stealing documents classified as "defense secrets". Jonathan James, on the other hand, was satisfied with a bit of irony by saying "The code itself sucked... it was not worth the $1.7 million they said".

He Wanted To Know More About UFOs
[Image: gary_mckinnon.jpg]

After the Roswell affair and Area 51, countless rumors have circulated regarding the US Army and allegations that it hides certain things dealing with extra-terrestrial life forms. Fantasy for some, a serious subject for others - the debate still rages on. A 39-year-old Scot decided to contribute his own answers to it. How? Simply by invading the Army's computers...

Curiosity Leads to Jail


Gary McKinnon is a British hacker driven by curiosity, as most are - a curiosity that is unlimited, because he was quickly noted for achieving what some today call "the greatest computer attack against military sites of all time". Persuaded that the Army was hiding certain details concerning UFOs, between 2001 and 2002 he decided to access one of NASA's servers. The traces of this act were quickly found in computers belonging to the Army, Navy, Department of Defense, Air Force and Pentagon. In total he gained illegal entry to 97 machines, each time looking for information on flying saucers.

It did not take long for the US government to link the security breaches to McKinnon, and launch its pursuit. He was first arrested in 2002, before being released without charges due to a lack of evidence. A new arrest took place in 2005; this time he was released on probation, and stripped of his right to access the Internet. If he were to be extradited to the United States, he could face a sentence of up to 70 years in prison.

The Raid On The New York Times

[Image: adrian_lamo.jpg]
All sectors have fallen victim to hacker attacks, including the press. The most notable example is the New York Times, which in 2002 was targeted by the famous hacker Adrian Lamo.

Intrusion into the Heart of a Newspaper

The story of Adrian Lamo's attack on the New York Times site begins in February 2002, when he succeeded in gaining entry to the newspaper's internal network, and soon started modifying critical files. He modified confidential databases, in one of them, which listed the experts in contact with the newspaper, he added his own name. Another gave him access to all newspaper subjects, including those that had never been published.

These modifications were quickly discovered, and the newspaper of course filed a complaint. Adrian Lamo was arrested in August 2003 after an investigation that lasted over 15 months. He was sentenced to two years' probation, and $65,000 in damages were awarded to the Times.

DVD Jon, The Anti-DRM Hacker

[Image: dvd_jon_johansen.jpg]
DVD Jon, also known as Jon Johansen, is part of a particular genre of hackers known as crackers. Their purpose is not to enter a system or network, but to study how computers work and get into their internals. Starting in 2001, he quickly made a name for himself on the Internet, particularly by discovering ways to circumvent data protection systems--used on CDs, DVDs and other digital files--commonly known as Digital Rights Management (DRM) systems.

One of the projects that significantly contributed to making DVD Jon famous was his QTFairUse program in 2003. This deceptive name hid a piece of software that was capable of stripping DRM data, the system that restricts the use of media files - mainly music files purchased from Apple's iTunes. In attacking Apple, Jon was challenging a brand that relied on DRM to insure the success of its powerful iPod and iTunes brands.

Seven Years of Hacktivism Against DRM

[Image: iphone_hack.png]

The QTFairUse program was able to access the raw data in a file purchased from iTunes and to extract it, bypassing the protection method. The first tests were not conclusive, because the output files were not always readable by any kind of player. Nevertheless, DVD Jon's project improved until it became a nightmare for Apple's business.

His other known projects revolve around DVDs, which also use DRM protection, especially to prevent copying. Recently, DVD Jon was noted for contributing several solutions to bypass the different protections included with the iPhone. In fact, this young man was the first to be able to use Apple's phone without having to subscribe to the mandatory carrier.

Despite two investigations in 2003, Jon Johansen has never been sentenced.

The Theft Of Windows Source Code

February 12, 2004 was a beautiful day, but Microsoft was in a state of emergency. The source code for Windows 2000, which is still used by a great number of people even today, had just been 'borrowed'. Worse still, that code had been disseminated into the wild by a still unidentified hacker.

Windows Source Code in the Wild

[Image: microsoft_locaux.jpg]

This breach represented a heavy loss: 600 million bytes of data, 30,195 files, and 13.5 million lines of code. The leak involved both Windows 2000 and its older sibling, Windows NT4. Everybody at the software giant tried to get a grip on what had just happened, but nobody really had answers.

The data was 'borrowed' directly from Microsoft's network. The hacker in question, who has never been discovered, entered the company's internal network by breaking the password on one of the machines. The source code quickly found its way to the Internet, especially P2P networks. Fortunately, even through everyone feared the worst, the consequences of the theft were quite mild.

A $245 Million Theft Against Dassault

[Image: dassault_systemes_catia.jpg]

The last great hack that wee'll discuss in this historical review is rather recent. Wee need only go back to January of this year to find a 58-year-old Greek hacker who was arrested by the local police for illegally entering the servers of Dassault Systèmes, and stealing software he later sold on the Internet.

An Intrusion with Heavy Consequences

By entering one of the Dassault servers, this hacker - who used the codename ASTRA - was able to obtain access to the whole company network. It was then easy to 'borrow' several documents, as well as professional modeling software. Ever careful, he worked to erase all traces of his activities before exiting the network.

Once he had the software in hand, he started selling it on the Internet with the aid of an accomplice, causing losses estimated by Dassault at more than $300 million. The hacker was arrested at his Athens home by the police, who seized 16 CDs and DVDs as well as his hard drive. His assistant, whose identity was not revealed, resided in the United Kingdom.

Hacking Today

[Image: hacking_site.jpg]

Hacking is a practice that emerged in the 1970s, but some of the numerous groups that have been formed around this movement still exist today.

An Evolving Phenomenon

With Internet use becoming more and more widespread, hackers and others called "script kiddies" are more numerous than ever. However, wee are not seeing a proportional explosion of large-scale attacks against computer systems that matches this increase. The movement has taken a slightly different direction compared to what it was in the first few years.

Some attacks are still making news, and system administrators are still paying the price. The Kevin Mitnicks and John Drapers that made history have largely settled down and today's security experts find themselves facing a less virulent but much more massive threat.
source: http://www.tomshardware.com/2008/03/14/t...index.html


Whew. That was fun. Hackers have always fascinated me. Fun stuff ^^
when hackers strike


i love the telephone hacks though
Wow that was really cool.....

But hackers nowadays are completely different....bent on making worms and hacking into personal computers.....
Yeah, that telephone hack was cool.
I personally think the greatest hacks were the ones never discovered...
that's so cool. the whistle hack is the funniest and coolest.
I personally think the CD protection crack with the permanent marker is better though.  Apparently, there's a CD copy protection scheme that can be broken by getting a black permanent marker, and drawing a black line around the rim of the CD...

But that only came after 2000 :P
EDIT here it is: http://www.geek.com/sony-copy-proof-cds-...arker-pen/
i actually read most of it :D very nice
ZiNgA BuRgA Wrote:I personally think the CD protection crack with the permanent marker is better though.  Apparently, there's a CD copy protection scheme that can be broken by getting a black permanent marker, and drawing a black line around the rim of the CD...

But that only came after 2000 :P
EDIT here it is: http://www.geek.com/sony-copy-proof-cds-...arker-pen/

Quote:The copy-protection technology works by adding a bogus data track to the outside of the disc, and since computers always read data tracks from a CD first they will never play the music tracks. The discovered workaround is that by covering the outside of the CD with pen (or even tape), the computer never locates the data track and so goes ahead with music playback.

Well, imho that could have been solved (and is) with a simple software hack...
MehHakker Wrote:Wow that was really cool.....

But hackers nowadays are completely different....bent on making worms and hacking into personal computers.....

yeah that's exactly what dax aims for...
Pages: 1 2
Reference URL's