How a Hacker Convinced Motorola to Send Him Source Code
Hacker outsmarts motorolla

Follow by Email
Facebook
Twitter
Instagram
In this episode of 'Greatest Moments in Hacking History,' Kevin Mitnick is a fugitive hiding out in Colorado. In an attempt to avoid detection from the authorities, Mitnick decides he wants to hack a cellphone so he can hide his location while using the device. To do this, the hacker sets up a social engineering attack against Motorola to fool them into giving him the source code to the MicroTAC Ultra Lite cell phone so he can break into it. WATCH NEXT: Samy Kamkar Takes Down Myspace: https://www.youtube.com/watch?v=DtnuaHl378M Subscribe to MOTHERBOARD: http://bit.ly/Subscribe-To-MOTHERBOARD Follow MOTHERBOARD Facebook: http://www.facebook.com/motherboardtv Twitter: http://twitter.com/motherboard Tumblr: http://motherboardtv.tumblr.com/ Instagram: http://instagram.com/motherboardvice More videos from the VICE network: https://www.fb.com/vicevideo

Comments

Lewis Kelly : Would be nice if you didn't put the annotation boxes over the text at the end

matt b : Talk about a stroke of luck with the vacation timing.

dbsirius : Social engineering at its finest ;)

Volvirth : Security Manager: "Huh, what's that, you want to upload the entire source code of our best running mobile device, and you want to send it to an external IP address? SUUURE, JUST TAKE MY PERSONAL CREDENTIALS, HERE, MAKE SURE TO UPLOAD AAALLL OF IT." ... ~Best. Security. Manager. EVER~

jasperedwin : Would you like to learn??

Shaun Dreclin : The weakest link in any good security system is the person behind the keyboard

COOKIE WOKE : Speech 100

Heartless : The security manager had ONE job..

Pete Smyth : I socially engineered the source code out of them, but it was too easy, so I hacked them to get it again.

Finndramere : lmao the title said "How a Hacker Convinced Motorola to Send Him Sour... " i immediately assumed it was sour cream wtf is wrong with me

piranha031091 : I highly recommend his autobiography, "ghost in the wires". Not often did a book get my heart racing like that!

Mitnick Security Consulting : Hope you enjoyed one of my favorite stories. - KM

GogL0L : Humans are the most complex machines, but also the easiest to hack.

Md Shariful Islam 1604064 : 3:41 Totally accurate representation of security breach

Kernels : Remember that the best way to attack is to exploit the human itself.. You don't need these special hacks when you can engineer a person to run your payload. Mainly, this is the reason why people and companies are still being hacked... Just like some people say, best anti virus is common sense.

Max Payne : So. Was avoiding surv and got side tracked hacking motorola mainframes

Rainbow Dynamix : So uhh, can we get that source code? 😂

UMESH Shridar : This guy should be hired by Motorola

X : "Kevin Mitnick was apprehended in North Carolina by the FBI in 1995 and plead guilty to computer fraud, wire fraud, and illegally intercepting communications. He was released in the year 2000 after serving almost five years in prison." end of video text

Nicksperiments : Impressive but can he turn the cmd green?

Viral Crate : im pretty sure he now works for the CIA

Cyber Infotech : *ILLUSION 100* *SPEECH 100*

Pajama Pants : Absolute madlad.

Ivan Hedz : 3:30 😂🤣"My security manager gave me his personal username and password to the proxy server."

Tomas Tur : This is why milenials with no social skills and short phone calls will be more secure :v

Yudi : 3:34 hey, Motherboard. Thanks for the login detail. Can you please send me the link to login too?

JOSE A. G.J : I have been watching science and computer videos for 3 hours now, I can't stop. Someone help me.!!

Silica : OMG THAT SECURITY MANAGER LOL

Gabriel Ko : I am still wondering why hackers are imprisoned when they can be so useful

Best China Deals : I still have my '96 "Free Kevin!" -shirt somewhere in a box. 👍

Lawrence Billson : I bet Motorola weren’t using Linux in 1992.

Abhijeet Mishra : I would totally recommend reading Kevin's Ghost in the Wires

MegaCaliGrown420 : iPhone 10 of the 1990's? So... Does that mean all those people who owned that phone during that Era thought their shit smelt like fabric softener? Or?

Munden : Kevin Mitnick looks totally different, never would have guessed that was him

BigBwoyTing : Lmao most of the time the biggest hist are the simplest. Just because people are idiots.

Zachary Tyhacz : throughout the whole part of him explaining the phone call - social engineering all i thought was " bruh "

A homeschooler's workbench : Thanks for the great video. I would love to hear more story's from Kevin.

Adam : Thank you so much for bringing this series back I’ve been waiting since the MySpace episode

Mr. Spider Animations : Cyberchase gang needs to save motherboard.

easy easy : Username: securityManagerR1 Password: s4fetyFIRST

Julião F : Please open the subtitles translation for community contribution.

whatish thishshiz : I remember the Free Kevin Mitnick movement, great accomplishments for a hacker..

RandomName Last Name : "This cellphone is like the iPhone 10 of the 1990s" So, not very good? "It was awesome" Oh

Michael Sangma : Social engineering at its best.

Gun Fighter : Who needs saboteurs when you got security managers like that? 😂

Mehmet End : This is HIGH END QUALITY fun. I bursted many times over here. Greetz from southern Germany! Long live the Anarchy V

André Fahlman : that's social engineering for ya

Cooper & the Cash : Colorado, where the greatest American stories come from.

Akram Safirul : Have ever got so bored you started to hack an entire mobile company?