29.09.2015 Views

Legal Disclaimer

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hacking For Beginners – Manthan Desai 2010<br />

4) Kevin Poulsen<br />

Kevin Poulsen was among the most accomplished, multi-talented hackers. He worked for SRI International by day, and<br />

hacked at night under the handle "Dark Dante”. He trained to be the complete hacker, and even taught himself lock<br />

picking. Among other things, Poulsen reactivated old Yellow Page escort telephone numbers for an acquaintance that<br />

then ran a virtual agency. When the FBI started pursuing Poulsen, he went underground as a fugitive. When he was<br />

featured on NBC’s Unsolved Mysteries, the show’s 1-800 telephone lines mysteriously crashed. He was finally arrested in<br />

February, 1995.<br />

Poulsen’s best known hack was a takeover of all of the telephone lines for Los Angeles radio station KIIS-FM, guaranteeing<br />

that he would be the 102nd caller, and winning a Porsche 944 S2. In June 1994, Poulsen pleaded guilty to seven counts of<br />

mail, wire and computer fraud, money laundering, and obstruction of justice, and was sentenced to 51 months in prison<br />

and ordered to pay $56,000 in restitution. It was the longest sentence ever given for hacking up to that time. He also later<br />

pleaded guilty to breaking into computers and obtaining information on undercover businesses run by the FBI.<br />

5) Robert Tappan Morris<br />

Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the<br />

first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under<br />

the 1986 Computer Fraud and Abuse Act. Morris wrote the code for the worm while he was a student at Cornell. He<br />

asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively,<br />

slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were<br />

affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years’ probation, 400 hours of<br />

community service and a fined $10,500.<br />

w w w . h a c k i n g t e c h . c o . t v Page 233

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!