+ All Categories
Home > Documents > The History of Hacking

The History of Hacking

Date post: 18-Nov-2014
Category:
Upload: twuniversity
View: 607 times
Download: 6 times
Share this document with a friend
Description:
Navneet's Pecha Kucha
20
A Pecha Kucha By: ……
Transcript
Page 1: The History of Hacking

A Pecha Kucha  By:  ……

Page 2: The History of Hacking

1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980

Captain Crunch

John Draper

Route a new call in AT & T long Lines

Whistle at precisely 2600 Hz

Page 3: The History of Hacking

Esquire magazine publishes "Secrets of the Li-le Blue Box"

Blue Boxes

1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980

Page 4: The History of Hacking

hmm…HOTDOG Pho

ne Phrea

king

May I speak to Pope.

Guess??

??

1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980

Page 5: The History of Hacking

Steve Jobs

Steve Wozniak

home industry making and selling  Blue Boxes

1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980

Page 6: The History of Hacking

The 414s

$1,500 worth of damage

1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990

6 teenagers

Los alamos laboratories

Page 7: The History of Hacking

 Morris worm

Worm released from MIT.Now Prof. at MIT

Robert Tappan MorrisStudent , Cornell University

1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990

Page 8: The History of Hacking

 DEFCON  hacking conference 

1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000

Page 9: The History of Hacking

stole 20,000 credit card numbersDEC spent $160,000 in cleanup costs

Kevin Mitnik

1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000

Page 10: The History of Hacking

Vladimir Levin

$10 million from Ci[bankRecover all but $400,000 

1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000

Don’t ask me where is $400,000. 

Page 11: The History of Hacking

logic bomb and worm will go off if Mitnick is not released from prison!!

1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000

Page 12: The History of Hacking

CULT OF THE DEAD COW releases Back Orifice at DEFCON

1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000

Page 13: The History of Hacking

ILOVEYOU a.k.a. LoveLeder

subject : ILOVEYOU

AMachment : LOVE‐LETTER‐FOR‐YOU.TXT.vbs

EsTmated  damage: $5.5 billion

Infected : 50 million

1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000

Page 14: The History of Hacking

Gary McKinnon

97 United States military and NASA computers over a 13‐month 

period Feb,2001 and Mar, 2002

Gary McKinnon

2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010

Page 15: The History of Hacking

300 computers inoperable a9er the 9/11Washington network of 2,000 computers   for 24 hourstracking cost : $800,000

2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010

Page 16: The History of Hacking

 Microso] announced $ 250,000 Reward 

2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010

Page 17: The History of Hacking

300 pages of confiden[al twider documents 

Domino Effect

François Cousteixa.k.a

Hacker Croll

2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010

Page 18: The History of Hacking

Opera[on Aurora

Google China's headquarters a]er its announcement it may leave the country

 Targets: Adobe Systems Juniper Networks Rack Space

2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010

Page 19: The History of Hacking

Mr. “X”

Last known locaTon: IndiaHacking paMern : Pecha‐KuchaNext predicted vicTm: Thought*****  Inc.

2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010

Page 20: The History of Hacking

A Pecha Kucha  By: X


Recommended