<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hackers Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/tag/hackers/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/tag/hackers/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Mon, 04 May 2020 13:47:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>WPA2 encryption can now be hacked with new KRACKS method</title>
		<link>https://itblogsec.com/wpa2-encryption-can-now-hacked-new-kracks-method/</link>
					<comments>https://itblogsec.com/wpa2-encryption-can-now-hacked-new-kracks-method/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 24 Oct 2017 19:47:01 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=1015</guid>

					<description><![CDATA[<p>Security Researcher Mathy Vanhoef of Imec-DistiNet discovered a weakness within the WPA2 protocol, potentially affecting all the wireless routers supporting WPA2, an attacker can take advantage of this vulnerability by using key re-installation attacks (KRACKS).</p>
<p>The post <a href="https://itblogsec.com/wpa2-encryption-can-now-hacked-new-kracks-method/">WPA2 encryption can now be hacked with new KRACKS method</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>WPA2 encryption can now be hacked with new KRACKS method</h2>
<p style="text-align: justify;">Security Researcher <strong>Mathy Vanhoef of Imec-DistiNet</strong> discovered a <strong>weakness within the WPA2</strong> protocol, potentially affecting <strong>all the wireless routers supporting WPA2,</strong> an attacker can take advantage of this vulnerability by using key re-installation attacks <strong>(KRACKS)</strong>.</p>
<p style="text-align: justify;">The attack can be used to <strong>intercept passwords</strong>, <strong>Emails</strong>, <strong>chat messages</strong> and even your <strong>credit card</strong> Information. Consider if your network is not configured properly the attacker <strong>can inject ransomware and other malware</strong> into the Web sites you visit.</p>
<p style="text-align: justify;">He says that the <strong>weakness is in the Wi-Fi Standard</strong> itself even though if your router is perfectly configured you will be affected by this attack. Mathy suggests <strong>updating the Router’s Firmware</strong> when the Vendor issues the Updates to your Router.</p>
<blockquote>
<p style="text-align: justify;">“Note that if your device supports Wi-Fi, it is common that it is affected. During our initial research, we learned ourselves that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by some modification of the attacks. For more data about specific products, consult the database of CERT/CC, or contact your vendor.”</p>
</blockquote>
<p style="text-align: justify;">In the research paper, he explains the attack as <strong>“exceptionally destructive” against Android 6.0:</strong></p>
<blockquote>
<p style="text-align: justify;">“Because Android uses wpa_supplicant, Android 6.0 and above further contains this vulnerability. This presents it trivial to hijack and manipulate traffic sent by these Linux and Android devices,” he addresses on the Krackattacks site explaining the flaw. “Note that currently, 41% of Android devices are exposed to this exceptionally devastating variant of our attack.”</p>
</blockquote>
<p style="text-align: justify;">He also says that <strong>attacks on MacOS and OpenBSD are easier to execute</strong> although we agree that some of the attack scenarios in the paper are rather impractical, do not let this fool you into believing key re-installation attacks cannot be abused in practice.</p>
<p style="text-align: justify;">Vanhoef further explains how the attack <strong>can still work against Web Apps</strong> and native Apps that are <strong>using HTTPS</strong>, explaining how this added encryption layer can be avoided in what he describes as a worrying number of conditions he flags multiple prior instances of <strong>HTTPS being avoided</strong> “in non-browser software, in Apple’s iOS and OS X, in Android apps, in Android apps again, in financial apps, and even in VPN apps.</p>
<p style="text-align: justify;">See also  a Proof-Concept-Video of the Attack:</p>
<p><iframe title="KRACK Attacks: Bypassing WPA2 against Android and Linux" width="1170" height="658" src="https://www.youtube.com/embed/Oh4WURZoR98?feature=oembed" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></p>
<p><span style="font-size: 14pt; color: #ff0000;"><strong>ALSO READ: </strong></span><a href="https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/" target="_blank" rel="noopener">Hack a Windows 7/8/10 admin account password with Windows magnifier</a></p>
<p><span style="font-size: 10pt;"><strong>source:</strong> <a href="https://latesthackingnews.com" target="_blank" rel="noopener">https://latesthackingnews.com</a></span></p>
<p>The post <a href="https://itblogsec.com/wpa2-encryption-can-now-hacked-new-kracks-method/">WPA2 encryption can now be hacked with new KRACKS method</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/wpa2-encryption-can-now-hacked-new-kracks-method/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hack a Windows 7/8/10 admin account password with Windows magnifier</title>
		<link>https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/</link>
					<comments>https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 21 Sep 2017 19:56:38 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=976</guid>

					<description><![CDATA[<p>This exploit takes advantage of the ease of access tool on the login page by 'tricking' windows into launching a fully privileged command prompt by selecting 'make items on the screen larger - magnifier'. By using this method you can simply reset admin admin account password, just by having physical access to the computer.</p>
<p>The post <a href="https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/">Hack a Windows 7/8/10 admin account password with Windows magnifier</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Hack a Windows 7/8/10 admin account password with Windows magnifier</h2>
<p style="text-align: justify;">This exploit takes advantage of the ease of access tool on the login page by &#8216;tricking&#8217; windows into launching a fully privileged command prompt by selecting &#8216;make items on the screen larger &#8211; magnifier&#8217;. By using this method you can simply reset admin account password, just by having physical access to the computer.</p>
<p style="text-align: justify;"><em><strong>Disclaimer:</strong> This is for use on a PC that you own. Breaking into someone else&#8217;s PC is considered a serious crime in most places. If you make a mistake or change something else, your Windows may become a non-boot. If so, just undo whatever you changed outside of the hack shown here, and it will back to normal. Need I say this is for Educational Purposes! You are responsible for your own thoughts and actions.</em></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier.jpg"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-977 size-full" title="image-border" src="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier.jpg" alt="" width="581" height="480" srcset="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier.jpg 581w, https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier-300x248.jpg 300w" sizes="(max-width: 581px) 100vw, 581px" /></a></p>
<h3><span style="font-family: Bitter, Georgia, serif; font-size: 22px;">1. Launch any OS that allow full access to file system</span></h3>
<p style="text-align: justify;">Here you can use many different linux distros or even a windows disk/usb, as long as you can access the terminal/command prompt, you&#8217;re good. In this case, we are going to use Kali linux distro. Insert CD/DVD into drive and reboot the machine. Start your Live DVD. You may need to go into the BIOS screen and change the boot-up order to CD/DVD drive first, HDD second.</p>
<h3 class="step">2. Navigate to Sys32</h3>
<p style="text-align: justify;">Use the file browser in your Linux environment, navigate to <strong>%windir%/system32/</strong>. You may have to right-click and mount the Windows partition/drive first or use the <a href="http://linux.die.net/man/8/mount.ntfs-3g" target="_blank" rel="nofollow noopener">NTFS-3G command</a>.</p>
<div id="attachment_978" style="width: 761px" class="wp-caption aligncenter"><a href="https://itblogsec.com/wp-content/uploads/2017/09/kali_01.jpg"><img decoding="async" aria-describedby="caption-attachment-978" class="wp-image-978 size-full" title="image-border" src="https://itblogsec.com/wp-content/uploads/2017/09/kali_01.jpg" alt="" width="751" height="506" srcset="https://itblogsec.com/wp-content/uploads/2017/09/kali_01.jpg 751w, https://itblogsec.com/wp-content/uploads/2017/09/kali_01-300x202.jpg 300w" sizes="(max-width: 751px) 100vw, 751px" /></a><p id="caption-attachment-978" class="wp-caption-text">Article is written on a macbook with Windows dual booted, there is Windows instance named as BOOTCAMP.</p></div>
<h3 class="step">3. Rename Magnify.exe</h3>
<p style="text-align: justify;">Find and rename <strong>magnify.exe</strong> (Magnifier file) to <strong>magnify.old</strong>. </p>
<pre class="lang:default decode:true ">mv magnify.exe magnify.old</pre>
<h3><strong>4. Rename <span class="skimlinks-unlinked">cmd.exe</span></strong></h3>
<p style="text-align: justify;">Find and rename <strong><span class="skimlinks-unlinked">cmd.exe</span></strong> to <strong><span class="skimlinks-unlinked">magnify.exe</span></strong>.</p>
<pre class="lang:default decode:true ">mv cmd.exe magnify.exe</pre>
<h3><strong>5. Shut Down Linux &amp; Reboot Windows</strong></h3>
<p style="text-align: justify;">Log out and reboot, remove CD/DVD/USB, and restart into Windows.</p>
<h3><strong>6. Get CMD Prompt Modify Accounts</strong></h3>
<p style="text-align: justify;">When Windows reboots, click on the ease of access button in the bottom left corner<a href="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier01.png"><img decoding="async" class="aligncenter wp-image-986 size-full" title="border-image" src="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier01.png" alt="" width="179" height="101" /></a></p>
<p style="text-align: justify;">Click the second selection “Make items on the screen larger (Magnifier)” and hit apply.</p>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier02.png"><img loading="lazy" decoding="async" class="aligncenter wp-image-988 size-full" title="border-image" src="https://itblogsec.com/wp-content/uploads/2017/09/windows_magnifier02.png" alt="" width="300" height="242" /></a></p>
<p style="text-align: justify;">The command prompt should now be in front of you. You now have a system level command prompt. At this point is where you can change the admin password and make any modification to the system using administrator privileges. </p>
<p style="text-align: justify;"><strong>Tip</strong>: <em>You can right-click on <span class="skimlinks-unlinked">cmd.exe</span> and click “Run as administrator” inside of Windows for escalated privileges. To edit files, it would never be allowed at basic admin level (caution). Same goes for any app in Windows right click and make the magic happen.</em></p>
<div id="attachment_990" style="width: 671px" class="wp-caption aligncenter"><a href="https://itblogsec.com/wp-content/uploads/2017/09/windows_admin_hack.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-990" class="wp-image-990 size-full" title="border-image" src="https://itblogsec.com/wp-content/uploads/2017/09/windows_admin_hack.jpg" alt="" width="661" height="461" srcset="https://itblogsec.com/wp-content/uploads/2017/09/windows_admin_hack.jpg 661w, https://itblogsec.com/wp-content/uploads/2017/09/windows_admin_hack-300x209.jpg 300w" sizes="(max-width: 661px) 100vw, 661px" /></a><p id="caption-attachment-990" class="wp-caption-text">Type net user to get a list of accounts</p></div>
<p><strong><em>Change Password: </em></strong></p>
<pre class="lang:default decode:true">net user username new_password</pre>
<p style="text-align: justify;"><em>Tip: when you do so, the password changes without prompting you again.</em></p>
<p><strong><em>Add an account: </em></strong></p>
<pre class="lang:default decode:true">net user username password /add</pre>
<p style="text-align: justify;"><em>Tip: If your username has a space, like John Doe, use quotes like “John Doe”.</em></p>
<p><strong><em>Admin that: </em></strong></p>
<pre class="lang:default decode:true ">net localgroup administrators username /add</pre>
<p><strong><em>Delete that: </em></strong></p>
<pre class="lang:default decode:true ">net user username /delete</pre>
<p><strong><em>Remote Desktop Users Group: </em></strong></p>
<pre class="lang:default decode:true">net localgroup Remote Desktop Users username /add</pre>
<p><em><strong>Net User Syntax Reference:</strong></em></p>
<pre class="lang:default decode:true">net user commands 
net user for domain</pre>
<h3><strong>7. Revert back all changes</strong></h3>
<p style="text-align: justify;">Now you should insert your Linux Live CD/DVD/USB and rename the files back to the original names.</p>
<ol>
<li style="text-align: justify;">Repeat Step 1</li>
<li style="text-align: justify;">Repeat Step 2</li>
<li style="text-align: justify;">Rename <span class="skimlinks-unlinked">magnify.exe</span> back to <span class="skimlinks-unlinked">cmd.exe</span></li>
<li style="text-align: justify;">Rename <span class="skimlinks-unlinked">magnify.old</span> back to <span class="skimlinks-unlinked">magnify.exe</span></li>
<li style="text-align: justify;">Log out, take out CD/DVD USB, reboot into Windows</li>
</ol>
<h3>Recommended resources</h3>
<p><a title="Kali Linux" href="https://www.kali.org/downloads/">Kali Linux</a><br />
 <a title="Rufus USB Creator" href="https://rufus.akeo.ie/">Create Live USB Sticks Rufus</a></p>
<h3>Conclusion</h3>
<p style="text-align: justify;">Well, that was how you hack a Windows 7/8/2008/10 administrator account password with Windows Magnifier. This also demonstrates how you could Pwn a machine if you think about it some, have hands on and they have not disabled EoA.  Hope it helps you in some way.</p>
<p><span style="font-size: 10pt;"><strong>source:</strong><a href="https://null-byte.wonderhowto.com" target="_blank" rel="noopener"> https://null-byte.wonderhowto.com</a>, <a href="https://thehacktoday.com" target="_blank" rel="noopener">https://thehacktoday.com</a></span></p>
<p>The post <a href="https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/">Hack a Windows 7/8/10 admin account password with Windows magnifier</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/hack-windows-7810-admin-account-password-windows-magnifier/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>HBO Hackers Release More TV Show Episodes — No New Game Of Thrones Season 7 Material</title>
		<link>https://itblogsec.com/hbo-hackers-release-tv-show-episodes-no-new-game-thrones-season-7-material/</link>
					<comments>https://itblogsec.com/hbo-hackers-release-tv-show-episodes-no-new-game-thrones-season-7-material/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 14 Aug 2017 20:18:59 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[HBO]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=936</guid>

					<description><![CDATA[<p>The HBO hackers who have been notoriously leaking unaired TV show episodes and their scripts are acting well on their promise of continuously releasing new material. In the latest wave, the hackers have released more content, but it didn’t include Game of Thrones Season 7 episodes.</p>
<p>The post <a href="https://itblogsec.com/hbo-hackers-release-tv-show-episodes-no-new-game-thrones-season-7-material/">HBO Hackers Release More TV Show Episodes — No New Game Of Thrones Season 7 Material</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>HBO Hackers Release More TV Show Episodes — No New Game Of Thrones Season 7 Material</h2>
<p style="text-align: justify;"><strong>The HBO hackers</strong> who have been notoriously leaking <strong>unaired TV show episodes and their scripts</strong> are acting well on their promise of continuously <strong>releasing new</strong> material. In the latest wave, the hackers have released more content, but <strong>it didn’t include Game of Thrones Season 7 episodes</strong>.</p>
<p style="text-align: justify;">According to Reuters, the <strong>hackers have released</strong> the episodes of the much-anticipated comedy series <strong>Curb Your Enthusiasm</strong>, which returns in October. Notably, Curb has been off air for 5 years. The dump also included another popular show <strong>Insecure’s Sunday night episode</strong>.</p>
<p style="text-align: justify;">The other leaked unaired episodes are from the TV shows <strong>The Deuce and Barry</strong>. While The Deuce is an upcoming<strong> TV drama set in and around Times Square</strong>, <strong>Barry is a Bill Hader comedy</strong> series which is set to air <strong>in 2018</strong>.</p>
<p style="text-align: justify;">For those who don’t know, <strong>HBO had suffered a massive hack</strong> after becoming the target of a <strong>hacker group</strong> who calls itself <strong>Mr. Smith</strong>. As per the claims made by the hackers, they had obtained <strong>1.5TB of data after a 6-months long attack</strong>.</p>
<p style="text-align: justify;">Over the past few weeks, <strong>hackers have been releasing unreleased episodes and scripts of Game of Thrones and other TV shows</strong>, employee emails, and <strong>personal contact details of GOT stars</strong>.</p>
<p style="text-align: justify;">The <strong>hackers</strong> have made demands and <strong>asked for a 6-month salary in bitcoin</strong>, which turns out to be about <strong>$6 million to $7.5 million</strong>. It was also revealed that, in the past, <strong>HBO tried to stop the leaks by offering $250,000 for “finding out vulnerabilities in HBO’s systems.”</strong></p>
<p><span style="font-size: 12pt; color: #ff0000;"><strong>ALSO READ:</strong></span> <a href="https://itblogsec.com/wannacry-ransomware-researcher-halts-spread-registering-domain-10-69/" target="_blank" rel="noopener">WannaCry ransomware: researcher halts its spread by registering domain for $10.69</a></p>
<p><span style="font-size: 10pt;"><strong>source:</strong> https://fossbytes.com</span></p>
<p>The post <a href="https://itblogsec.com/hbo-hackers-release-tv-show-episodes-no-new-game-thrones-season-7-material/">HBO Hackers Release More TV Show Episodes — No New Game Of Thrones Season 7 Material</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/hbo-hackers-release-tv-show-episodes-no-new-game-thrones-season-7-material/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 10 of the world&#8217;s most famous hackers</title>
		<link>https://itblogsec.com/top-10-of-the-worlds-most-famous-hackers/</link>
					<comments>https://itblogsec.com/top-10-of-the-worlds-most-famous-hackers/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 31 Jan 2017 21:22:06 +0000</pubDate>
				<category><![CDATA[Other]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[top 10]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=471</guid>

					<description><![CDATA[<p>There are many notable hackers around the world. We have put together a list of the 10 most notorious hackers of all time. </p>
<p>The post <a href="https://itblogsec.com/top-10-of-the-worlds-most-famous-hackers/">Top 10 of the world&#8217;s most famous hackers</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Top 10 of the world&#8217;s most famous hackers</h2>
<p>[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>1. John Draper</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/John-Draper.-png.png"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-486 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/John-Draper.-png-150x150.png" width="150" height="150" /></a>John Thomas Draper (born March 11, 1943), also known as Captain Crunch. This phreaker (&#8220;Pirate&#8217;s phone&#8221;) whose real name is John Thomas Draper (born March 11, 1943) became famous because he managed to make free long distance calls with a whistle found in Cap&#8217;n Crunch cereal box. Indeed, the sound from this whistle had a frequency of 2600 Hertz, the same frequency as a long-distance line unoccupied continuously emitted to indicate to a telephone exchange is ready to receive a call. The phreaked called a remote toll opening an unused line that did not record billing.</p>
<p>[/lgc_column]</p>
<p>&nbsp;</p>
<p>[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>2. Steve Jobs and Steve Wozniak</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/1007_Wozniak.jpg"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-485 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/1007_Wozniak-150x150.jpg" width="150" height="150" /></a>Both have several things in common, the two famous founders of Apple Computer have spent their youth as hackers. Before moving to Apple, they spent their days building called Blue Box devices that allowed for the whistle as John Draper to make long distance calls without paying a dime. They then started selling these devices to their classmates at the University of California.</p>
<p>We could add Mark Zuckerberg (founder of Facebook), Bill Gates (Microsoft founder), Linux Torvalds (Linux kernel founder) who have all some relations with hacking.</p>
<p>[/lgc_column]</p>
<p>&nbsp;</p>
<p>[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>3. David Smith</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/david_smith.jpg"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-484 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/david_smith-150x150.jpg" width="150" height="150" srcset="https://itblogsec.com/wp-content/uploads/2017/01/david_smith-150x150.jpg 150w, https://itblogsec.com/wp-content/uploads/2017/01/david_smith.jpg 275w" sizes="(max-width: 150px) 100vw, 150px" /></a>All the popularity of David Smith came after creation of the worm &#8220;Melissa&#8221; on 26 March 1999. The Worm was saturated messaging systems by spreading user to user via infected emails (there are over 60 000). Damage estimates were $385 million. Smith, who was arrested, sentenced to 2 years in prison and $5000 fine sad the worm was never intended to cause damage.</p>
<p style="text-align: justify;">The first time the Melissa worm was hidden, it was in a file containing pornographic sites passwords. Smith said that the name Melissa has just met a dancer during a trip to Florida.</p>
<p style="text-align: justify;">[/lgc_column]</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>4. George Hotz alias GeoHot</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/George_Hotz.jpg"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-483 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/George_Hotz-150x150.jpg" width="150" height="150" /></a>George Hotz is an American hacker known for unlocking the iPhone (the famous jailbreak) and its release the Playstation 3. The jailbreak of making jump the protections of devices running the iOS operating system, providing access to all the features of it, and making it possible to download and install applications without paying.</p>
<p style="text-align: justify;">When Sony was attacked, allegedly by the group Anonymous, Hotz said he was not reponsible for the attack.</p>
<p style="text-align: justify;"> [/lgc_column]</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>5. Michael Calce alias MafiaBoy</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/michael-calce-hacker.jpg"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-482 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/michael-calce-hacker-150x150.jpg" width="150" height="150" /></a>Mafiaboy is a Canadian who has acquired a certain notoriety after launching in February 2000 a series of DDoS attacks against several web sites such business giants as eBay, Amazon, Yahoo!, Dell or CNN.</p>
<p style="text-align: justify;">He was only 15 years old then, and now says he was not professional, far from it, he used the programs that his friends had done. Calce operated websites mainly for fame and to show his dominance in his group. He now works for a computer security company.</p>
<p style="text-align: justify;">  [/lgc_column]</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>6. Gary McKinnon</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/gary_mckinnon.jpg"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-481 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/gary_mckinnon-150x150.jpg" width="150" height="150" srcset="https://itblogsec.com/wp-content/uploads/2017/01/gary_mckinnon-150x150.jpg 150w, https://itblogsec.com/wp-content/uploads/2017/01/gary_mckinnon.jpg 274w" sizes="(max-width: 150px) 100vw, 150px" /></a>In 2002, a special message appears on the screen of a computer of the US Army: &#8220;Your security is the sh*t, I am Solo and I will continue to disrupt at the highest levels.&#8221;</p>
<p style="text-align: justify;">It was later learned that this is a message from a British systems administrator named Gary McKinnon. McKinnon allegedly accessed 97 computers belonging to the US Army, NASA, the Army, the Air Force, the Navy, the Ministry of Defense and the Pentagon.</p>
<p style="text-align: justify;">Gary explains that he wanted to do all this to find out once and for all if there were UFOs and thought the US had recovered an alien anti-gravity technology. Then he risked 70 years in prison, Gary was diagnosed as suffering from a form of autism and will not be extradited to the United States where he faced a big trouble.   [/lgc_column]</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>7. Robert Tappan Morris</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/Robert_Tappan_Morris.jpg"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-480 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/Robert_Tappan_Morris-150x150.jpg" width="150" height="150" /></a>In 1988, the graduate student from Harvard University decided to test the size of the Internet. He created the Morris worm that infect 6000 Unix machines by making it crash. Millions of dollars of damage will then be estimated. It was probably the first worm of this kind. Morris was finally captured, fined, sentenced to three years probation and 400 hours of community service.</p>
<p>The disk used to write the worm is now available in Boston science museum. And Morris is now a professor at the Massachusetts Institute of Technology.</p>
<p>[/lgc_column]</p>
<p>&nbsp;</p>
<p>[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>8. Adrian Limo</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/Adrian_Lamo.png"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-479 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/Adrian_Lamo-150x150.png" width="150" height="150" /></a>In December 2001, Lamo was praised by Worldcom for helping to fortify their corporate security. In February 2002, he broke into the internal computer network of The New York Times, added his name to the internal database of expert sources, and used the paper&#8217;s LexisNexis account to conduct research on high-profile subjects. The New York Times filed a complaint, and a warrant for Lamo&#8217;s arrest was issued in August 2003 following a 15-month investigation by federal prosecutors in New York. At 10:15 AM on September 9, after spending a few days in hiding, he surrendered to the US Marshals in Sacramento, California. He re-surrendered to the FBI in New York City on September 11, and pleaded guilty to one felony count of computer crimes against Microsoft, LexisNexis, and The New York Times on January 8, 2004.</p>
<p style="text-align: justify;">In February 2009, a partial list of the anonymous donors to the WikiLeaks not-for-profit website was leaked and published on the WikiLeaks website. Some media sources indicated at the time that Lamo was among the donors on the list.<br />
[/lgc_column]</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>9. Kevin Poulsen</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/Kevin_Poulsen_2014.png"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-478 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/Kevin_Poulsen_2014-150x150.png" width="150" height="150" /></a>The black hat hacker in the 80s, Kevin Poulsen, became popular when he &#8220;earned&#8221; a Porsche by hacking a radio station. A radio station in Los Angeles (KMS-FM) launched a radio contest in which the 102nd caller wins a Porsche. Kevin, along with two friends entered the radio telephone system to make sure to be the 102nd caller and win the prize.</p>
<p style="text-align: justify;">He plead guilty and was sentenced to 4 years and 3 months in prison, the longest sentence ever imposed at the time. After leaving prison, Kevin is now working as a journalist for Wired News.</p>
<p style="text-align: justify;">[/lgc_column]</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>10. Kevin Mitnick</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/Kevin_Mitnick_2008.jpeg"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-476 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/Kevin_Mitnick_2008-150x150.jpeg" width="150" height="150" srcset="https://itblogsec.com/wp-content/uploads/2017/01/Kevin_Mitnick_2008-150x150.jpeg 150w, https://itblogsec.com/wp-content/uploads/2017/01/Kevin_Mitnick_2008.jpeg 180w" sizes="(max-width: 150px) 100vw, 150px" /></a>At age 13, Mitnick used social engineering and dumpster diving to bypass the punch card system used in the Los Angeles bus system. After he convinced a bus driver to tell him where he could buy his own ticket punch for &#8220;a school project&#8221;, he was able to ride any bus in the greater LA area using unused transfer slips he found in a dumpster next to the bus company garage. Social engineering later became his primary method of obtaining information, including user-names and passwords and modem phone numbers.</p>
<p style="text-align: justify;">Mitnick first gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC&#8217;s computer network and copied their software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two and a half years.</p>
<p style="text-align: justify;">According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country&#8217;s largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mails.</p>
<p style="text-align: justify;">Since 2000, Mitnick has been a paid security consultant, public speaker and author. He does security consulting for Fortune 500 companies and the FBI, performs penetration testing services for the world&#8217;s largest companies and teaches Social Engineering classes to dozens of companies and government agencies.</p>
<p style="text-align: justify;">[/lgc_column]</p>
<p>The post <a href="https://itblogsec.com/top-10-of-the-worlds-most-famous-hackers/">Top 10 of the world&#8217;s most famous hackers</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/top-10-of-the-worlds-most-famous-hackers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/246 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-12-02 00:16:26 by W3 Total Cache
-->