How a Hacker Convinced Motorola to Send Him Source Code
Vložit
- čas přidán 13. 11. 2018
- In this episode of 'Greatest Moments in Hacking History,' Kevin Mitnick is a fugitive hiding out in Colorado. In an attempt to avoid detection from the authorities, Mitnick decides he wants to hack a cellphone so he can hide his location while using the device. To do this, the hacker sets up a social engineering attack against Motorola to fool them into giving him the source code to the MicroTAC Ultra Lite cell phone so he can break into it.
WATCH NEXT: Samy Kamkar Takes Down Myspace: • Greatest Moments in Ha...
Subscribe to MOTHERBOARD: bit.ly/Subscribe-To-MOTHERBOARD
Follow MOTHERBOARD
Facebook: / motherboardtv
Twitter: / motherboard
Tumblr: / motherboardtv
Instagram: / motherboardvice
More videos from the VICE network: www. vicevideo - Věda a technologie
I socially engineered the source code out of them, but it was too easy, so I hacked them to get it again.
never happy with being the first he has to be the second, too
@@SilverCanary1 That's actually kind of a great motivational line to live by. Prove it wasn't luck.
RIGHT??? this guy is awesome
@@TheR971 .
Talk about a stroke of luck with the vacation timing.
And that was just the beginning of his luck. His downfall was over-confidence from too much dumb-luck.
@@zimtak111 sounds like being human
Hey man, you gotta admit that was pretty slick the way he used what he learned and morphed as he called.
I think all successful hacking stories have a crazy stroke of luck in them, because that's the only reason they were successful. Hacking is very opportunistic, so if you don't find a lucky break you just bail out and move on.
I think you can make your own luck. If the first woman wasn't on vacation, what makes you think she would not also have fallen for it?
Speech 100
*101
Illusion 100
Sneak 100
Restoration 100
[SUCCESS 100%]
The security manager had ONE job..
Heartless ....and then never worked again.
Yeah, and he lost it...
@@RicardoEsteves ye
Not any more!
... actually they probably stayed working there for a while because nothing could be proven or traced back to them. It be like that sometimes
Context is everything though. If someone had gotten that far down the line it would be hard to imagine for many that someone didn't at one point verify the caller was actually an employee.
Would be nice if you didn't put the annotation boxes over the text at the end
"apprehended in North Carolina by"
Only idiots have annotation boxes still enabled in 2018.
@@foeof only morons call others 'idiots' for every little thing in 2018.
@@foeof, disabling annotations doesn't remove the box. Is this a bug?
@@andytaylor1588 Yeah, remember to always take the guy with a meme avatar seriously.
Security Manager: "Huh, what's that, you want to upload the entire source code of our best running mobile device, and you want to send it to an external IP address? SUUURE, JUST TAKE MY PERSONAL CREDENTIALS, HERE, MAKE SURE TO UPLOAD AAALLL OF IT."
...
~Best. Security. Manager. EVER~
She probably asked something like :
Hey Bob, I need to send something to a supplier, but it's Blocked by your firewall. Can you help me?
Bob : I'm in a conference call right now, just take my password and do what you need to do.
Or just:
-Hey Bob
(Bob looks boobs)
-Can you help me?
(Bob looks boobs)
The rest is history..,
Lyubomir Ikonomov Bob looks boobs
What the sec manager did sounds definitely moronic nowadays. But believe me, more than 20 years ago things were different. People were using 4 characters passwords that were usualy their mother's names and still felt super secure. What we see as common sense nowadays is not necessarily that, should we not be biased by the experiences we learnt from throughout the years.
@@LyubomirIko bobs and vagana?
Social engineering at its finest ;)
dbsirius “security expert”. Wow. Must have been a great performance review for that guy that year.
Or rather stupidity and naivety at its worst. Try and do that outside the US and see how it goes. No one would have given you the number to a project manager, let alone believe the crap he was talking about (don't get me wrong, I've always liked him and he's not lying, what I mean is he's playing with people who are so easy to manipulate). Let alone not check if there was a Rick in that center. A security manager who gives out passwords and a project manager who spits them out to a stranger over the phone? Really? What is that? A tech company or a circus?
yep, really cant belive how he got to VP so quick
He Jon it's me Rick from downstairs
In a one-storey building :))
The weakest link in any good security system is the person behind the keyboard
Shaun Dreclin You’re disgusting furry loser!
OHHHHH
ew, a furry
jokes on you, i'm also a furry
nicovel I can already tell you’re a weirdo lol furrys are animal rapists
@Trafalgar Law says the one with weeb avatar
Would you like to learn??
could have easily installed a virus on their systems lul
Oh yeah, thanks, i love to learn always more and more! :D
@@TheSuperCoolMan122 she wasn't a computer newbie, she would have realised that something was wrong if he asked her to install something outside of their repos, tar is just a common encryption method so there was nothing dangerous on it.
Edit:
Compression not Encryption.
@@VictorRodriguez-zp2do encryption...lol
Aaand that' a lesson to us all
3:41
Totally accurate representation of security breach
Well he was passing firewalls...
I highly recommend his autobiography, "ghost in the wires". Not often did a book get my heart racing like that!
Thank you for your kind comments! - KM
Yes! It’s an amazing book. I read it in middle school- that book singlehandedly sparked my interest in computers and is one of the reasons I’m planning on going to school for compsci!
Yeah I read it twice. Great story teller with lots to tell.
@@KevinMitnick.Official Kevin, if that is really you I just wanted to say you are one of my greatest heroes of all times. What people often regarded in me as being "lazy" or "learning anything but important stuff" I learned trough you that is curiosity that has potential. I am programmer now, with almost 8 years of exp. and university degree.
Thank you man
Check out Takedown by Tsutomu Shimomura. That book introduced me into the unix world when I was young and I've been a proud Linux user ever since.
Humans are the most complex machines, but also the easiest to hack.
Not women tho..
GogL0L deep shit right there
I got that reference
r/im14andthisisdeep
@@myshro2875 You're making a fool of yourself thinking this is intended to be deep.
It's a cute fun way of expressing the irony of human intelect. Stop being so snarky.
lmao the title said "How a Hacker Convinced Motorola to Send Him Sour... "
i immediately assumed it was sour cream wtf is wrong with me
Same I thought "sourdough bread" lmao
odd request, but ok
you forgot the question mark
Sour Diesel
i was expecting it to say "sour gummy worms"
"Kevin Mitnick was apprehended in North Carolina by the FBI in 1995 and plead guilty to computer fraud, wire fraud, and illegally intercepting communications. He was released in the year 2000 after serving almost five years in prison." end of video text
Congrats we can read
@@@dhkatz_
The Joke
Your Head
Congrats we can read
Doctor Jew most of didn’t get to read it on mobile since the new video text boxes pop up
oscar mejia I was able to read it on mobile
Hope you enjoyed one of my favorite stories. - KM
Loved it! Going to go read Ghost again!
Bravo 👏
Can you talk more about the last part?
shit get kev off the computer before he hacks something!
Now you replied on his comment, you are going to be hacked...
So. Was avoiding surv and got side tracked hacking motorola mainframes
Don't you just hate it when that happens to you?
Every damn time!
3:30 😂🤣"My security manager gave me his personal username and password to the proxy server."
Every single C-Level executive, senior manager and middle manager should see this video. All of them because it perfectly highlights just how vulnerable every organisation is to social engineering attacks. This is how brilliant hacks take place. It doesn't matter how much you spend on IT security, if the new VP of whatever is convinced to give away information you're done. Thank you for sharing
So uhh, can we get that source code? 😂
Source code made 20 years ago?
@@uniqhnd23 I mean the guy did say he had access to all versions
@@veridiumundaunted7978 I didn't know Motorola had access to the time vortex.
@@veridiumundaunted7978 jesus the newest version he had access to is still 20 years old
R/whoosh
*ILLUSION 100*
*SPEECH 100*
Lmao
Science 100
OMG THAT SECURITY MANAGER LOL
Thank you so much for bringing this series back I’ve been waiting since the MySpace episode
Absolute madlad.
im pretty sure he now works for the CIA
Viral Crate actually just a security advisor
He did a thing for tedtalks on his whole story
just look up kevin mitnick
This guy should be hired by Motorola
What is funny is that he was being pursued by the feds for his telephone hacking back in California. He actually got a job with the telco he had hacked and worked there for a while until they figured out who he was. If they hadn't discovered who he was and fired him, he likely never would have gotten into as much trouble as he did.
I don't think he'd want to work for Motorola
He works for KnowBe4 security training now, I think he's good for a job.
stuff that. Why would he work for a telco when hes a highly sought after professional computer security consultant now. This is his website but google him and you will find it yourself
mitnicksecurity.com/
Fust FPV this guy single handley fucked Motorola.... I don't know why big companies hire fucked ur security people who are just good in papers and don't know aint shit
Impressive but can he turn the cmd green?
No, only the most 1337 of the 1337 h@c0rz can do that.
color a0
color a
@@memememegaming @Hector y'all must be fun at parties
I have been watching science and computer videos for 3 hours now, I can't stop.
Someone help me.!!
No
KLONK' !!
(KNOCKS YOU OUT)
Your welcome buddy....
Don't stop!
Been doing it for years. Welcome.
@@user-ge8yn4ql4i Too late, knocked him out, did him a favor lol
I still have my '96 "Free Kevin!" -shirt somewhere in a box. 👍
Kevin Mitnick looks totally different, never would have guessed that was him
I am still wondering why hackers are imprisoned when they can be so useful
He got imprisoned for breaking the law. Many hackers have computer science degrees and can make decent money on a nine-to-five day job. It is not the same drill as the wild west of hacking big evil cooperations, but working for "big cooperation" is a steady, all-tough boring, job.
Why are murderers imprisoned they could be so useful on the battlefield
Alexandra Lopez Thats different, anyone can use a gun but not anyone can hack an entire company’s network
Your picture made me think I had a fly on my screen...
School shooters good with guns? And learning to code is much harder than learning how to use a firearm.@Alexandra Lopez
throughout the whole part of him explaining the phone call - social engineering all i thought was " bruh "
Awesome video Fatherboard!
When they mentioned Arlington Heights, I thought I was imagining things. Weird to hear my town being mentioned in a CZcams video. Good video
Rest in peace.
I sure do enjoy how the ads for the next videos cover up the ending of the videos I'm trying to watch, such a great feature, good job programmers at youtube.
Make more of these they’re so awesome
I would totally recommend reading Kevin's Ghost in the Wires
Reading it now
3:34 hey, Motherboard. Thanks for the login detail. Can you please send me the link to login too?
Call Pam!
It's just random
@@gerasimger15 really?
@@matth23e2 try it
Captainmakis 952 LOL no way
lol, the way he said, "and so I became her instructor!" was just too funny.
A fascinating quick little story. Glad I clicked.
Have ever got so bored you started to hack an entire mobile company?
I remember the Free Kevin Mitnick movement, great accomplishments for a hacker..
This is an awesome story, thanks for sharing!
i love when videos have stupid 'another video' links that obscure text at the end. excellent work.
I bet Motorola weren’t using Linux in 1992.
Yeah, gzip 1.0 was out in 1993.
@@RelativeRelativiness : Actually a beta release (0.1) came out in late October of 1992. But was that offered as a package on a mainstream release of Unix? Doubtful.
You know that tar and gzip isn't originating from Linux and instead originates from Unix which predates Linux by decades right?
Yeah, gzip was around for years before 1.0 ... we were already using gzip (on stuff pkzip couldn't compress better) circa 1986.
He must have meant Unix
All you gotta do is ask people 😳
this is cool motherboard! more like these!!
I really like the visuals in this video !
“I got it. It was done. And it was on to the next”
That’s what the thugs in prison said after they left his cell.
Haha!! Love Mitnick's method!!
These type of videos are just beautiful
>be a security manager for a big company
>employee talks to you about trying to send source code to an unknown remote is address
*>give her your username and password*
Lessons from the king bro
Motorola should have hired this wonderful genius instead of prosecuting him. That way, they might not be a company that people under 30 need to look up on Wikipedia… on iPhones!
Mate the RAZR V4 was the sickest phone out there, us under 30's will never forget.
John that was the last awesome flip phone, then it was iPhone(nevermind I'm thinking of the V3)
I'm watching this on a Motorola Nexus 6. Got the battery replaced recently and the guy at the repair shop said he'd already fixed three of them that day, people still love the phone.
>Motorola should have hired a fugitive
Yeah, that makes a lot of sense.
Landon J Powell I’m sorry you don’t know much about this topic but you should know that “fugitive“ hackers get hired by big companies all the time. Big-time hackers even get hired by governments to find weakness in security systems.
Perfect example of a well-worked out social engineering attack
I'd love to hear the conversation that happened once Pam got back from her vacation.
god damn i remember reading that guys book
A N I M E
N
I
M
E
I would have developped some dummy simple apps/functions for Motorola to keep the trust. Then, I would ask them for the source code on a regular basis under the pretext that I am a contractor or employee. Finally, after many years of rince and repeat, I would hoard these source code.
make sure you release it to other people who can do a public release of it if u end up in jail :D
Nice video! Good story and a great animation!
I automatically knew it was Mitnick because I read his story in his autobiography “Ghost in the Wires”. Crazy stuff
Social engineering at its best.
stop copying comments dickhead
Social engineering at its finest.
When you have to teach the person TAR and GZIP to get the source code maliciously, what a boss.
Great video!
Crime never pays right? SMH😔
iPhone 10 of the 1990's?
So...
Does that mean all those people who owned that phone during that Era thought their shit smelt like fabric softener?
Or?
HAHAHA XDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDd
This man is a true legend. Much respect!
This man is indeed a genius. Nicely done.
Kevin didn't you steal from MG?
With the words "you have failed me for the late time" the security manager was force choked and security supervisor Piett was promoted to admiral.
If a hacker says that the iPhone 10 is an awesome phone it is not a hacker.
I love Kevin Mitnicks's stories. I really would like to hear more about it
Social engineering
Still love the movie Hackers 2!
"How about the latest and the greatest?" *Smoothness: 100*
Genius. And he told his story beautifully
He sounds like Gabe Newell
evil gabe
Question: Would it have been a crime if he had just stopped after the social engineering? (As in, would it have been illegal if he had just downloaded the file from the FTP server and stopped, instead of hacking into their internal network?)
Yes, the fact that he called the company claiming to be inside working under X project manager itself is already illegal as he is committing fraud, beyond that, as soon as he downloaded the source-code from the ftp server he had commited theft of Motorola's intellectual property.
@@bash0985 Well if Motora gave them the source code that ain't theft? I mean, they GAVE him the code he didn't stole them per se
ZacxRicher he claimed he worked for the company, if they knew he was lying they wouldn't give him the source code, so yes it is theft
@@Blank46130 Oh yeah right thanks
@@bash0985 isnt it basicly 2 punishments for the same crime? its not theft if they are willing to give it to you under a false condidition
I really like these stories the most!
Sometimes,you just got to ask nicely.
did you get your wig split or cheeks busted?
I buss out laughing at the Big Herc reference 😂😂😂😂😂😂😂😂😂😂
@@spcgardner rofl LOVE me some big Herc!!!
No, because his resourcefulness allowed him to hack JPay so the inmates had infinite "money" to spend on commissary. No wigs or cheeks busted.
@ÁUß Code firewall penetrated
What happened to Aleesha then???
She was fired from her job 1 month later because the security team figured out what happened.
source?
@@mernaandthealmonds115 The internet!!
link it?
@@mernaandthealmonds115 lmao just go on the internet, its right there
Rest In Peace Kevin, such a legend.
It’s always so weird to hear your hometown in any video
I phone ten of the 1990’s that made me cringe...
Why..?
@@CIubDuck because iPhone X has a hinge and lots of people think that's a bad design
@@ronflexleprocrastinateur9888 "hinge" you mean notch?
@@defski hahaha exactly! thank you for the correction Cirno!
@@ronflexleprocrastinateur9888 I don't think you understand what he meant by the phrase. He means that the phone was expensive and top of the line, not that it literally looked exactly like an iPhone x..
How come hackers are considered criminals in the US, yet 99% of them spend a few months in jail then get government or private jobs with huge paychecks? Then people complain why there are so many hackers around....really ?!?
Because then they get hired to fight against hacking or to hack other countries and our private citizen's cell phones.
And thus the cycle continues.
RIP Buddy, a truly legend
It all goes in flow.. It just doesn't look like a crime
This is probably why Motorola are dead now.
Damm! Right
Lol at all these post I'm reading about how this guy was a boss or genius, yet if you read the ending, then he was neither of those since he got caught and served 5 years in a fed prison. In my book that is called a "Fail."
There's little to no correlation between genius and power.
In fact, common practice is use power to imprison or kill the geniuses
But I can't comment specifically on this man without more information.
No, it's a win. He's very successful, we're not. You're the failure.
Lets see you do it then
Montyfatcat do what? Get arrested? Ha no
@@SaltyChip More likely get employed if you do it to a big company
Most amazing Story I've ever heard! 😂😂😂
brilliant. simply brilliant.
My god, the way he took advantage of Alesha!!!
She probably didn’t even knew how to send an email and they just taught her everything she needed to know and not much else, so when she came up with a stupid question they probably thought “Oh that’s just Alesha being Alesha” and didn’t give it much thought, so she was really proud of herself for being able to help people, and he used that to run from the law!!!
Shame on you!!! For shame!!!!
This is called social engineering. It's not anything personal. She was simply another leg in the race towards his final goal.
Amazing what you can obtain from very little information.
Social engineering is such an underhanded, but interesting concept. Like damn, it takes skill.
You gotta love how not only was this a semi-decent hacker, he was also really good at manipulating people into giving him exactly what he wanted.
Granted, the people he was talking too didn't seem too smart if they just gave away source codes and passwords willy-nilly...
this video wouldn't get out of my recommended for a whole year
He just wanted to see if he could do it. Great hacker attitude.
This is the coolest story ever.
This is brilliant