Q&A: The infamous Kevin Mitnick on hacking, ethics, and the way forward for tech

As we speak, Kevin Mitnick is a safety skilled who infiltrates his purchasers’ firms to show their weaknesses. He’s additionally the creator of a number of books, together with Ghost in the Wires. However he’s most referred to as the hacker who eluded the FBI for years, and was finally imprisoned for his methods. We had an opportunity to speak to him about his time in solitary confinement, hacking McDonald’s, and what he thinks about Nameless.

Digital Tendencies: When did you first develop into excited about hacking?

Kevin Mitnick: Truly what began me in hacking was this pastime I had name telephone phreaking. Once I was a junior in highschool I used to be fascinated with magic, and I met this different scholar who was in a position to do magic with a phone. He might do all these tips: I might name in on a quantity he informed me and he’d name on one other, and we’d be joined collectively, and that is known as a loop-around. It was a telephone firm take a look at circuit. He confirmed me he had this secret quantity on the telephone firm, he might dial a quantity, and it’d give a bizarre tone, after which put in a 5 digit code and he might name anyplace without cost.

He had secret numbers within the telephone firm the place he might name and he didn’t should determine himself, what would occur is that if he had a telephone quantity, he might discover the title and tackle of that quantity even when it was unpublished. He might break by means of name forwarding. He might do magic with the telephone, and I turned actually fascinated with the telephone firm. And I used to be a prankster. I beloved pranks. My foot within the door into hacking was pulling pranks on buddies.

One among my first pranks was I might change my buddies’ house telephone to a pay telephone. So every time he or his mother and father’ tried to make a name it might say “please deposit 1 / 4.”

So my entry into hacking was my fascination with the telephone firm and wanting to drag pranks.

DT: The place did you get the technical information to begin pulling these items off?

KM: I used to be excited about know-how myself, and he wouldn’t really inform me how he did issues. Generally I might overhear what he was doing, and I knew he was utilizing social engineering, however he was just like the magician who did the tips however wouldn’t inform me how they have been accomplished, so I must work it out myself.

Previous to assembly this man, I used to be already an beginner radio operator. I handed my HAM radio take a look at once I was 13, and I used to be already into electronics and radio so I had that technical background.

This was again within the 70s, and I couldn’t get a C.B. license since you needed to be 18 years outdated, and I used to be 11 or 12. So I met this bus driver once I was driving the bus at some point, and this driver launched me to HAM radio. He confirmed me how he might make telephone calls utilizing his handheld radio, which I believed was tremendous cool as a result of it was earlier than cell telephones and I believed “Wow that is so cool, I’ve to study it.” I picked up some books, took some programs, and at 13 handed the examination.

Then I discovered about telephones. After that, one other scholar in highschool launched me to the pc teacher to take a pc class. At first the teacher wouldn’t let me in as a result of I didn’t meet the stipulations, after which I confirmed him all of the tips I might do with the phone, and he was totally impressed and allowed me into the category.

DT: Do you’ve a favourite hack, or one that you simply have been significantly pleased with?

KM: The hack I’m most connected to was hacking McDonald’s. What I labored out — you keep in mind I had my HAM radio license — I might take over the drive-up home windows. I might sit throughout the road and take them over. You possibly can think about at 16, 17 years outdated, what enjoyable you could possibly have. So the individual in McDonald’s might hear every little thing happening, however they couldn’t overpower me, I might overpower them.

Clients would drive up and I might take their order and say “Okay, you’re the 50th buyer at this time, your order is free please drive ahead.” Or cops would come up and typically I’d say “I’m sorry sir we don’t have any donuts for you at this time, and for cops we solely serve Dunkin Donuts.” Both that or I’d go, “Conceal the cocaine! Conceal the cocaine!”

It acquired to the purpose the place the supervisor would come out into the parking zone, take a look at the lot, look within the automobiles, and naturally nobody’s round. So he’d go as much as the drive-up speaker and really look inside like there was a person hidden inside, after which I’d go “What the hell are you taking a look at!”

DT: Will you discuss a bit in regards to the distinction between social engineering your method right into a community and really hacking into one?

KM: The reality of the matter is most hacks are hybrid. You possibly can get right into a community by means of community exploitation – , discovering a pure technical method. You possibly can do it by means of manipulating individuals who have entry to computer systems, to disclose data or to do an “motion merchandise” like open a PDF file. Or you possibly can acquire bodily entry to the place their computer systems or servers are and do it this fashion. However it’s not likely one or the opposite, it’s actually based mostly on the goal and the state of affairs, and that’s the place the hacker decides which ability to make use of, which avenue they’re going to make use of to breach the system.

Now at this time, social engineering is a considerable risk as a result of RSA [Security] and Google have been hacked, and these have been by means of a way known as spear phishing. With the RSA assaults, which have been substantial as a result of the attackers stole the token seeds which protection contractors used for authentication, the hackers booby-trapped an Excel doc with a Flash object. They discovered a goal inside RSA that may have entry to data they needed, and despatched this booby-trapped doc to the sufferer, and once they opened the Excel doc (which was in all probability despatched from what appeared like a reliable supply, a buyer, enterprise companion) it invisibly exploited a vulnerability inside Adobe Flash and the hacker then had entry to this worker’s workstation and RSA’s inner community.

Spear phishing makes use of two parts: Social networking to get the individual to open up the Excel doc, and the second half is the technical exploitation of a bug or safety flaw in Adobe that gave the attacker full management of the pc. And that’s the way it works in the true world. You don’t simply name anyone up on the telephone and ask for a password; assaults are normally hybrid and mix technical and social engineering.

In Ghost within the Wires, I describe how I used each methods.


Topics: Social Engineering, solitary confinement, Speaking Engagements, telephone pranks, hybrid assaults, C.B. license, FBI, Flash object, hacking, HAM radio, PDF file, protection contractors, RSA, safety flaw, security consultant, Kevin Mitnick Security Awareness Training, loop-around, telephone phreaking, authentication, Adobe, motion merchandise, phishing, Ghost in the Wires, hacking ethics, hacking McDonald's, Kevin Mitnick, Nameless

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›