The Fifteen Greatest Hacking Exploits
-
Page 1:The Birth Of Hacking
-
Page 2:Famous Hackers
-
Page 3:Phreaking, The First Movement
-
Page 4:Blue Box, Phreaking For The Masses
-
Page 5:Hijacking Lines: Mitnick At Work
-
Page 6:Kevin Mitnick Enters The Pentagon
-
Page 7:The Appearance Of Scrambled Communications
-
Page 8:The Creation Of The First Worm
-
Page 9:A Game With The FBI And A 17-Month Pursuit
-
Page 10:The Biggest Virtual Case
-
Page 11:Mitnick's Capture: A Battle Between Hackers
-
Page 12:16 Years Old And Infiltrating NASA
-
Page 13:He Wanted To Know More About UFOs
-
Page 14:The Raid On The New York Times
-
Page 15:DVD Jon, The Anti-DRM Hacker
-
Page 16:The Theft Of Windows Source Code
-
Page 17:A $245 Million Theft Against Dassault
-
Page 18:Hacking Today
Mitnick's Capture: A Battle Between Hackers

In 1994, Kevin Mitnick was back to his illegal activities, and wanted by the FBI. He was already known worldwide because of his exploits, and his portrait had been distributed all over, encouraging people who recognized him to call the authorities if they spotted him. It was during this year and the one following that Kevin Mitnick would become the object of the most spectacular manhunt launched against a hacker.
Mitnick Attacks a Rival

Mitnick decided to attack another hacker and security expert, Tsutomu Shimomura. His attack was well prepared, and to be certain nobody would disturb him, Mitnick launched it on Christmas Day, December 25, 1994. He hacked Shimomura's personal computer using a technique unheard of at the time, IP spoofing, which involves using a bogus IP address to avoid being discovered during an intrusion.
Mitnick was betrayed by Shimomura's firewall, however, which recorded all activity on the target machine. On December 26, Shimomura received a call from one of his colleagues informing him that his machine had been the victim of an intrusion. He quickly established a link to Mitnick, and decided to lend a hand to the FBI in arresting the hacker, by using his own hacking skills.
A Virtual Manhunt
Shimomura obtained carte blanche from the FBI, including authorization to use hacking to find Mitnick. The pursuit became a virtual chase; for example, Shimomura reported that he surprised Mitnick on January 17, 1995, when he infiltrated a network belonging to Motorola in order to steal the company's security software.

Mitnick's Arrest
As the chase intensified, they started closing in on Mitnick, who retreated to the city of Raleigh, North Carolina. To find the cell phone Mitnick used to launch his attacks, Shimomura walked the streets of Raleigh for two days equipped with a communications detector. On February 15, 1995, at 2:00 in the morning, the FBI burst into Mitnick's apartment together with Shimomura. When he saw his rival, the fugitive exclaimed: "Hi, Tsutomu! Congratulations!" After a pursuit of almost two years, Mitnick was sentenced to five years in prison, at that time the harshest sentence ever given to a hacker.
- The Birth Of Hacking
- Famous Hackers
- Phreaking, The First Movement
- Blue Box, Phreaking For The Masses
- Hijacking Lines: Mitnick At Work
- Kevin Mitnick Enters The Pentagon
- The Appearance Of Scrambled Communications
- The Creation Of The First Worm
- A Game With The FBI And A 17-Month Pursuit
- The Biggest Virtual Case
- Mitnick's Capture: A Battle Between Hackers
- 16 Years Old And Infiltrating NASA
- He Wanted To Know More About UFOs
- The Raid On The New York Times
- DVD Jon, The Anti-DRM Hacker
- The Theft Of Windows Source Code
- A $245 Million Theft Against Dassault
- Hacking Today
Here in the USA, we aren't barbarians, and the only people who would even deserve such harsh treatment would be rapists and their ilk. Even so, we just lock em up and release them on probation a few months/years later. :P
Not perfect, but I say cutting off fingers because you're too stupid to take basic steps to protect your system? Kinda harsh.
The difference between a robber and a hacker, is that you can completely stop a hacker by unplugging your phone line from your modem.
Do that, for the sake of humanity. :P
At least you did take the moral high ground.
You neglected to mention Electron and Phoenix ... clearly they were better than most of these mentioned here.
"Well it is important info, but i don't think you can call them the best
Lol, where do you think the Government found there hackers? They hired guys like this ^^Rofl
its good to be a hacker
www.jordanprogrammer.tk