Hacking For Beginners – Manthan Desai
compromising Windows security.
2010
[1998 Sep 13] Hackers deface The New York Times (www.nytimes.com) web site , renaming it HFG (Hacking for Girls).The hackers express anger at the arrest and imprisonment of Kevin Mitnick , the subject of the book ' Takedown 'coauthoredby Times reporter John Markoff . In early November, two members of HFG told Forbes magazine that theyinitiated the attack because they were bored and couldn't agree on a video to watch.
[1998 Sep 17] Aaron Blosser a contract programmer and self-described "math geek" harnessed over 2,500 U S West computers by installing a program that would utilize their idle time to find very large prime numbers. Their combinedcomputational power in theory surpassed that of most supercomputers. Blosser enlisted 2,585 computers to work atvarious times during the day and night and quickly ran up 10.63 years of computer processing time in his search for anew prime number. "I've worked on this (math) problem for a long time," said Blosser. "When I started working at U SWest, all that computational power was just too tempting for me."
[1998 Oct 1] Hackers calling themselves the Electronic Disruption Theater allege the Pentagon used offensiveinformation warfare techniques (DDoS attack)- - a charge DoD officials deny- - to thwart the group's computerattack.
[1998 Nov] The 'Cloverdale Two' sentenced to 3 years probation, the two Cloverdale, California teens ('Makaveli' and'Too Short') hacked dozens of computer systems, including ones run by the Pentagon . It was later discovered that theinfamous Israeli hacker, Ehud Tenebaum ('Analyzer') was the mastermind and mentor to the teens.
[1999 Feb 1] Canadian teen charged in Smurf attack of Sympatico ISP . Smurf attacks are when a malicious Internet userfools hundreds or thousands of systems into sending traffic to one location, flooding the location with pings. The attackwas eventually traced to the teen's home.
[1999 Feb 15] 15-year-old from Vienna hacks into Clemson University's system and tries breaking into NASA .
[1999 Mar 18] Jay Satiro, an 18-year-old high school dropout was charged with computer tampering after hacking intothe internal computers of America Online and altering some programs. Jay pled guilty and was sentenced to one year injail and five years without a home PC.
[1999 Mar 26] Melissa virus affects 100,000 email users and caused $80 million in damages; written by David Smith a29-year-old New Jersey computer programmer. The virus known as Melissa, was named after a Florida stripper.
[1999 Apr] Ikenna Iffih, age 28, of Boston, Massachusetts, was charged with using his home computer to illegally gainaccess to a number of computers, including those controlled by NASA and an agency of the U.S. Department ofDefense , where, among other things, he allegedly intercepted login names and passwords, and intentionally causeddelays and damage in communications. On November 17, 2000, he was sentenced to 6 months home detention, placedon supervised release for 48 months, and ordered to pay $5,000 in restitution.
[1999 Apr 26] CIH virus released by Chen Ing-Hou , the creator of the CIH virus, that takes his initials. This was the firstknown virus to target the flash BIOS.
[1999 May] The Napster peer- to-peer MP3 file-sharing system, used mainly to copy and swap unencrypted files of songsfor free, begins to gain popularity, primarily on college campuses where students have easy access to high-speedInternet connections. It was created by Northeastern University students Shawn Fanning and Sean Parker, age 19 and20, respectively. Before being shut down on July 2, 2001, Napster, had attracted 85 million registered users downloadingas many as 3 billion songs a month.
[1999 May 11] Whitehouse.gov defaced by Global Hell.
[1999 Jul 10] Back Orifice 2000 released at Def Con 7.
[1999 Aug 30] Microsoft Corporation shuts down its Hotmail operation for approximately two hours. The shut down
www.hackingtech.co.tv
Page 248