ebook img

Hackers That Shook the World PDF

149 Pages·2012·3.539 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Hackers That Shook the World

Ḥackərṣ ṭḥaṭ ṣḥōōk ṭḥə ʷōrłḍ Srinidhi Ravi Asian School of Cyber Laws To download great stuff and win lots of goodies, visit: www.facebook.com/republic.of.cyberia Hackers that shook the world ! Srinidhi Ravi Asian School of Cyber Laws 1 | P a g e If you are good hacker everyone knows your name, if you are a great hacker no one knows who you are. 2 | P a g e Published in 2012 by Asian School of Cyber Laws. Copyright © 2012 by Asian School of Cyber Laws. All rights reserved. No part of this book may be reproduced or otherwise used without prior written permission from the author unless such use is expressly permitted by applicable law. No investigation has been made of common-law trademark rights in any word. Words that are known to have current trademark registrations are shown with an initial capital and are also identified as trademarks. The inclusion or exclusion of any word, or its capitalization, in this book is not, however, an expression of the publisher's opinion as to whether or not it is subject to proprietary rights, nor is it to be regarded as affecting the validity of any trademark. This book is provided "as is" and Asian School of Cyber Laws makes no representations or warranties, express or implied either in respect of this book or the software, websites and other information referred to in this book. By way of example, but not limitation, Asian School of Cyber Laws makes no representations or warranties of merchantability or fitness for any particular purpose or that the use of licensed software, database or documentation will not infringe any third party patents, copyrights, trademarks or other rights. 3 | P a g e The chosen case scenarios are for instructional purposes only and any association to an actual case and litigation is purely coincidental. Names and locations presented in the case scenarios are fictitious and are not intended to reflect actual people or places. Reference herein to any specific commercial products, processes, or services by trade name, trademark, manufacturer, or otherwise does not constitute or imply its endorsement, recommendation, or favoring by Asian School of Cyber Laws, and the information and statements shall not be used for the purposes of advertising. Printed in India 4 | P a g e Contents people 0. Introduction ...................................................................................... 8 1. Adrian Lamo ....................................................................................... 14 10. Albert Gonzalez ............................................................................... 17 11. Alvi brothers ..................................................................................... 20 100. Chad Davis ...................................................................................... 22 101. Chen Ing-hau.................................................................................. 24 110. Clifford Stoll ................................................................................... 27 111. David Smith .................................................................................... 30 1000. Dennis Moran .............................................................................. 32 1001. Dmitry Sklyarov ......................................................................... 34 1010. Ehud Tenenbaum ....................................................................... 37 1011. Frederick Cohen ......................................................................... 39 1100. Gary McKinnon ........................................................................... 41 1101. Jan de Wit ..................................................................................... 44 1110. Joanna Rutkowska .................................................................... 46 1111. John Draper ................................................................................. 49 10000. John Schiefer ............................................................................. 52 5 | P a g e 10001. Jon Lech Johansen ................................................................... 54 10010. Jonathan Joseph James .......................................................... 56 10011. Jeanson James Ancheta ......................................................... 60 10100. Jeffrey Lee Parson ................................................................... 62 10101. Jerome Heckenkamp .............................................................. 64 10110. Kevin Mitnick ............................................................................ 66 10111. Kevin Poulsen ........................................................................... 69 11000. Kristina Vladimirovna Svechinskaya ............................... 72 11001. Mark Abene ............................................................................... 75 11010. Michael Calce ............................................................................ 77 11011. Nahshon Even-Chaim ............................................................ 79 11100. Onel A. de Guzman .................................................................. 82 11101. Pieter Zatko ............................................................................... 85 11110. Raphael Gray ............................................................................ 87 11111. Richard Jones ............................................................................ 89 100000. Robert Tappan Morris ........................................................ 91 100001. Susan Headley ........................................................................ 94 100010. Vladimir Levin ....................................................................... 97 6 | P a g e groups 1. ANONYMOUS ................................................................................... 101 10. CHAOS COMPUTER CLUB ......................................................... 111 11. CULT OF THE DEAD COW ......................................................... 114 100. DIGITAL DAWGPOUND ........................................................... 117 101. GENOCIDE2600 ......................................................................... 118 110. GLOBALHELL .............................................................................. 120 111. GOATSE SECURITY ................................................................... 121 1000. HACKER DOJO .......................................................................... 123 1001. HACKWEISER ........................................................................... 125 1010. HARFORD HACKERSPACE ................................................... 127 1011. HELITH ....................................................................................... 129 1100. HONKER UNION ...................................................................... 131 1101. IPHONE DEV TEAM ............................................................... 133 1110. L0PHT ......................................................................................... 134 1111. LULZRAFT ................................................................................. 136 10000. LULZSEC .................................................................................. 138 10001. MASTERS OF DECEPTION................................................. 141 10010. MILW0RM ............................................................................... 142 10011. NETWORK CRACK PROGRAM HACKER GROUP ........ 144 10100. PHONE LOSERS OF AMERICA .......................................... 146 7 | P a g e ZERO 0. Introduction The term hacker is very generic. It usually means someone who “bends” or “breaks” the security system in a computer or network. This could be for fun, for learning, for proving a point, making a statement or even for profit. It may refer to a person looking for loopholes in the system to improve computer security; it may be a bunch of smart kids doing it to make money; or just a computer geek who wants to find a way of making a computer application do something it was not designed to do. In the words of Paul Graham: To the popular press, "hacker" means someone who breaks into computers. Among programmers it means a good programmer. But the two meanings are connected. To programmers, "hacker" connotes mastery in the most literal sense: someone who can make a 8 | P a g e computer do what he wants—whether the computer wants to or not. To add to the confusion, the noun "hack" also has two senses. It can be either a compliment or an insult. It's called a hack when you do something in an ugly way. But when you do something so clever that you somehow beat the system, that's also called a hack. The word is used more often in the former than the latter sense, probably because ugly solutions are more common than brilliant ones. Nowadays, the term cracker is frequently used to denote a hacker with criminal intentions. A group of hackers working together would form a community e.g. Anonymous. As you read the book, you will also realize that most hackers have handles, which are considered to be “cooler” than their legal names. A handle also helps them to hide their identity from the police. Handles also make it difficult to guess the hacker’s race and gender. E.g. Shrinidhi is obviously a south Indian girl, but who is Ace? Hacker’s are conventionally divided into a few categories such as: Neophytes, or n00bs or newbies are beginners with virtually no “hacking experience". 9 | P a g e

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.