How a Hacker Convinced Motorola to Send Him Source Code

Sdílet
Vložit
  • čas přidán 13. 11. 2018
  • In this episode of 'Greatest Moments in Hacking History,' Kevin Mitnick is a fugitive hiding out in Colorado. In an attempt to avoid detection from the authorities, Mitnick decides he wants to hack a cellphone so he can hide his location while using the device. To do this, the hacker sets up a social engineering attack against Motorola to fool them into giving him the source code to the MicroTAC Ultra Lite cell phone so he can break into it.
    WATCH NEXT: Samy Kamkar Takes Down Myspace: • Greatest Moments in Ha...
    Subscribe to MOTHERBOARD: bit.ly/Subscribe-To-MOTHERBOARD
    Follow MOTHERBOARD
    Facebook: / motherboardtv
    Twitter: / motherboard
    Tumblr: / motherboardtv
    Instagram: / motherboardvice
    More videos from the VICE network: www. vicevideo
  • Věda a technologie

Komentáře • 1,1K

  • @peter_smyth
    @peter_smyth Před 5 lety +1084

    I socially engineered the source code out of them, but it was too easy, so I hacked them to get it again.

    • @SilverCanary1
      @SilverCanary1 Před 5 lety +63

      never happy with being the first he has to be the second, too

    • @TheR971
      @TheR971 Před 5 lety +33

      @@SilverCanary1 That's actually kind of a great motivational line to live by. Prove it wasn't luck.

    • @HenriqueLoyal
      @HenriqueLoyal Před 4 lety +1

      RIGHT??? this guy is awesome

    • @andresolus1328
      @andresolus1328 Před 2 lety

      @@TheR971 .

  • @matt_b...
    @matt_b... Před 5 lety +4207

    Talk about a stroke of luck with the vacation timing.

    • @zimtak111
      @zimtak111 Před 5 lety +87

      And that was just the beginning of his luck. His downfall was over-confidence from too much dumb-luck.

    • @Colaglass
      @Colaglass Před 5 lety +40

      @@zimtak111 sounds like being human

    • @RP-dy5mu
      @RP-dy5mu Před 5 lety +40

      Hey man, you gotta admit that was pretty slick the way he used what he learned and morphed as he called.

    • @desromic
      @desromic Před 5 lety +47

      I think all successful hacking stories have a crazy stroke of luck in them, because that's the only reason they were successful. Hacking is very opportunistic, so if you don't find a lucky break you just bail out and move on.

    • @dahulius
      @dahulius Před 5 lety +4

      I think you can make your own luck. If the first woman wasn't on vacation, what makes you think she would not also have fallen for it?

  • @cookiewoke1899
    @cookiewoke1899 Před 5 lety +3852

    Speech 100

  • @Moonchild1607
    @Moonchild1607 Před 5 lety +2226

    The security manager had ONE job..

    • @sk198181
      @sk198181 Před 5 lety +22

      Heartless ....and then never worked again.

    • @RicardoEsteves
      @RicardoEsteves Před 5 lety +35

      Yeah, and he lost it...

    • @TheClickbaiterA
      @TheClickbaiterA Před 5 lety +1

      @@RicardoEsteves ye

    • @chipmo
      @chipmo Před 5 lety +3

      Not any more!
      ... actually they probably stayed working there for a while because nothing could be proven or traced back to them. It be like that sometimes

    • @RKNGL
      @RKNGL Před 5 lety +13

      Context is everything though. If someone had gotten that far down the line it would be hard to imagine for many that someone didn't at one point verify the caller was actually an employee.

  • @lewiskelly14
    @lewiskelly14 Před 5 lety +5272

    Would be nice if you didn't put the annotation boxes over the text at the end

    • @ethurean9967
      @ethurean9967 Před 5 lety +189

      "apprehended in North Carolina by"

    • @foeof
      @foeof Před 5 lety +84

      Only idiots have annotation boxes still enabled in 2018.

    • @andytaylor1588
      @andytaylor1588 Před 5 lety +268

      @@foeof only morons call others 'idiots' for every little thing in 2018.

    • @DiamondTear
      @DiamondTear Před 5 lety +130

      @@foeof, disabling annotations doesn't remove the box. Is this a bug?

    • @foeof
      @foeof Před 5 lety +10

      @@andytaylor1588 Yeah, remember to always take the guy with a meme avatar seriously.

  • @Volvith
    @Volvith Před 5 lety +3354

    Security Manager: "Huh, what's that, you want to upload the entire source code of our best running mobile device, and you want to send it to an external IP address? SUUURE, JUST TAKE MY PERSONAL CREDENTIALS, HERE, MAKE SURE TO UPLOAD AAALLL OF IT."
    ...
    ~Best. Security. Manager. EVER~

    • @sebastienberger2890
      @sebastienberger2890 Před 5 lety +438

      She probably asked something like :
      Hey Bob, I need to send something to a supplier, but it's Blocked by your firewall. Can you help me?
      Bob : I'm in a conference call right now, just take my password and do what you need to do.

    • @LyubomirIko
      @LyubomirIko Před 5 lety +233

      Or just:
      -Hey Bob
      (Bob looks boobs)
      -Can you help me?
      (Bob looks boobs)
      The rest is history..,

    • @elijahgavin6706
      @elijahgavin6706 Před 5 lety +57

      Lyubomir Ikonomov Bob looks boobs

    • @averestless
      @averestless Před 5 lety +118

      What the sec manager did sounds definitely moronic nowadays. But believe me, more than 20 years ago things were different. People were using 4 characters passwords that were usualy their mother's names and still felt super secure. What we see as common sense nowadays is not necessarily that, should we not be biased by the experiences we learnt from throughout the years.

    • @xXxEzzaHxXx
      @xXxEzzaHxXx Před 5 lety +21

      @@LyubomirIko bobs and vagana?

  • @dbsirius
    @dbsirius Před 5 lety +5079

    Social engineering at its finest ;)

    • @press_button_for_assistance
      @press_button_for_assistance Před 5 lety +58

      dbsirius “security expert”. Wow. Must have been a great performance review for that guy that year.

    • @StefanoPapaleo-TS
      @StefanoPapaleo-TS Před 5 lety +35

      Or rather stupidity and naivety at its worst. Try and do that outside the US and see how it goes. No one would have given you the number to a project manager, let alone believe the crap he was talking about (don't get me wrong, I've always liked him and he's not lying, what I mean is he's playing with people who are so easy to manipulate). Let alone not check if there was a Rick in that center. A security manager who gives out passwords and a project manager who spits them out to a stranger over the phone? Really? What is that? A tech company or a circus?

    • @dtvfan24
      @dtvfan24 Před 5 lety +11

      yep, really cant belive how he got to VP so quick

    • @SnakeBush
      @SnakeBush Před 5 lety +15

      He Jon it's me Rick from downstairs

    • @StefanoPapaleo-TS
      @StefanoPapaleo-TS Před 5 lety +13

      In a one-storey building :))

  • @ShaunDreclin
    @ShaunDreclin Před 5 lety +2835

    The weakest link in any good security system is the person behind the keyboard

    • @eggheadusa9900
      @eggheadusa9900 Před 5 lety +41

      Shaun Dreclin You’re disgusting furry loser!

    • @RADIT-ip3eq
      @RADIT-ip3eq Před 5 lety +3

      OHHHHH

    • @nicov1994
      @nicov1994 Před 5 lety +7

      ew, a furry
      jokes on you, i'm also a furry

    • @eggheadusa9900
      @eggheadusa9900 Před 5 lety +14

      nicovel I can already tell you’re a weirdo lol furrys are animal rapists

    • @nicov1994
      @nicov1994 Před 5 lety +18

      @Trafalgar Law says the one with weeb avatar

  • @JasperEdwinAsir
    @JasperEdwinAsir Před 5 lety +2227

    Would you like to learn??

    • @TheSuperCoolMan122
      @TheSuperCoolMan122 Před 5 lety +86

      could have easily installed a virus on their systems lul

    • @sophiacristina
      @sophiacristina Před 5 lety +8

      Oh yeah, thanks, i love to learn always more and more! :D

    • @VictorRodriguez-zp2do
      @VictorRodriguez-zp2do Před 5 lety +65

      @@TheSuperCoolMan122 she wasn't a computer newbie, she would have realised that something was wrong if he asked her to install something outside of their repos, tar is just a common encryption method so there was nothing dangerous on it.
      Edit:
      Compression not Encryption.

    • @moxy8037
      @moxy8037 Před 5 lety +12

      @@VictorRodriguez-zp2do encryption...lol

    • @Pesticide-sc7kc
      @Pesticide-sc7kc Před 5 lety +1

      Aaand that' a lesson to us all

  • @sharif47
    @sharif47 Před 5 lety +363

    3:41
    Totally accurate representation of security breach

  • @piranha031091
    @piranha031091 Před 5 lety +886

    I highly recommend his autobiography, "ghost in the wires". Not often did a book get my heart racing like that!

    • @KevinMitnick.Official
      @KevinMitnick.Official Před 5 lety +91

      Thank you for your kind comments! - KM

    • @hotdogsalesman
      @hotdogsalesman Před 5 lety +23

      Yes! It’s an amazing book. I read it in middle school- that book singlehandedly sparked my interest in computers and is one of the reasons I’m planning on going to school for compsci!

    • @tylerknight99
      @tylerknight99 Před 5 lety +2

      Yeah I read it twice. Great story teller with lots to tell.

    • @zonemyparkour
      @zonemyparkour Před 5 lety +10

      @@KevinMitnick.Official Kevin, if that is really you I just wanted to say you are one of my greatest heroes of all times. What people often regarded in me as being "lazy" or "learning anything but important stuff" I learned trough you that is curiosity that has potential. I am programmer now, with almost 8 years of exp. and university degree.
      Thank you man

    •  Před 5 lety

      Check out Takedown by Tsutomu Shimomura. That book introduced me into the unix world when I was young and I've been a proud Linux user ever since.

  • @gogl0l386
    @gogl0l386 Před 5 lety +569

    Humans are the most complex machines, but also the easiest to hack.

    • @joel9002
      @joel9002 Před 5 lety +14

      Not women tho..

    • @pushog5781
      @pushog5781 Před 5 lety +5

      GogL0L deep shit right there

    • @yaelomannetje
      @yaelomannetje Před 5 lety

      I got that reference

    • @myshro2875
      @myshro2875 Před 5 lety +20

      r/im14andthisisdeep

    • @gogl0l386
      @gogl0l386 Před 5 lety +5

      @@myshro2875 You're making a fool of yourself thinking this is intended to be deep.
      It's a cute fun way of expressing the irony of human intelect. Stop being so snarky.

  • @Finndramere
    @Finndramere Před 5 lety +1768

    lmao the title said "How a Hacker Convinced Motorola to Send Him Sour... "
    i immediately assumed it was sour cream wtf is wrong with me

  • @het1866
    @het1866 Před 5 lety +338

    "Kevin Mitnick was apprehended in North Carolina by the FBI in 1995 and plead guilty to computer fraud, wire fraud, and illegally intercepting communications. He was released in the year 2000 after serving almost five years in prison." end of video text

    • @dhkatz_
      @dhkatz_ Před 5 lety +19

      Congrats we can read

    • @Lin-vh7uv
      @Lin-vh7uv Před 5 lety +1

      @@@dhkatz_
      The Joke
      Your Head

    • @philipauken5391
      @philipauken5391 Před 5 lety +3

      Congrats we can read

    • @moshpitsonly2778
      @moshpitsonly2778 Před 5 lety +34

      Doctor Jew most of didn’t get to read it on mobile since the new video text boxes pop up

    • @damian9303
      @damian9303 Před 5 lety

      oscar mejia I was able to read it on mobile

  • @KevinMitnick.Official
    @KevinMitnick.Official Před 5 lety +512

    Hope you enjoyed one of my favorite stories. - KM

    • @TheDr660
      @TheDr660 Před 5 lety +3

      Loved it! Going to go read Ghost again!

    • @brokenjawtheory
      @brokenjawtheory Před 5 lety +2

      Bravo 👏

    • @alditube
      @alditube Před 5 lety +1

      Can you talk more about the last part?

    • @JewTube001
      @JewTube001 Před 5 lety +9

      shit get kev off the computer before he hacks something!

    • @dummypg6129
      @dummypg6129 Před 5 lety +8

      Now you replied on his comment, you are going to be hacked...

  • @maxpayne438
    @maxpayne438 Před 5 lety +345

    So. Was avoiding surv and got side tracked hacking motorola mainframes

    • @JJtoob
      @JJtoob Před 5 lety +19

      Don't you just hate it when that happens to you?

    • @terrritc5583
      @terrritc5583 Před 5 lety +8

      Every damn time!

  • @amisraelichai296
    @amisraelichai296 Před 5 lety +31

    3:30 😂🤣"My security manager gave me his personal username and password to the proxy server."

  • @tjmarx
    @tjmarx Před 5 lety +9

    Every single C-Level executive, senior manager and middle manager should see this video. All of them because it perfectly highlights just how vulnerable every organisation is to social engineering attacks. This is how brilliant hacks take place. It doesn't matter how much you spend on IT security, if the new VP of whatever is convinced to give away information you're done. Thank you for sharing

  • @rainbowdoesinfosec
    @rainbowdoesinfosec Před 5 lety +276

    So uhh, can we get that source code? 😂

    • @uniqhnd23
      @uniqhnd23 Před 5 lety +37

      Source code made 20 years ago?

    • @veridiumundaunted7978
      @veridiumundaunted7978 Před 5 lety +13

      @@uniqhnd23 I mean the guy did say he had access to all versions

    • @ZNotFound
      @ZNotFound Před 5 lety +32

      @@veridiumundaunted7978 I didn't know Motorola had access to the time vortex.

    • @FinlandForceTeam
      @FinlandForceTeam Před 5 lety +13

      @@veridiumundaunted7978 jesus the newest version he had access to is still 20 years old

    • @flippingpenguin9049
      @flippingpenguin9049 Před 5 lety +3

      R/whoosh

  • @cyberinfotech8780
    @cyberinfotech8780 Před 5 lety +65

    *ILLUSION 100*
    *SPEECH 100*

  • @LiEnby
    @LiEnby Před 5 lety +23

    OMG THAT SECURITY MANAGER LOL

  • @Adam-de8jm
    @Adam-de8jm Před 5 lety +6

    Thank you so much for bringing this series back I’ve been waiting since the MySpace episode

  • @pajamma5570
    @pajamma5570 Před 5 lety +36

    Absolute madlad.

  • @TheFeerdi
    @TheFeerdi Před 5 lety +81

    im pretty sure he now works for the CIA

    • @SIyMarbo
      @SIyMarbo Před 5 lety +9

      Viral Crate actually just a security advisor
      He did a thing for tedtalks on his whole story
      just look up kevin mitnick

  • @umeshshridar5487
    @umeshshridar5487 Před 5 lety +256

    This guy should be hired by Motorola

    • @jasonbailey9139
      @jasonbailey9139 Před 5 lety +31

      What is funny is that he was being pursued by the feds for his telephone hacking back in California. He actually got a job with the telco he had hacked and worked there for a while until they figured out who he was. If they hadn't discovered who he was and fired him, he likely never would have gotten into as much trouble as he did.

    • @Brickkzz
      @Brickkzz Před 5 lety +3

      I don't think he'd want to work for Motorola

    • @sarougeau
      @sarougeau Před 5 lety +2

      He works for KnowBe4 security training now, I think he's good for a job.

    • @FustFPV
      @FustFPV Před 5 lety +2

      stuff that. Why would he work for a telco when hes a highly sought after professional computer security consultant now. This is his website but google him and you will find it yourself
      mitnicksecurity.com/

    • @umeshshridar5487
      @umeshshridar5487 Před 5 lety +6

      Fust FPV this guy single handley fucked Motorola.... I don't know why big companies hire fucked ur security people who are just good in papers and don't know aint shit

  • @Nicksperiments
    @Nicksperiments Před 5 lety +53

    Impressive but can he turn the cmd green?

    • @LiEnby
      @LiEnby Před 5 lety +7

      No, only the most 1337 of the 1337 h@c0rz can do that.

    • @memememegaming
      @memememegaming Před 5 lety +1

      color a0

    • @hecticbeatzz5628
      @hecticbeatzz5628 Před 4 lety

      color a

    • @meso_p
      @meso_p Před 4 lety +2

      @@memememegaming @Hector y'all must be fun at parties

  • @chepux01
    @chepux01 Před 5 lety +85

    I have been watching science and computer videos for 3 hours now, I can't stop.
    Someone help me.!!

  • @V_channel_
    @V_channel_ Před 5 lety +7

    I still have my '96 "Free Kevin!" -shirt somewhere in a box. 👍

  • @Munden
    @Munden Před 5 lety +13

    Kevin Mitnick looks totally different, never would have guessed that was him

  • @gabrielko2147
    @gabrielko2147 Před 5 lety +43

    I am still wondering why hackers are imprisoned when they can be so useful

    • @sarowie
      @sarowie Před 5 lety +13

      He got imprisoned for breaking the law. Many hackers have computer science degrees and can make decent money on a nine-to-five day job. It is not the same drill as the wild west of hacking big evil cooperations, but working for "big cooperation" is a steady, all-tough boring, job.

    • @fghghgvh
      @fghghgvh Před 5 lety +42

      Why are murderers imprisoned they could be so useful on the battlefield

    • @Coffee-zv9ln
      @Coffee-zv9ln Před 5 lety +1

      Alexandra Lopez Thats different, anyone can use a gun but not anyone can hack an entire company’s network

    • @Noah-sp1nn
      @Noah-sp1nn Před 5 lety +1

      Your picture made me think I had a fly on my screen...

    • @thisperson2517
      @thisperson2517 Před 5 lety

      School shooters good with guns? And learning to code is much harder than learning how to use a firearm.@Alexandra Lopez

  • @z8294
    @z8294 Před 5 lety +7

    throughout the whole part of him explaining the phone call - social engineering all i thought was " bruh "

  • @uniquevirals9901
    @uniquevirals9901 Před 4 lety +1

    Awesome video Fatherboard!

  • @celadonk
    @celadonk Před 5 lety +3

    When they mentioned Arlington Heights, I thought I was imagining things. Weird to hear my town being mentioned in a CZcams video. Good video

  • @rrfaint
    @rrfaint Před 11 měsíci +4

    Rest in peace.

  • @Mouserzz
    @Mouserzz Před 5 lety +1

    I sure do enjoy how the ads for the next videos cover up the ending of the videos I'm trying to watch, such a great feature, good job programmers at youtube.

  • @constantinentakos2907
    @constantinentakos2907 Před 5 lety

    Make more of these they’re so awesome

  • @abhimishraa
    @abhimishraa Před 5 lety +15

    I would totally recommend reading Kevin's Ghost in the Wires

  • @yudi577
    @yudi577 Před 5 lety +99

    3:34 hey, Motherboard. Thanks for the login detail. Can you please send me the link to login too?

  • @OldClam5
    @OldClam5 Před 5 lety +1

    lol, the way he said, "and so I became her instructor!" was just too funny.

  • @AdamvanAlderwerelt
    @AdamvanAlderwerelt Před 5 lety +2

    A fascinating quick little story. Glad I clicked.

  • @MrBlitzpunk
    @MrBlitzpunk Před 5 lety +3

    Have ever got so bored you started to hack an entire mobile company?

  • @cmoor8616
    @cmoor8616 Před 5 lety +3

    I remember the Free Kevin Mitnick movement, great accomplishments for a hacker..

  • @SonariNeiracchen
    @SonariNeiracchen Před 5 lety

    This is an awesome story, thanks for sharing!

  • @moogus8000
    @moogus8000 Před 5 lety

    i love when videos have stupid 'another video' links that obscure text at the end. excellent work.

  • @lawrencebillson6224
    @lawrencebillson6224 Před 5 lety +70

    I bet Motorola weren’t using Linux in 1992.

    • @RelativeRelativiness
      @RelativeRelativiness Před 5 lety +11

      Yeah, gzip 1.0 was out in 1993.

    • @tetrabromobisphenol
      @tetrabromobisphenol Před 5 lety +9

      @@RelativeRelativiness : Actually a beta release (0.1) came out in late October of 1992. But was that offered as a package on a mainstream release of Unix? Doubtful.

    • @R3Cat
      @R3Cat Před 5 lety +35

      You know that tar and gzip isn't originating from Linux and instead originates from Unix which predates Linux by decades right?

    • @pwnmeisterage
      @pwnmeisterage Před 5 lety +6

      Yeah, gzip was around for years before 1.0 ... we were already using gzip (on stuff pkzip couldn't compress better) circa 1986.

    • @chipmo
      @chipmo Před 5 lety +2

      He must have meant Unix

  • @dalefirebirdd
    @dalefirebirdd Před 5 lety +7

    All you gotta do is ask people 😳

  • @alejandroochoahernandez338

    this is cool motherboard! more like these!!

  • @cakebox_
    @cakebox_ Před 5 lety

    I really like the visuals in this video !

  • @tdawg719
    @tdawg719 Před 5 lety +3

    “I got it. It was done. And it was on to the next”
    That’s what the thugs in prison said after they left his cell.

  • @gamereditor59ner22
    @gamereditor59ner22 Před 5 lety +3

    Haha!! Love Mitnick's method!!

  • @kasper5688
    @kasper5688 Před 5 lety

    These type of videos are just beautiful

  • @violetlavender9504
    @violetlavender9504 Před 5 lety +1

    >be a security manager for a big company
    >employee talks to you about trying to send source code to an unknown remote is address
    *>give her your username and password*

  • @PullingEnterprises
    @PullingEnterprises Před 5 lety +3

    Lessons from the king bro

  • @ObsidianXXX
    @ObsidianXXX Před 5 lety +39

    Motorola should have hired this wonderful genius instead of prosecuting him. That way, they might not be a company that people under 30 need to look up on Wikipedia… on iPhones!

    • @jonny4233
      @jonny4233 Před 5 lety +3

      Mate the RAZR V4 was the sickest phone out there, us under 30's will never forget.

    • @greenthizzle4
      @greenthizzle4 Před 5 lety

      John that was the last awesome flip phone, then it was iPhone(nevermind I'm thinking of the V3)

    • @skoto8219
      @skoto8219 Před 5 lety +4

      I'm watching this on a Motorola Nexus 6. Got the battery replaced recently and the guy at the repair shop said he'd already fixed three of them that day, people still love the phone.

    • @landonpowell6296
      @landonpowell6296 Před 5 lety +2

      >Motorola should have hired a fugitive
      Yeah, that makes a lot of sense.

    • @ObsidianXXX
      @ObsidianXXX Před 5 lety +3

      Landon J Powell I’m sorry you don’t know much about this topic but you should know that “fugitive“ hackers get hired by big companies all the time. Big-time hackers even get hired by governments to find weakness in security systems.

  • @Shardic
    @Shardic Před 5 lety +1

    Perfect example of a well-worked out social engineering attack

  • @VestinVestin
    @VestinVestin Před 5 lety +2

    I'd love to hear the conversation that happened once Pam got back from her vacation.

  • @SoSheolH
    @SoSheolH Před 5 lety +5

    god damn i remember reading that guys book

  • @uchihasurvival
    @uchihasurvival Před 5 lety +5

    I would have developped some dummy simple apps/functions for Motorola to keep the trust. Then, I would ask them for the source code on a regular basis under the pretext that I am a contractor or employee. Finally, after many years of rince and repeat, I would hoard these source code.

    • @LiEnby
      @LiEnby Před 5 lety

      make sure you release it to other people who can do a public release of it if u end up in jail :D

  • @Stefan863
    @Stefan863 Před 5 lety

    Nice video! Good story and a great animation!

  • @doobick1898
    @doobick1898 Před 5 lety +1

    I automatically knew it was Mitnick because I read his story in his autobiography “Ghost in the Wires”. Crazy stuff

  • @MichaelSangma
    @MichaelSangma Před 5 lety +10

    Social engineering at its best.

  • @biscoito1r
    @biscoito1r Před 5 lety +4

    Social engineering at its finest.

  • @jakeness5652
    @jakeness5652 Před 5 lety +1

    When you have to teach the person TAR and GZIP to get the source code maliciously, what a boss.

  • @adrianv7262
    @adrianv7262 Před 5 lety

    Great video!

  • @kenneymilord1609
    @kenneymilord1609 Před 5 lety +4

    Crime never pays right? SMH😔

  • @MegaCaliGrown420
    @MegaCaliGrown420 Před 5 lety +66

    iPhone 10 of the 1990's?
    So...
    Does that mean all those people who owned that phone during that Era thought their shit smelt like fabric softener?
    Or?

    • @sthlng2180
      @sthlng2180 Před 5 lety +1

      HAHAHA XDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDd

  • @fuanka1724
    @fuanka1724 Před 5 lety

    This man is a true legend. Much respect!

  • @thisiscompletelyreta
    @thisiscompletelyreta Před 5 lety

    This man is indeed a genius. Nicely done.

  • @Revoc
    @Revoc Před 5 lety +5

    Kevin didn't you steal from MG?

  • @tekmeasiam
    @tekmeasiam Před 5 lety +3

    With the words "you have failed me for the late time" the security manager was force choked and security supervisor Piett was promoted to admiral.

  • @PetardoAGP
    @PetardoAGP Před 4 lety +2

    If a hacker says that the iPhone 10 is an awesome phone it is not a hacker.

  • @crimsonzodiac908
    @crimsonzodiac908 Před 5 lety

    I love Kevin Mitnicks's stories. I really would like to hear more about it

  • @MadMrMatter
    @MadMrMatter Před 5 lety +6

    Social engineering

  • @daan3898
    @daan3898 Před 5 lety +6

    Still love the movie Hackers 2!

  • @Joeman7791
    @Joeman7791 Před 5 lety +2

    "How about the latest and the greatest?" *Smoothness: 100*

  • @LightYagami-wt1jw
    @LightYagami-wt1jw Před 5 lety

    Genius. And he told his story beautifully

  • @B_SIDES
    @B_SIDES Před 5 lety +7

    He sounds like Gabe Newell

  • @over00lordunknown12
    @over00lordunknown12 Před 5 lety +20

    Question: Would it have been a crime if he had just stopped after the social engineering? (As in, would it have been illegal if he had just downloaded the file from the FTP server and stopped, instead of hacking into their internal network?)

    • @bash0985
      @bash0985 Před 5 lety +28

      Yes, the fact that he called the company claiming to be inside working under X project manager itself is already illegal as he is committing fraud, beyond that, as soon as he downloaded the source-code from the ftp server he had commited theft of Motorola's intellectual property.

    • @ZacxRicher
      @ZacxRicher Před 5 lety

      @@bash0985 Well if Motora gave them the source code that ain't theft? I mean, they GAVE him the code he didn't stole them per se

    • @Blank46130
      @Blank46130 Před 5 lety +9

      ZacxRicher he claimed he worked for the company, if they knew he was lying they wouldn't give him the source code, so yes it is theft

    • @ZacxRicher
      @ZacxRicher Před 5 lety +3

      @@Blank46130 Oh yeah right thanks

    • @maxmustermann6298
      @maxmustermann6298 Před 5 lety

      @@bash0985 isnt it basicly 2 punishments for the same crime? its not theft if they are willing to give it to you under a false condidition

  • @JimmyEatsTheWorld
    @JimmyEatsTheWorld Před 5 lety

    I really like these stories the most!

  • @fgv3357
    @fgv3357 Před 5 lety +1

    Sometimes,you just got to ask nicely.

  • @konanoobiemaster
    @konanoobiemaster Před 5 lety +33

    did you get your wig split or cheeks busted?

    • @spcgardner
      @spcgardner Před 5 lety +13

      I buss out laughing at the Big Herc reference 😂😂😂😂😂😂😂😂😂😂

    • @konanoobiemaster
      @konanoobiemaster Před 5 lety +2

      @@spcgardner rofl LOVE me some big Herc!!!

    • @Adam-dn5oc
      @Adam-dn5oc Před 5 lety

      No, because his resourcefulness allowed him to hack JPay so the inmates had infinite "money" to spend on commissary. No wigs or cheeks busted.

    • @konanoobiemaster
      @konanoobiemaster Před 5 lety +1

      @ÁUß Code firewall penetrated

  • @harrypotter1155
    @harrypotter1155 Před 5 lety +4

    What happened to Aleesha then???

  • @tupolewposting2733
    @tupolewposting2733 Před 11 měsíci

    Rest In Peace Kevin, such a legend.

  • @JohnAbrahamOfArmenia
    @JohnAbrahamOfArmenia Před 5 lety

    It’s always so weird to hear your hometown in any video

  • @1OutOf8Billion
    @1OutOf8Billion Před 5 lety +3

    I phone ten of the 1990’s that made me cringe...

    • @CIubDuck
      @CIubDuck Před 5 lety

      Why..?

    • @ronflexleprocrastinateur9888
      @ronflexleprocrastinateur9888 Před 5 lety

      @@CIubDuck because iPhone X has a hinge and lots of people think that's a bad design

    • @defski
      @defski Před 5 lety

      @@ronflexleprocrastinateur9888 "hinge" you mean notch?

    • @ronflexleprocrastinateur9888
      @ronflexleprocrastinateur9888 Před 5 lety

      @@defski hahaha exactly! thank you for the correction Cirno!

    • @CIubDuck
      @CIubDuck Před 5 lety +3

      @@ronflexleprocrastinateur9888 I don't think you understand what he meant by the phrase. He means that the phone was expensive and top of the line, not that it literally looked exactly like an iPhone x..

  • @rochester212
    @rochester212 Před 5 lety +5

    How come hackers are considered criminals in the US, yet 99% of them spend a few months in jail then get government or private jobs with huge paychecks? Then people complain why there are so many hackers around....really ?!?

    • @nickopedia5669
      @nickopedia5669 Před 5 lety +2

      Because then they get hired to fight against hacking or to hack other countries and our private citizen's cell phones.
      And thus the cycle continues.

  • @juanstdio
    @juanstdio Před 11 měsíci

    RIP Buddy, a truly legend

  • @bilal6719
    @bilal6719 Před 2 lety +1

    It all goes in flow.. It just doesn't look like a crime

  • @TheUKNutter
    @TheUKNutter Před 5 lety +4

    This is probably why Motorola are dead now.

  • @SaltyChip
    @SaltyChip Před 5 lety +7

    Lol at all these post I'm reading about how this guy was a boss or genius, yet if you read the ending, then he was neither of those since he got caught and served 5 years in a fed prison. In my book that is called a "Fail."

    • @czdaniel1
      @czdaniel1 Před 5 lety +2

      There's little to no correlation between genius and power.
      In fact, common practice is use power to imprison or kill the geniuses
      But I can't comment specifically on this man without more information.

    • @TheGuruStud
      @TheGuruStud Před 5 lety

      No, it's a win. He's very successful, we're not. You're the failure.

    • @montyfatcat8871
      @montyfatcat8871 Před 5 lety

      Lets see you do it then

    • @SaltyChip
      @SaltyChip Před 5 lety

      Montyfatcat do what? Get arrested? Ha no

    • @montyfatcat8871
      @montyfatcat8871 Před 5 lety

      @@SaltyChip More likely get employed if you do it to a big company

  • @jojo_87_xy
    @jojo_87_xy Před 5 lety +2

    Most amazing Story I've ever heard! 😂😂😂

  • @RabbitLionRetreat
    @RabbitLionRetreat Před 5 lety

    brilliant. simply brilliant.

  • @ColdFuse96
    @ColdFuse96 Před 5 lety +12

    My god, the way he took advantage of Alesha!!!
    She probably didn’t even knew how to send an email and they just taught her everything she needed to know and not much else, so when she came up with a stupid question they probably thought “Oh that’s just Alesha being Alesha” and didn’t give it much thought, so she was really proud of herself for being able to help people, and he used that to run from the law!!!
    Shame on you!!! For shame!!!!

    • @dhkatz_
      @dhkatz_ Před 5 lety +5

      This is called social engineering. It's not anything personal. She was simply another leg in the race towards his final goal.

  • @TRIPPLEJAY00
    @TRIPPLEJAY00 Před 5 lety

    Amazing what you can obtain from very little information.

  • @winlover37
    @winlover37 Před 5 lety

    Social engineering is such an underhanded, but interesting concept. Like damn, it takes skill.

  • @thequillster
    @thequillster Před 5 lety +2

    You gotta love how not only was this a semi-decent hacker, he was also really good at manipulating people into giving him exactly what he wanted.
    Granted, the people he was talking too didn't seem too smart if they just gave away source codes and passwords willy-nilly...

  • @chudcel88
    @chudcel88 Před 4 lety

    this video wouldn't get out of my recommended for a whole year

  • @Krissy_Bunnie
    @Krissy_Bunnie Před 5 lety +1

    He just wanted to see if he could do it. Great hacker attitude.

  • @homegrowntwinkie
    @homegrowntwinkie Před 5 lety

    This is the coolest story ever.

  • @RaxeCAT
    @RaxeCAT Před 5 lety

    This is brilliant