29.09.2015 Views

Legal Disclaimer

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hacking For Beginners – Manthan Desai 2010<br />

[2000 Dec 24] Exigent International , a U.S. government contractor, acknowledged that one or more cyberthieves broke<br />

into a restricted federal computer system and stole the company's proprietary code for controlling satellite systems. The<br />

software, known as OS/COMET, allows ground- control personnel to communicate and send commands to satellites and<br />

rockets. The U.S. Air Force has plans to use the OS/COMET software to control the NAVSTAR Global Positioning<br />

System from its Colorado Springs Monitor Station, which is part of the Air Force Space Command.<br />

[2001 Feb 1] Hackers invade World Economic Forum. The compromised data included credit card numbers, personal<br />

cell phone numbers and information concerning passports and travel arrangements for a number of government and<br />

business leaders. Among the notable victims whose personal information was pilfered were Microsoft chairman Bill<br />

Gates , Palestinian Authority chairman Yasser Arafat, U.N. Secretary-General Kofi Annan, former U.S. Secretary of State<br />

Madeline Albright and former Israeli Prime Minister Shimon Peres.<br />

[2001 Feb 12] Anna Kournikova virus released by 20-year-old Dutchman Jan de Wit ('OnTheFly') who was later arrested<br />

and sentenced to 150 hours of community service.<br />

[2001 Mar 1] FBI reports that 40 e-commerce sites located in 20 U.S. states were cracked by eastern Europe hackers,<br />

have stolen more than one million credit card numbers from U.S. e-commerce and banking websites.<br />

[2001 Mar 7] Jesus Oquendo ('Sil'), age 27, of Queens, New York was convicted and sentenced to 27 months in<br />

Manhattan federal court on charges of computer hacking and electronic eavesdropping of victim company Five Partners<br />

Asset Management LLC ("Five Partners"), a venture capital company based in Manhattan. Oquendo left the victim a<br />

taunting message on its network: "Hello, I have just hacked into your system. Have a nice day."<br />

[2001 May 1] Chinese and U.S. hackers attack each other because of the U.S. spy plane that had to make an<br />

emergency landing in China after the U.S. plane collides with and kills Chinese fighter pilotWang Wei .<br />

[2001 May 4] Gibson Security Research Corp came under attack (DDOS) and taken off- line by a 13-year-old hacker, at<br />

first due to a mistaken belief that Steve Gibson had called him a name, then simply because it was fun.<br />

[2001 May 11] Solaris/IIS worm infects Solaris boxes up to version 7, and then scans for IIS machines susceptible to the<br />

folder traversal vulnerability and then replaces the default web page.<br />

[2001 May 15] Hackers attack University of Washington and put file sharing program on its computers.<br />

[2001 May 17] 'Fluffy Bunny' hacker group hacks Apache.org and SourceForge.net .<br />

[2002 May 21] Max Butler ('Max Vision' and 'The Equalizer') was sentenced to 18 months in prison for launching an<br />

Internet worm that crawled through hundreds of military and defense contractor computers over a few days in 1998. Max<br />

Butler also lived three lives for five years. As 'Max Vision', he was an incredibly skilled hacker and security expert who<br />

boasted that he'd never met a computer system he couldn't crack. As 'The Equalizer', he was an FBI informant, reporting<br />

on the activities of other hackers. As Max Butler, he was a family man in Santa Clara, California who ran a Silicon Valley<br />

security firm. At Max Vision Network Security, he specialized in running "penetration tests," attempting to break into<br />

corporate networks to prove that their security wasn't as good as it could be.<br />

[2001 Jun 9] Los Angeles Times newspaper reports that hackers attacked a computer system that controls much of the<br />

flow of electricity across California ’ s power grid for seventeen days or more during the state’ s worse days of the power<br />

crisis. According to the Times, the discover was ade on Friday, May 11 and that it was determined that attackes began<br />

as early as Wednesday, April 25. The attack appears to have primarily by an individual associated to China ’ s<br />

Guangdong province and routed through China Telecom. The 17-day intrusion into the networks running California's<br />

leading electric power grid has caused considerable concern among state and federal bureaucrats.<br />

[2001 Jun 15] Christine Gunhus, the wife of an U.S. senator, pleads no contest to charges of using a pseudonym to send<br />

e-mail messages that disparaged her husband's Democratic rival.<br />

[2001 Jun 20] U.S. security company ZixIt reported that a database holding details of customers' credit cards had been<br />

hacked.<br />

w w w . h a c k i n g t e c h . c o . t v Page 251

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!