So in 1992, I was living in Denver, Colorado,
but under the name of Eric Weiss,
because the federal authorities were trying to find me,
and I was trying to obviously evade them.
黑客历史上最伟大的时刻摩托罗拉MicroTAC Ultra Lite
GREATEST MOMENTS IN HACKING HISTORYMOTOROLA MICROTAC ULTRA LITE
Kevin Mitnick was once the most wanted cyber criminal in the country.
In 1992, Mitnick became a fugitive when he violated his probation
related to his previous cyber crimes by monitoring the voicemails
of the authorities investigating him.
我的一位同事递给我这本MicroTAC Ultra Lite手机的宣传册
One of my colleagues handed me this brochure for the MicroTAC Ultra Lite cell phone,
And this cell phone is like the iPhone X of the 1990s.
It was an awesome phone.
Since I was a fugitive at the time,
I wanted to have a better way to contact people
and evade the government surveillance.
If I could actually modify the code in the cell phone
where I can change my ESN
and Mobile Identification Number from the keypad.
Well, I could actually turn off the ability for the cell sites
to control what my device would do.
I thought it would be better at evading the government.
So I kinda made a stupid and regrettable decision
就是去追溯位于MicroTAC Ultra Lite中的
to go after the source code to the firmware
that’s in the MicroTAC Ultra Lite.
So the first call I made was to 1-800 directory assistance,
asking for the number for Motorola.
I call that number, a receptionist answers.
我说 嗨 我正在寻找MicroTAC Ultra Lite的项目经理
I go, “Hi, I’m looking for the project manager of the MicroTAC Ultra Lite.”
然后电话被转接了二 三 五次
So I’m transferred around two, three, five
and by the eighth transfer,
I’m now talking to the vice president for all of Motorola Mobility.
During my last transfers, I learned that
they had a research center in Arlington Heights.
所以我说 嘿 我是阿灵顿高地研究中心的瑞克·欧福
So I say, “Hey! this is Rick Over in Arlington Heights,
我要找MicroTAC Ultra Lite的项目经理
I’m looking for the project manager of the MicroTAC Ultra Lite.”
副总裁说 哦 你说的是帕姆 她在我手下工作
The VP says, “Oh, that’s Pam. She works for me.
Would you like her extension?”
I called Pam’s number,
but I get her voicemail
that she just left on a two-week vacation,
and if you need any help whatsoever,
call Aleesha on extension blah, blah, blah.
于是我打电话给她说 嘿 艾妮莎
I called Aleesha, “Hey, Aleesha,
this is Rick Over in Arlington Heights.
Did Pam leave on vacation yet?”
“Oh, she has.”
“Well, before she left,
就应该把MicroTAC Ultra Lite的源代码发给我的
she was supposed to send me the source code for the MicroTAC Ultra Lite,
but she told me if she didn’t have time,
that you would help me out.”
So she asked me, “What version do you want?”
and I didn’t even know the version number.
So I just said,
“How about the latest and the greatest?”
It takes her about five minutes to turn.
瑞克 我找到了源代码 但现在有个问题
“Rick, I found the source code, but there’s a problem.
There are hundreds of directories and within each directory,
there are hundreds of files.”
I asked her, “Do you know how to use Tar and Gzip?”,
because I knew they worked in a Linux environment.
“No.” “Would you like to learn?”
And she said yes, so I became her instructor.
And after the lesson, we have a five-megabyte file
MicroTAC Ultra Lite源代码文件
of the source code to the MicroTAC Ultra Lite.
So my next question was, “Do you know how to use FTP?”
“Oh, you mean File Transfer Protocol?”
I go, “Exactly!”
So I gave her an IP address
of an anonymous FTP server in Denver.
I said, “Here, try to connect to this IP address using FTP.”
She tries making a connection and it times out.
“Can’t connect”, and then she goes,
“Rick, I’m gonna talk to my security manager
about what you’re asking me to do.
I’ll be right back.”
不 不 等等 等等
“No, no, wait, wait, wait”,
cuz the last person I want her to speak to is the security manager.
I’m on hold and getting a little bit nervous
because it’s taking a long time for her to return to the call.
And I’m thinking the security is gonna hook up a tape recorder,
and that’s gonna be Exhibit A in a future court case against me.
She finally returns, “Rick?”
I don’t really like wanted those talk much,
因为我担心自己会被录音 我说 嗯哼
because I was worried I was being recorded. I go, “Uh-huh?”
“That IP address you gave us is outside of Motorola’s campus.”
我说 嗯哼 非常失望地打算挂电话
I go uh-huh, extremely disappointed about to hit the end on the cell phone call,
我说 好吧 还是要谢谢你
and I said, “Well, thanks anyway.”
她说 等等 我有一些好消息 -什么？
And she goes, “Wait, I have some great news.” “What?”
“My security manager gave me his personal username and password to the proxy server,
so I could upload the file.”
Once I had the source code, I analyzed it
to understand how it worked, looking at the security features,
and thought it was too easy and not really challenging.
So I decided to do with other attack,
where I actually gained access to their network,
and was able to breach their workstations
which had all the versions of their source code.
It was kind of an accomplishment.
Did I give it to anybody else or tried to profit in any way?
No. It was really
“I got it, it was done, and then it was on to the next.”
Kevin Mitnick was apprehended in North Carolina by the FBI in 1995
and plead guilty to computer fraud, wire fraud, and illegally intercepting communications.
He was released in the year 2000 after serving almost five years in prison.