HOME

Hey guys…

This site is created only  for hacking..

..kevin


The Grandfather of Hacking Kevin David Mitnick


                    Kevin David Mitnick (born August 6, 1963) is an American computer security consultant, author and Hacker,best known for his high-profile 1995 arrest and later five years in prison for various computer and communications-related crimes.

Mitnick’s pursuit, arrest, trial, and sentence along with the associated journalism, books and films were all controversial.He now runs a security firm named Mitnick Security Consulting, LLC that helps test a company’s security strengths, weaknesses, and potential loopholes, is the Chief Hacking Officer of security awareness training company KnowBe4 and an active advisory board member at Zimperium a firm that develops a mobile intrusion prevention system.


At age 16, Mitnick used social engineering and dumpster diving to bypass the punch card system used in the Los Angeles bus system. After a bus driver told him where he could buy his own ticket punch, he could ride any bus in the greater LA area using unused transfer slips he found in the trash. Social engineering later became his primary method of obtaining information, including user-names and passwords and modem phone numbers.

Mitnick first gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC’s computer network and copied their software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two and a half years.

According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country’s largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mails.

Features:-
  • Linux Oprating System
  • VMWARE(for windows user)
  • Basic CMD Promt kwnoledge
              Developers  
Neel Shah (Devil)
Contact no. 8866389381
Rajan Patel (Junk cleaner)
Contact no. 9429443428

Leave a comment