4. GaryMcKinnon
Gary McKinnon must’ve been a curious, restless child, for to
gain information on UFOs, he thought it better to get a
direct access into the channels of NASA. He infiltrated 97 US
military and NASA computers, by installing virus and deleting
a few files.
5.
6. GaryMcKinnon
All the efforts to satisfy his curiosity, but, alas, curiosity
killed the cat. It was soon found that McKinnon was guilty of
having hacked the military and NASA websites from his
girlfriend’s aunt’s house in London. While entering and
deleting the files from these websites wasn’t enough,
McKinnon thought of shaming the security forces by putting
out a notice on the website that said, “Your security is
crap.”
7. Hamza Bendeladlj
The 27-year-old Algerian computer science graduate used a
computer virus to steal money from more than 200 American
banks and financial institutions. He then reportedly gave
millions of dollars to Palestinian charities.
8. Hamza Bendeladlj
Bendelladj, who is alleged to be the co-creator of a banking
trojan horse called SpyEye, was indicted in absentia by US
authorities in 2011. The program - a malware toolkit that
saw its popularity peak between 2009 and 2011 - is believed
to have infected more than 1.4 million computers in the US
and elsewhere, according to Wired, a San Francisco-based
technology magazine.
9. Adrian Lamo
Adrian Lamo decided to switch careers when he realized the
potentials of his skills. He became a news when he hacked
into Yahoo!, Microsoft, Google, and The New York Times.
This, although culminated into his arrest, it later helped him
gain the batch of an American Threat Analyst.
10.
11. Adrian Lamo
A guy who would hack into top-notch accounts sitting in the
spacious and comforting cafeterias, libraries, internet cafes,
soon turned Wikileaks suspect Bradley Manning over to FBI.
While Manning was arrested for leaking several hundred
sensitive US government documents, Lamo went hiding or
should we presume, undercover?
12.
13. Anonymous
Anonymous is a loosely associated international network of
activist and hacktivist entities. A website nominally
associated with the group describes it as "an Internet
gathering" with "a very loose and decentralized command
structure that operates on ideas rather than directives". The
group became known for a series of well-publicized publicity
stunts and DDoS attacks on government, religious, and
corporate websites.
14.
15. Anonymous
Anonymous originated in 2003 on the imageboard 4chan,
representing the concept of many online and offline
community users simultaneously existing as an anarchic,
digitized global brain. Anonymous members (known as
"Anons") can be distinguished in public by the wearing of Guy
Fawkes masks in the style portrayed in the graphic novel and
film V for Vendetta.
16. Hacking tools
Kali Linux
John The Ripper
Metasploit Penetration Testing Software
17. Kali Linux
Kali Linux was released in August 2015. It has a major
release known as Kali Linux 2.0. This app is packed with
distribution and interface tools. It has an improved
hardware and supports a large number of Desktop
environments. Kali Linux is a security-focused operating
system you can run off a CD or USB drive, anywhere. With
its security toolkit, you can crack Wi-Fi passwords, create
fake networks, and test other vulnerabilities.
18.
19. John The Ripper
John the Ripper, mostly just referred to as simply, 'John' is
a popular password cracking pentesting tool that is most
commonly used to perform dictionary attacks. John the
Ripper takes text string samples (from a text file, referred
to as a 'wordlist', containing popular and complex words
found in a dictionary or real passwords cracked before),
encrypting it in the same way as the password being cracked
(including both the encryption algorithm and key), and
comparing the output to the encrypted string.
20. Metasploit Penetration Testing Software
The Metasploit Project is a hugely popular pentesting or
hacking framework. If you are new to Metasploit think of
it as a 'collection of hacking tools and frameworks' that
can be used to execute various tasks. Widely used by
cybersecurity professionals and ethical hackers this is a
tool that you have to learn.