Worlds Best Hackers!!!!

Hi CEans,

Do you know who are all "THE WORLDS BEST HACKERS" , well if you don't know!!

Here is a chance to meet them..... The Master minds behind many Attacks, Virus and finders of many back doors in networks..........


Gary McKinnon:

[​IMG]


Gary McKinnon, 40, accused of mounting the largest ever hack of United States government computer networks -- including Army, Air Force, Navy and NASA systems The court has recommended that McKinnon be extradited to the United States to face charges of illegally accessing 97 computers, causing US$700,000 (400,000 pounds; euro 588,000) in damage.



Jonathan James:

[​IMG]

The youth, known as "cOmrade" on the Internet, pleaded guilty to intercepting 3,300 email messages at one of the Defense Department's most sensitive operations and stealing data from 13 NASA computers, including some devoted to the new International Space Station. James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive e-mails and capture employee usernames and passwords.James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, “The software supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost.


Adrian Lamo:

[​IMG]


Dubbed the “homeless hacker,” he used Internet connections at Kinko’s, coffee shops and libraries to do his intrusions. In a profile article, “He Hacks by Day, Squats by Night,” Lamo reflects, “I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional.”Dubbed the “homeless hacker,” he used Internet connections at Kinko’s, coffee shops and libraries to do his intrusions. For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as an award-winning journalist and public speaker.


Kevin Mitnick:

[​IMG]

The Department of Justice describes him as “the most wanted computer criminal in United States history.” His exploits were detailed in two movies: Freedom Downtime and Takedown. He started out exploiting the Los Angeles bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation’s computer network and stealing software.Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.



More Master minds to come.........;-)

Hope you liked it............:smile:


-Arvind(slashfear)

Replies

  • Anil Jain
    Anil Jain
    Great!!

    Are you Certified Ethical Hacker?

    -CB
  • Harshad Italiya
    Harshad Italiya
    Cool thread

    Rated this thread
  • Saandeep Sreerambatla
    Saandeep Sreerambatla
    Good one , i want to be a hacker a good hacker ofcourse 😀
  • silverscorpion
    silverscorpion
    Great read.. Amazing info..
    Keep 'em coming.
  • Ashraf HZ
    Ashraf HZ
    Any famous white or gray hackers? 😀
  • Anil Jain
    Anil Jain
    ash
    Any famous white or gray hackers? 😀
    White Hat Hackers
    Hackers that use their skills for good are classified as "white hat." These white hats often work as certified "Ethical Hackers," hired by companies to test the integrity of their systems. Others, operate without company permission by bending but not breaking laws and in the process have created some really cool stuff.

    Stephen Wozniak: "Woz" is famous for being the "other Steve" of Apple. Wozniak, along with current Apple CEO Steve Jobs, co-founded Apple Computer. Woz got his start in hacking making blue boxes, devices that bypass telephone-switching mechanisms to make free long-distance calls. After reading an article about phone phreaking in Esquire, Wozniak called up his buddy Jobs. The pair did research on frequencies, then built and sold blue boxes to their classmates in college. Wozniak even used a blue box to call the Pope while pretending to be Henry Kissinger.

    Tim Berners-Lee: Berners-Lee is famed as the inventor of the World Wide Web, the system that we use to access sites, documents and files on the Internet. He has received numerous recognitions, most notably the Millennium Technology Prize. He started thinking in this direction when a student at Oxford University, Berners-Lee was caught hacking access with a friend and subsequently banned from University computers.

    Soon few more to come...

    -CB
  • CEMember
    CEMember
    Wow ! Awesome information man. I wonder how few people get so much brains. When will I get brains like them ? 😔

    PS: That third guy looks so innnocent in the pic, was he really a criminal? 😕
  • gaurav.bhorkar
    gaurav.bhorkar
    Nice information...
  • slashfear
    slashfear
    Thanks Guys.......😉

    @CB nope i am not certified still, I am doing a course on Ethical hacking (will soon be a cyber cop ........ i guess 😒)

    @ash yes I will post in info about white hackers too ..................😉
  • durga ch
    durga ch
    hey
    I have question here
    I thought hackers are ones who actually know systems by nook and corner of the computers and networks and how they work where are crackers are once who actually ' meddle'
  • Saandeep Sreerambatla
    Saandeep Sreerambatla
    durga
    hey
    I have question here
    I thought hackers are ones who actually know systems by nook and corner of the computers and networks and how they work where are crackers are once who actually ' meddle'

    oh! durga long time see ..
    i thought you went sick after taking my KYCean 😉
  • slashfear
    slashfear
    Hi Durga,

    I guess your asking the difference between the Hackers and crackers.

    Lot of them out there doesn't know the difference between a Hacker and a cracker ? so here is the answer,

    - A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Hackers are most often programmers. As such, hackers obtain advanced knowledge of operating systems and programming languages. They might discover holes within systems and the reasons for such holes. Hackers constantly seek further knowledge, freely share what they have discovered, and never, ever intentionally damage data. There are two types of Hackers,

    -> White hat hackers or grey hackers
    -> Black hackers

    White hat hackers or grey hackers are the hero or good guy 😁, especially in computing slang, they are also known as "ethical hackers," are computer security experts, who specialize in penetration testing, and other testing methodologies, to ensure that a company's information systems are secure. Such people are employed by companies where these professionals are sometimes called "sneakers". Groups of these people are often called tiger teams or red teams. These security experts may utilize a variety of methods to carry out their tests, including social engineering tactics, use of hacking tools, and attempts to evade security to gain entry into secured areas.

    Black hackers are those who use his skills for legal or illegal acts, but not for personal gains. Black hackers use their skills in order to prove themselves that they can accomplish a determined feat, for money they become black hackers.


    - A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. Having gained unauthorized access, crackers destroy vital data, deny legitimate users service, or cause problems for their targets. Crackers can easily be identified because their actions are malicious.


    -Arvind(slashfear)😉
  • durga ch
    durga ch
    ah!!
    nice SF !! thanks that for info!
    so these personalities are all black hackers eh?

    ES:I go no-where! 😁
  • Black_Rose
    Black_Rose
    SlashFear, awesome thread.. made for an interesting read. Thank you rated ***** <3
  • slashfear
    slashfear
    Hi Guys!!!

    It's been a long time...... So I am digging my own old threads and trying to update them 😀 ...... So here we go... with the continuation of master mind

    Kevin Poulsen

    Also known as Dark Dante, Poulsen gained recognition for his hack of LA radio’s KIIS-FM phone lines, (taing over all of the station’s phone lines) which earned him a brand new Porsche, among other items. Law enforcement dubbed him “the Hannibal Lecter of computer crime.”Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information.His hacking specialty, however, revolved around telephones. Poulsen’s most famous hack, In a related feat, Poulsen also “reactivated old Yellow Page escort telephone numbers for an acquaintance who then ran a virtual escort agency.” Later, when his photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years.Since serving time, Poulsen has worked as a journalist. He is now a senior editor for Wired News. His most prominent article details his work on identifying 744 *** offenders with MySpace profiles.


    Robert Tappan Morris

    Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.

    Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years’ probation, 400 hours of community service and a fined $10,500.Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet.



    Vladimir Levin

    Levin accessed the accounts of several large corporate customers of Citibank via their dial-up wire transfer service (Financial Institutions Citibank Cash Manager) and transferred funds to accounts set up by accomplices in Finland, the United States, the Netherlands, Germany and Israel.In 2005 an alleged member of the former St. Petersburg hacker group, claiming to be one of the original Citibank penetrators, published under the name ArkanoiD a memorandum on popular Provider.net.ru website dedicated to telecom market.According to him, Levin was not actually a scientist (mathematician, biologist or the like) but a kind of ordinary system administrator who managed to get hands on the ready data about how to penetrate in Citibank machines and then exploit them.ArkanoiD emphasized all the communications were carried over X.25 network and the Internet was not involved. ArkanoiD’s group in 1994 found out Citibank systems were unprotected and it spent several weeks examining the structure of the bank’s USA-based networks remotely. Members of the group played around with systems’ tools (e.g. were installing and running games) and were unnoticed by the bank’s staff. Penetrators did not plan to conduct a robbery for their personal safety and stopped their activities at some time. Someone of them later handed over the crucial access data to Levin (reportedly for the stated $100).



    David Smith

    David Smith, the author of the e-mail virus known as Melissa, which swamped computers around the world, spreading like a malicious chain letter. He was facing nearly 40 years in jail . About 63,000 viruses have rolled through the Internet, causing an estimated $65 billion in damage, but Smith is the only person to go to federal prison in the United States for sending one.


    Mark Abene

    Abene (born 1972), better known by his pseudonym Phiber Optik, is a computer security hacker from New York City. Phiber Optik was once a member of the Hacker Groups Legion of Doom and Masters of Deception. In 1994, he served a one-year prison sentence for conspiracy and unauthorized access to computer and telephone systems.

    Phiber Optik was a high-profile hacker in the early 1990s, appearing in The New York Times, Harper’s, Esquire, in debates and on television. Phiber Optik is an important figure in the 1995 non-fiction book Masters of Deception — The Gang that Ruled Cyberspace.


    NOTE: ALL THE INFORMATION ABOVE ARE FROM VARIOUS SOURCES FROM INTERNET AND I DO NOT CLAIM THE WRITINGS ARE MY OWN!!

    -ARVIND
  • Pensu
    Pensu
    Good one....😀
  • temeroso
    temeroso
    Hi guys!

    allow me to place this here... (newbie!)

    Does anyone know about software that hides the mac, imac and all other adresses in email in order to be able to sent untracebles emails? (Not for hacking purpose, for safety purpose!!) Note: this is a very serious request, !!
  • PraveenKumar Purushothaman
    PraveenKumar Purushothaman
    Wow!!! Aravind!!! Awesome set of Information... 😁

You are reading an archived discussion.

Related Posts

hello buddy how are you dear i read your comment it's great i like it dear i learn alot of things from your comment i hope everyone likes your post...
Here is the Box in which you have to put all 26 letters of Alphabet.. A to Z Rules: 1. A and Z have the Fix Position as shown in...
Hi guys!....i am doing my final year project in degree....and i was wondering is there any topic in VB which doesn't deal with management system?.........can help?............i need a topic which...
Well Here is one more Connect the Pictures Series. Connect all these three pictures !! Sorry for that blur Images but they are historical people. Best Luck !! Godfather
99 is the movie based on Cricket world cup in 1999 can anyone post its Review ? -godfather