From “prankster” to the hacker, or how Kevin Mitnick started

Kevin Mitnick is the most famous hacker in the world. For years, however, has been working on the side of "the good ones". Companies hire Mitnick to help protect their valuable data.

During the Business Insider Inside Trends conference, Kevin Mitnick told about the beginnings of his stormy career with computers in the background - he finally spent five years in prison.

Telephone tips

Mitnicka's adventure with hacking began because he was fascinated by tricks as a young boy . At school, friends showed him, among others telephone tricks. A telephone to a special number made it possible to find out what number the connection was previously received from. Tapping the secret code allowed you to make a connection to anywhere in the world for free. - I was a bachelor . I wanted to learn these techniques to make jokes - said Mitnick during the Business Insider Inside Trends conference.

This is the so-called "phreaking" (from the English words "freak" and "phone"). Similar "games" were dealt with, among others, Steve Wozniak, one of the founders of Apple . He constructed so-called blue boxes , or devices that allow hacking analog phones to make free calls from them.Also, the money from the sale of such devices was to be used to partially finance work on the company's computers, and Wozniak also said that he even made a connection to the Pope and gave up for Henry Kissinger.

Information technology at school

Interestingly, Mitnick remarked that initially he was not too interested in IT at school. - Writing programs at school was boring. I wanted to do something cool - said Mitnick.


Young Kevin Mitnick did not do one of the homework, which was to rely on the representation of the Fibonacci sequence. Instead, he created a program that ... stole the IT teacher's password. He would react to the program shown with a big smile and say: "this is great."

Mitnick remarked that now his IT teacher may regret his words of encouragement to further develop computer skills.

Kevin Mitnick won global fame in the early 90s when he was wanted by the FBI. For over a dozen years, it helps companies to check their security. He repeatedly proved that it is "social engineering" , that is, proper manipulation of people and drawing information from them, is crucial in acquiring other people's data or access to information systems - even in the case of global corporations.

For this original article and other great business articles, please refer to the source.


Topics: Social Engineering, Speaking Engagements, Poland, data protection, Inside Trends, Steve Wozniak, telephone phreaking, blue boxes, password theft, Fibonacci sequence, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›

Understanding Post-Inoculation Cybersecurity Attack Vectors

If you’ve recently improved your cybersecurity posture, you should know that the work to protect your company’s data is not over.

Read more ›