SlideShare a Scribd company logo
The History of Hacking



Hacking as seen from an old school elder who
experienced the advancement of computers,
telecommunications, and Media ever since this
technology was invented.
Mainframes

●   IBM 360 – Fortran, Cobol, Batch processing
●   Untrix and DEC
●   Timesharing
●   First viruses
●   Definition (then) of hacking
●   Only large corporations and Universities have
    them.
Mini-Compters

●   Typically cost from $75k - $500k
●   Only universities have them
●   Exception was Alex Kamradt – had a BTI in
    his garage, running on HP2100 mini. Cost
    was $120k.
●   Ran only BASIC – My first time sharing
    system.
Computer antics and pranks

●   First virus - “Catch me if you can”
●   Hacking – in the true sense
●   Pranks
●   Stanford AI lab had blue box program.
●   Altos system and Xerox research – basis for
    Mac GUI that Steve Jobs took.
Phone Phreaking 101

●   What is a phone Phreak
●   Why they do what they do
●   How they have driven phone call costs way
    down
●   Most are blind – giving them exceptional
    hearing.
Methods of Old School Phreakers

●   Using “Mute” boxes – Withholding Supervision
●   Loop arounds
●   Demonstrators
●   Party lines
●   Blue Boxes
●   Red Boxes
Why Phone Phreaking worked

●   ATT's Decision to use in-band signaling was
    their downfall. VERY BAD IDEA
●   First was 2600 “Pulse Dialing” - Enabled Joe
    Engressia to “Whistle a call”.
●   Later – Multi-Frequency, 700, 900, 1100,
    1300, 1500, 1700 – it's NOT DTMF.
What you can do with this power

●   Anything an operator could do – plus more
●   Tap phone lines
●   Access inter-trunking routing codes
●   Reaching “inward” operators
●   Manual routing of calls – stacking tandems
    (play part of Classic tandem stacking
Arpa Net – early days

●   Mid 60's to late 70's
●   Modems and terminals not available
●   Most hosts had guest accounts and little
    storage
●   Most allows playing computer games, or
    offering academic related programs
●   Gentlemen's Systems
Early BBS days

●   DC Hays modems – 1980's
●   BBS systems
●   FidoNet very popular – Tom Jennings – I still
    see him at outdoor rave parties.
●   Exchange of illegal hacking methods
●   8BBS busted – Bernard Klaat. Running on
    PDP-8
Online systems

●   Compuserve – most expensive
●   BIX
●   Delphi
●   WELL
●   AOL
●   Many others
Modern day hacking

●   No longer for just fun and prestige
●   Now taken over by spam cartels
●   Hacktivism
●   DDOS attacks
●   Praying on innocence
Methods

●   Social engineering – is most prevalent
●   Trojans – dropped into unsuspecting users
    clicking on hostile links
●   Hostile Javascript – WordPress themes most
    popular
●   Facebook, Gmail, Twitter spam
●   Botnets
Web attack Methods

●   Phishing and Spam
●   Cross site scripting
●   SQL Injection
●   Scanning
●   Rootkits
Old hacker stories

●   White house toilet paper crisis
●   Santa barbara nuke crisis
●   Taking over KLIV phone lines
●   Oink Oink over police radios
●   Berkeley riots and taking over their radio calls
●   San Jose Free Radio pirate station
Questions and contact info

●   “jdcrunchman” everywhere.
●   jdcrunchman@gmail.com
●   Skype, facebook, twitter, all the same.

More Related Content

Viewers also liked

The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)
Stu Sjouwerman
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
Sweta Leena Panda
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Neel Kamal
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
jeshin jose
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
giridhar_sadasivuni
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 

Viewers also liked (7)

The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)The History of Hacking in 5minutes (for dummie)
The History of Hacking in 5minutes (for dummie)
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 

Similar to John “captain crunch” draper. history of hacking

Concise Courses Raspberry Pi
Concise Courses Raspberry PiConcise Courses Raspberry Pi
Concise Courses Raspberry Pi
djp55
 
The history of the internet
The history of the internetThe history of the internet
The history of the internet
Nikki Usher
 
William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015
CSO_Presentations
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
Andrew Delamarter
 
CSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage GearCSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage Gear
shawn_merdinger
 
Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
Thangaraj Murugananthan
 
BarCamp Melbourne 2012: Internet of Things
BarCamp Melbourne 2012: Internet of ThingsBarCamp Melbourne 2012: Internet of Things
BarCamp Melbourne 2012: Internet of Things
Andy Gelme
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
Deepu Näñí
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
Lookout
 
Device inspection to remote root
Device inspection to remote rootDevice inspection to remote root
Device inspection to remote root
Tim N
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
alxdvs
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1
rayborg
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
Elipeta Sotabento
 
Dmk blackops2006
Dmk blackops2006Dmk blackops2006
Dmk blackops2006
Dan Kaminsky
 
Hyper Island - 2012
Hyper Island - 2012Hyper Island - 2012
Hyper Island - 2012
Detectify
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confused
Felipe Prado
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobile
grugq
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
Engineers Australia
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
gueste0b5fe
 
"Hacking"
"Hacking""Hacking"

Similar to John “captain crunch” draper. history of hacking (20)

Concise Courses Raspberry Pi
Concise Courses Raspberry PiConcise Courses Raspberry Pi
Concise Courses Raspberry Pi
 
The history of the internet
The history of the internetThe history of the internet
The history of the internet
 
William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
CSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage GearCSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage Gear
 
Ethical hacking (legal)
Ethical hacking (legal)Ethical hacking (legal)
Ethical hacking (legal)
 
BarCamp Melbourne 2012: Internet of Things
BarCamp Melbourne 2012: Internet of ThingsBarCamp Melbourne 2012: Internet of Things
BarCamp Melbourne 2012: Internet of Things
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
 
Device inspection to remote root
Device inspection to remote rootDevice inspection to remote root
Device inspection to remote root
 
Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Dmk blackops2006
Dmk blackops2006Dmk blackops2006
Dmk blackops2006
 
Hyper Island - 2012
Hyper Island - 2012Hyper Island - 2012
Hyper Island - 2012
 
Defcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confusedDefcon 23 - David Huerta - alice and bob are really confused
Defcon 23 - David Huerta - alice and bob are really confused
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobile
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 

More from Yury Chemerkin

Chronicles Security. Digest. 2024-05. Level#Pro.pdf
Chronicles Security. Digest. 2024-05. Level#Pro.pdfChronicles Security. Digest. 2024-05. Level#Pro.pdf
Chronicles Security. Digest. 2024-05. Level#Pro.pdf
Yury Chemerkin
 
Chronicles Security. Digest. 2024-04.pdf
Chronicles Security. Digest. 2024-04.pdfChronicles Security. Digest. 2024-04.pdf
Chronicles Security. Digest. 2024-04.pdf
Yury Chemerkin
 
Irony Security. Digest. 2024-05. Level#Pro.pdf
Irony Security. Digest. 2024-05. Level#Pro.pdfIrony Security. Digest. 2024-05. Level#Pro.pdf
Irony Security. Digest. 2024-05. Level#Pro.pdf
Yury Chemerkin
 
Irony Security. Digest. 2024-04. Pro.pdf
Irony Security. Digest. 2024-04. Pro.pdfIrony Security. Digest. 2024-04. Pro.pdf
Irony Security. Digest. 2024-04. Pro.pdf
Yury Chemerkin
 
Overkill Security. Digest. 2024-04. Pro.pdf
Overkill Security. Digest. 2024-04. Pro.pdfOverkill Security. Digest. 2024-04. Pro.pdf
Overkill Security. Digest. 2024-04. Pro.pdf
Yury Chemerkin
 
Overkill Security. Digest. 2024-05. Level#Pro.pdf
Overkill Security. Digest. 2024-05. Level#Pro.pdfOverkill Security. Digest. 2024-05. Level#Pro.pdf
Overkill Security. Digest. 2024-05. Level#Pro.pdf
Yury Chemerkin
 
Snarky Security. Digest. 2024-04. Pro.pdf
Snarky Security. Digest. 2024-04. Pro.pdfSnarky Security. Digest. 2024-04. Pro.pdf
Snarky Security. Digest. 2024-04. Pro.pdf
Yury Chemerkin
 
Snarky Security. Digest. 2024-05. Level#Pro.pdf
Snarky Security. Digest. 2024-05. Level#Pro.pdfSnarky Security. Digest. 2024-05. Level#Pro.pdf
Snarky Security. Digest. 2024-05. Level#Pro.pdf
Yury Chemerkin
 
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Yury Chemerkin
 
Red october. detailed malware description
Red october. detailed malware descriptionRed october. detailed malware description
Red october. detailed malware description
Yury Chemerkin
 
Comment crew indicators of compromise
Comment crew indicators of compromiseComment crew indicators of compromise
Comment crew indicators of compromise
Yury Chemerkin
 
Appendix g iocs readme
Appendix g iocs readmeAppendix g iocs readme
Appendix g iocs readme
Yury Chemerkin
 
Appendix f (digital) ssl certificates
Appendix f (digital)   ssl certificatesAppendix f (digital)   ssl certificates
Appendix f (digital) ssl certificates
Yury Chemerkin
 
Appendix e (digital) md5s
Appendix e (digital)   md5sAppendix e (digital)   md5s
Appendix e (digital) md5s
Yury Chemerkin
 
Appendix d (digital) fqd ns
Appendix d (digital)   fqd nsAppendix d (digital)   fqd ns
Appendix d (digital) fqd ns
Yury Chemerkin
 
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f6016071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f601Yury Chemerkin
 
Jp3 13
Jp3 13Jp3 13
Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...
Yury Chemerkin
 
Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...
Yury Chemerkin
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capability
Yury Chemerkin
 

More from Yury Chemerkin (20)

Chronicles Security. Digest. 2024-05. Level#Pro.pdf
Chronicles Security. Digest. 2024-05. Level#Pro.pdfChronicles Security. Digest. 2024-05. Level#Pro.pdf
Chronicles Security. Digest. 2024-05. Level#Pro.pdf
 
Chronicles Security. Digest. 2024-04.pdf
Chronicles Security. Digest. 2024-04.pdfChronicles Security. Digest. 2024-04.pdf
Chronicles Security. Digest. 2024-04.pdf
 
Irony Security. Digest. 2024-05. Level#Pro.pdf
Irony Security. Digest. 2024-05. Level#Pro.pdfIrony Security. Digest. 2024-05. Level#Pro.pdf
Irony Security. Digest. 2024-05. Level#Pro.pdf
 
Irony Security. Digest. 2024-04. Pro.pdf
Irony Security. Digest. 2024-04. Pro.pdfIrony Security. Digest. 2024-04. Pro.pdf
Irony Security. Digest. 2024-04. Pro.pdf
 
Overkill Security. Digest. 2024-04. Pro.pdf
Overkill Security. Digest. 2024-04. Pro.pdfOverkill Security. Digest. 2024-04. Pro.pdf
Overkill Security. Digest. 2024-04. Pro.pdf
 
Overkill Security. Digest. 2024-05. Level#Pro.pdf
Overkill Security. Digest. 2024-05. Level#Pro.pdfOverkill Security. Digest. 2024-05. Level#Pro.pdf
Overkill Security. Digest. 2024-05. Level#Pro.pdf
 
Snarky Security. Digest. 2024-04. Pro.pdf
Snarky Security. Digest. 2024-04. Pro.pdfSnarky Security. Digest. 2024-04. Pro.pdf
Snarky Security. Digest. 2024-04. Pro.pdf
 
Snarky Security. Digest. 2024-05. Level#Pro.pdf
Snarky Security. Digest. 2024-05. Level#Pro.pdfSnarky Security. Digest. 2024-05. Level#Pro.pdf
Snarky Security. Digest. 2024-05. Level#Pro.pdf
 
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
 
Red october. detailed malware description
Red october. detailed malware descriptionRed october. detailed malware description
Red october. detailed malware description
 
Comment crew indicators of compromise
Comment crew indicators of compromiseComment crew indicators of compromise
Comment crew indicators of compromise
 
Appendix g iocs readme
Appendix g iocs readmeAppendix g iocs readme
Appendix g iocs readme
 
Appendix f (digital) ssl certificates
Appendix f (digital)   ssl certificatesAppendix f (digital)   ssl certificates
Appendix f (digital) ssl certificates
 
Appendix e (digital) md5s
Appendix e (digital)   md5sAppendix e (digital)   md5s
Appendix e (digital) md5s
 
Appendix d (digital) fqd ns
Appendix d (digital)   fqd nsAppendix d (digital)   fqd ns
Appendix d (digital) fqd ns
 
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f6016071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
 
Jp3 13
Jp3 13Jp3 13
Jp3 13
 
Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...
 
Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capability
 

Recently uploaded

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

John “captain crunch” draper. history of hacking

  • 1. The History of Hacking Hacking as seen from an old school elder who experienced the advancement of computers, telecommunications, and Media ever since this technology was invented.
  • 2. Mainframes ● IBM 360 – Fortran, Cobol, Batch processing ● Untrix and DEC ● Timesharing ● First viruses ● Definition (then) of hacking ● Only large corporations and Universities have them.
  • 3. Mini-Compters ● Typically cost from $75k - $500k ● Only universities have them ● Exception was Alex Kamradt – had a BTI in his garage, running on HP2100 mini. Cost was $120k. ● Ran only BASIC – My first time sharing system.
  • 4. Computer antics and pranks ● First virus - “Catch me if you can” ● Hacking – in the true sense ● Pranks ● Stanford AI lab had blue box program. ● Altos system and Xerox research – basis for Mac GUI that Steve Jobs took.
  • 5. Phone Phreaking 101 ● What is a phone Phreak ● Why they do what they do ● How they have driven phone call costs way down ● Most are blind – giving them exceptional hearing.
  • 6. Methods of Old School Phreakers ● Using “Mute” boxes – Withholding Supervision ● Loop arounds ● Demonstrators ● Party lines ● Blue Boxes ● Red Boxes
  • 7. Why Phone Phreaking worked ● ATT's Decision to use in-band signaling was their downfall. VERY BAD IDEA ● First was 2600 “Pulse Dialing” - Enabled Joe Engressia to “Whistle a call”. ● Later – Multi-Frequency, 700, 900, 1100, 1300, 1500, 1700 – it's NOT DTMF.
  • 8. What you can do with this power ● Anything an operator could do – plus more ● Tap phone lines ● Access inter-trunking routing codes ● Reaching “inward” operators ● Manual routing of calls – stacking tandems (play part of Classic tandem stacking
  • 9. Arpa Net – early days ● Mid 60's to late 70's ● Modems and terminals not available ● Most hosts had guest accounts and little storage ● Most allows playing computer games, or offering academic related programs ● Gentlemen's Systems
  • 10. Early BBS days ● DC Hays modems – 1980's ● BBS systems ● FidoNet very popular – Tom Jennings – I still see him at outdoor rave parties. ● Exchange of illegal hacking methods ● 8BBS busted – Bernard Klaat. Running on PDP-8
  • 11. Online systems ● Compuserve – most expensive ● BIX ● Delphi ● WELL ● AOL ● Many others
  • 12. Modern day hacking ● No longer for just fun and prestige ● Now taken over by spam cartels ● Hacktivism ● DDOS attacks ● Praying on innocence
  • 13. Methods ● Social engineering – is most prevalent ● Trojans – dropped into unsuspecting users clicking on hostile links ● Hostile Javascript – WordPress themes most popular ● Facebook, Gmail, Twitter spam ● Botnets
  • 14. Web attack Methods ● Phishing and Spam ● Cross site scripting ● SQL Injection ● Scanning ● Rootkits
  • 15. Old hacker stories ● White house toilet paper crisis ● Santa barbara nuke crisis ● Taking over KLIV phone lines ● Oink Oink over police radios ● Berkeley riots and taking over their radio calls ● San Jose Free Radio pirate station
  • 16. Questions and contact info ● “jdcrunchman” everywhere. ● jdcrunchman@gmail.com ● Skype, facebook, twitter, all the same.