Hacking For Beginners – Manthan Desai
2010
[2000 Dec 24] Exigent International , a U.S. government contractor, acknowledged that one or more cyberthieves brokeinto a restricted federal computer system and stole the company's proprietary code for controlling satellite systems. Thesoftware, known as OS/COMET, allows ground- control personnel to communicate and send commands to satellites androckets. The U.S. Air Force has plans to use the OS/COMET software to control the NAVSTAR Global PositioningSystem from its Colorado Springs Monitor Station, which is part of the Air Force Space Command.
[2001 Feb 1] Hackers invade World Economic Forum . The compromised data included credit card numbers, personalcell phone numbers and information concerning passports and travel arrangements for a number of government andbusiness leaders. Among the notable victims whose personal information was pilfered were Microsoft chairman BillGates , Palestinian Authority chairman Yasser Arafat, U.N. Secretary-General Kofi Annan, former U.S. Secretary of StateMadeline Albright and former Israeli Prime Minister Shimon Peres.
[2001 Feb 12] Anna Kournikova virus released by 20-year-old Dutchman Jan de Wit ('OnTheFly') who was later arrestedand sentenced to 150 hours of community service.
[2001 Mar 1] FBI reports that 40 e-commerce sites located in 20 U.S. states were cracked by eastern Europe hackers,have stolen more than one million credit card numbers from U.S. e-commerce and banking websites.
[2001 Mar 7] Jesus Oquendo ('Sil'), age 27, of Queens, New York was convicted and sentenced to 27 months inManhattan federal court on charges of computer hacking and electronic eavesdropping of victim company Five PartnersAsset Management LLC ("Five Partners"), a venture capital company based in Manhattan. Oquendo left the victim ataunting message on its network: "Hello, I have just hacked into your system. Have a nice day."
[2001 May 1] Chinese and U.S. hackers attack each other because of the plane that had to make anemergency landing in China after the U.S. plane collides with and kills Chinese fighter pilot Wang Wei .
[2001 May 4] Gibson Security Research Corp came under attack taken off- line by a 13-year-old hacker, atfirst due to a mistaken belief that Steve Gibson had called him then simply because it was fun.
[2001 May 11] Solaris/IIS worm infects Solaris boxes up to version 7, and then scans for IIS machines susceptible to thefolder traversal vulnerability and then replaces the default web page.
[2001 May 15] Hackers attack University of Washington and put file sharing program on its computers.
[2001 May 17] 'Fluffy Bunny' hacker Apache.org and SourceForge.net .
[2002 May 21] Max Butler ('Max Vision' Equalizer') was sentenced to 18 months in prison for launching anInternet worm that crawled through hundreds of military and defense contractor computers over a few days in 1998. MaxButler also lived three lives for five years. As 'Max Vision', he was an incredibly skilled hacker and security expert whoboasted that he'd never met a computer system he couldn't crack. As 'The Equalizer', he was an FBI informant, reportingon the activities of other hackers. As Max Butler, he was a family man in Santa Clara, California who ran a Silicon Valleysecurity firm. At Max Vision Network Security , he specialized in running "penetration tests," attempting to break intocorporate networks to prove that their security wasn't as good as it could be.
[2001 Jun 9] Los Angeles Times newspaper reports that hackers attacked a computer system that controls much of theflow of electricity across California ’ s power grid for seventeen days or more during the state’ s worse days of the powercrisis. According to the Times, the discover was ade on Friday, May 11 and that it was determined that attackes beganas early as Wednesday, April 25. The attack appears to have primarily by an individual associated to China ’ sGuangdong province and routed through China Telecom . The 17-day intrusion into the networks running California'sleading electric power grid has caused considerable concern among state and federal bureaucrats.
[2001 Jun 15] Christine Gunhus, the wife of an U.S. senator, pleads no contest to charges of using a pseudonym to sende-mail messages that disparaged her husband's Democratic rival.
[2001 Jun 20] U.S. security company ZixIt reported that a database holding details of customers' credit cards had beenhacked.
www.hackingtech.co.tv
Page 251