Home
Authors
Tags
App
Get QuoteDark Inspirational Quotes App
" I have done a lot to rehabilitate my reputation. "
Kevin Mitnick
Lot
Reputation
Done
Related Quotes:
" I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access. "
Kevin Mitnick
Engineers
Search
I Can
" The perfect PIN is not four digits and not associated with your life, like an old telephone number. It's something easy for you to remember and hard for other people to guess. "
Kevin Mitnick
People
Life
Perfect
" What I found personally to be true was that it's easier to manipulate people rather than technology. "
Kevin Mitnick
Be True
True
Technology
" Back in my day, I would probe by hand. Now you can get commercial software that does the job for you. "
Kevin Mitnick
Now
Job
Back
" Garbage can provide important details for hackers: names, telephone numbers, a company's internal jargon. "
Kevin Mitnick
Details
Numbers
Important
" I think it goes back to my high school days. In computer class, the first assignment was to write a program to print the first 100 Fibonacci numbers. Instead, I wrote a program that would steal passwords of students. My teacher gave me an A. "
Kevin Mitnick
School
Teacher
Think
" I was pretty much the government's poster boy for what I had done. "
Kevin Mitnick
Boy
Government
Much
" The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care. "
Kevin Mitnick
Care
Interesting
Reality
" Usually companies hire me, and they know full well who I am, and that's one of the reasons they want to hire me. "
Kevin Mitnick
I Am
Well
Want
" Businesses should absolutely set aside funding in their budgets for security consultants. Unless there is an expert on staff, and there usually is not, it needs to be outsourced. "
Kevin Mitnick
Expert
Needs
Funding
" I saw myself as an electronic joy rider. I was like James Bond behind the computer. I was just having a blast. "
Kevin Mitnick
Joy
Like
Myself
" Then again, my case was all about the misappropriation of source code because I wanted to become the best hacker in the world and I enjoyed beating the security mechanisms. "
Kevin Mitnick
Hacker
Become
Security
" No company that I ever hacked into reported any damages, which they were required to do for significant losses. "
Kevin Mitnick
Any
Losses
Company
" Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker. "
Kevin Mitnick
Action
Organization
Influence
" My hacking was all about becoming the best at circumventing security. So when I was a fugitive, I worked systems administrator jobs to make money. I wasn't stealing money or using other people's credit cards. I was doing a 9-to-5 job. "
Kevin Mitnick
Money
People
Security
" I don't know of any case that involves computer hacking where there were multiple defendants charged where there wasn't an informant on the case. "
Kevin Mitnick
Where
Computer
Case
" I could pose as a Yahoo rep claiming that there's been some sort of fault, and somebody else is getting your e-mail, and we're going to have to remove your account and reinstall it. So what we'll do is reset the current password that you have - and by the way, what is it? "
Kevin Mitnick
Going
Way
You
" At the end of the day, my goal was to be the best hacker. "
Kevin Mitnick
Best
Day
End
" Both social engineering and technical attacks played a big part in what I was able to do. It was a hybrid. I used social engineering when it was appropriate, and exploited technical vulnerabilities when it was appropriate. "
Kevin Mitnick
Social
Used
Hybrid
" Once when I was a fugitive, I was working for a law firm in Denver. "
Kevin Mitnick
Once
Law
Firm
" The explosion of companies deploying wireless networks insecurely is creating vulnerabilities, as they think it's limited to the office - then they have Johnny Hacker in the parking lot with an 802.11 antenna using the network to send threatening emails to the president! "
Kevin Mitnick
Parking
Hacker
Creating
" What happens with smaller businesses is that they give in to the misconception that their site is secure because the system administrator deployed standard security products - firewalls, intrusion detection systems, or stronger authentication devices such as time-based tokens or biometric smart cards. But those things can be exploited. "
Kevin Mitnick
Cards
Stronger
Smart
" I get hired to hack into computers now and sometimes it's actually easier than it was years ago. "
Kevin Mitnick
Computers
Years
Sometimes
" Nine out of every 10 large corporations and government agencies have been attacked by computer intruders. "
Kevin Mitnick
Been
Out
Corporations
" A log-in simulator is a program to trick some unknowing user into providing their user name and password. "
Kevin Mitnick
Some
Program
Trick
" I was hooked in before hacking was even illegal. "
Kevin Mitnick
Hooked
Even
Hacking
" As a young boy, I was taught in high school that hacking was cool. "
Kevin Mitnick
Boy
Young
School
" Choosing a hard-to-guess, but easy-to-remember password is important! "
Kevin Mitnick
Important
Choosing
" A lot of companies are clueless, because they spend most or all of their security budget on high-tech security like fire walls and biometric authentication - which are important and needed - but then they don't train their people. "
Kevin Mitnick
Important
Fire
Train
" I'm an expert witness in a case that's in appeal about a guy who allegedly misappropriated source code from a major, major company - he actually worked there and then apparently they found it on his laptop later. "
Kevin Mitnick
Witness
Guy
Source