Ethical Hacking Tutorial - Top 15 Most Notorious & Famous Hackers in the World and How they became Famous
Ethical Hacking Tutorial - Top 15 Most Notorious & Famous Hackers in the World and How they became Famous.
In the pervious tutorial, have talked about Ethical Hacking Tutorial — Overall Review and Ethical Hacking Tutorial — Types of Hackers.
(take note, this is a tutorial post, if you have full interest in hacking tutorial then you shouldn't miss any of this post check Ethical Hacking Tutorial page for all tutorial on Hacking)
Now I will introduced you to some of the most Famous Hackers in the world and how they became famous. Check out How to Hack CCTV Security Cameras with Android Phone.
All this while, I though the term “hacker” essentially refers to someone who just a normally computer programmers who can subvert computer security without any malicious purpose, the definition of the word has evolved into a term referring to computer criminals who exploit their computer savvy abilities to illegally access computer systems for malicious purposes. Here is a list of the top 15 most notorious and famous hackers. Check out How to Hack WiFi Password without Root.
15. Jeanson James Ancheta
A dropout of Downey High School in California, Jeanson James Ancheta became a hacker in 2004 after he started to work with software robots called “botnets.” His hacking practice began when he discovered rxbot, a computer worm that has the capacity to infect and destroy computer networks. He became the first person to have ever been charged for controlling a huge number of hijacked computers in the United States.
14. Kevin Poulsen
A news editor at Wired.com, Kevin Lee Poulsen is a former hacker whose most remarkable hack was when he took over the telephone lines of the entire Los Angeles-based radio station KIIS-FM as he intended to make sure that he would be the 102nd caller in order to win a Porsche 944 S2. After he was released from prison, he decided to leave the computer programming world and become a journalist to distance himself from his criminal past.
13. Albert Gonzalez
A computer criminal best known for having masterminded and orchestrated a string of credit card thefts in the United States that brought in 170 million US dollars to his personal account, Albert Gonzalez is a computer hacker who is said to have committed the biggest and most controversial fraud in history. He used SQL injections in his operations to steal computer data from private computer networks and launch ARP spoofing attacks, a technique that sends fake messages to local area networks.
12. George Hotz
An alumnus of the John Hopkins Centre for Talented Youth program, George Francis Hotz is known for hacking the iPhone so that it could be used with other wireless carriers. He was also the one who developed the limera1n jailbreak tool, the tool that could remove the limitations of Apple devices such as iPad, iPhone, iPod touch, and Apple TV. He was also sued by Sony for hacking the PlayStation3. Check out Top 10 Best Free iCloud Bypass tools for Bypassing iCloud.
11. Kevin Mitnick
An American computer security consultant, Kevin David Mitnick is one of the most notorious hackers of the 20th century. He got involved in several computer and communications-related crimes and even became one of the most wanted computer criminals in the United States. At a very young age of 12, Kevin Mitnick begun to use his social engineering skills to circumvent the punch card system used in Los Angeles buses.
10. Gary McKinnon
Convicted for having hacked a total of 97 US-based military and NASA computer systems, Gary McKinnon is a systems administrator based in Scotland. In 2002, he was known for having perpetrated the largest military computer hack of all time after shutting down a network of 2,000 computers in the US military and deleting critical files such as weapons logs in just a matter of 24 hours. This rendered the US military network inoperable for days.
9. Adrian Lamo
Adrian Lamo first caught the attention of the media after he hacked into several high-profile computer networks such as The New York Times, Yahoo!, and Microsoft. He also became known for operating Inside-AOL.com, an AOL watchdog website. He has performed several authorized and unauthorized security checks for high-profile networks and yet never asked for a fee. Lamo was complimented for fortifying the corporate security of Worldcom.
8. Jonathan James
A hacker who was imprisoned at a juvenile age for violating the cybercrime law, Jonathan James was known for committing several unauthorized intrusions in computer networks and systems including those of Bellsouth and the Miami-Dade School. In his early 20’s, he admitted to the authorities that he had installed an illegal backdoor in a computer server in Virginia to access the usernames and passwords of some 300 internet users, particularly DRTA employees and military men.
7. Owen Walker
A hacker based in New Zealand, Owen Walker was a ringleader of a notorious international hacking organization that was estimated to have caused about $27 million worth of damages to several groups. He did not receive formal training in computer programming since he dropped out of school because of bullying. He masterminded the attack of the computer network of the University of Pennsylvania through the use of unauthorized botnets which he established himself.
6. Robert Tappan Morris
A computer scientist who in 1988 invented the first computer worm on the internet known as the Morris Worm. Robert Tappan Morris was the first person to have ever been convicted due to his violation of the Computer Fraud and Abuse Act of the United States. He used to be a professor at the Department of Electrical Engineering and Computer Science of the Massachusetts Institute of Technology before he was sentenced to three years of probation by the US court.
5. HD Moore
HD Moore is the creator of the computer software Metasploit which was developed to test computer networks resistance to hacker penetration. HD Moore is also known for software projects such as WarVOX, AxMan, the Metasploit Decloaking Engine and Rogue Network Link Detection Tools. As a computer engineer, he concerned himself with the development of platforms intended to become security tools designed to test for vulnerabilities within networks in order to aid the development of stronger network protection software.
4. Dennis Moran
One of the most notorious computer criminals of the 20th century, Dennis M. Moran was involved in a series of denial-of-service attacks that caused hundreds of internet websites to shut down. Also known as Coolio, Dennis Moran also masterminded the defacement of the DARE and RSA Security websites, as well as the unauthorized access of the computer systems of the US Air Force and US Army. As an adult, he was charged with seven counts of Class A felonies related to illegal hacking.
3. Kristina Svechinskaya
Kristina Vladimirovna Svechinskaya is a young Russian hacker who got involved in several plots to defraud some of the largest banks in the United States and Great Britain. She used a trojan horse to attack and open thousands of bank accounts in the Bank of America, through which she was able to skim around $3 billion in total.
2. Sam Jain
An internet entrepreneur and the former chief executive officer of eFront, Sam Jain was arrested in California in 2000 after being charged with submitting fraudulent data to website ranking publisher Media Matrix. Prior to that, he had a pending case in California because of his involvement in the sale of counterfeit Symentec software. He also got involved in the ICQ instant messaging scandal, which allowed him to access private data from several internet accounts.
1. Karl Koch
A German hacker who became famous in the 1980’s, Karl Koch was involved in the sale of hacked information from US military computers to the KGB, the main security agency of the Soviet Union. He was a member of different hacking organizations such as the CCC (Chaos Computer Club), and worked with individual hackers such as DOB or Dirk-Otto-Brezinski and Urmel. He was among the few hackers who got involved in the Cold War computer espionage incident.
Comments
Post a Comment
Please Share Your Thoughts About This Post....