T A K E D
O W N

T R A N S C R I P T S


Kevin On Demand!

February 10-11, 1995


** SOON SATAN WILL FIND YOUR SECURITY HOLES

Start: 1995 Feb 10 22:54:16
Total Run Time: 9:54

From NETCOM-rtp1.netcom.net to netcom10.netcom.com.

Kevin breaks into Dan Farmer's machine, fish.com, and peruses his files and mail looking for information about himself, Tsutomu, security holes, and the FBI. Breaks into Sun, confirming that the "access1" in the talk session that afternoon really did refer to access1.sun.com. Kevin also has a fascination with looking through the command histories of system administrators, presumbaly to see if they are on to him.

** He just stole MANIAC

Start: 1995 Feb 10 23:26:50
Total Run Time: 17:32

From NETCOM-rtp1.netcom.net to netcom15.netcom.com.

Kevin breaks into Motorola, and steals, with a fair bit of thrashing, the source code to Motorola's firewall product, MANIAC (Motorola Authenticated Internet Access). This is the call that GTE failed to trace.

*** Dumb and Dumber

Start: 1995 Feb 11 00:21:55
Total Run Time: 7:15

From NETCOM-rtp1.netcom.net to netcom15.netcom.com.

The previous night, Kevin rebuilt the kernel (the essential parts of the operating system on a Unix host) on csn.org (Colorado SuperNet)'s server to include NIT (a program for watching what happens on the network), using the CERT advisory on how to remove NIT as a guide. Watch him thrash trying to install a new kernel (he could have done exactly what he wanted to with a one-line command), and reboot their system (so that the new kernel will take effect). Several mistakes were made, causing the task to take much longer and be more complex than necessary.

** What a way to spend a Friday night

Start: 1995 Feb 11 00:31:13
Total Run Time: 14:02

From NETCOM-rtp1.netcom.net to netcom15.netcom.com.

Kevin returns to CSN and confirms that he has successfully installed NIT. He then tries to erase some signs that he rebooted their system, apparently hoping that the system administrators are dim enough not to notice. Having completed his rounds at CSN, goes to a collection of other sites. This is the call which was traced by GTE to the bogus phone number +1 919 688 2774.

** I am on a VMS v4.7 box and I am in need of some assistance.

Start: 1995 Feb 11 14:24:43
Total Run Time: 5:17

From NETCOM-min1.netcom.net to netcom14.netcom.com.

We see that Kevin is not the VMS wizard that he was reputed to be: he posted a note to USENET asking for help in copying files from one VMS machine to another. He copies the stolen MANIAC source to Netcom, and we can see some of the other goodies he has stashed away.

**** U.S. hunts master computer 'cracker'

Start: 1995 Feb 11 14:30:16
Total Run Time: 1:45

From NETCOM-min1.netcom.net to netcom14.netcom.com.

Kevin finally utters his true name, as he breaks into Mead Data Central's NEXIS/LEXIS system and queries the current news file for "MITNICK W/30 KEVIN". He finds a few recent news articles that mention him, including two wire service articles about the U.S. Marshall's Service and the FBI asking the public for help in tracking down Kevin David Mitnick, "a legendary master manipulator of the information superhighway".


TAKEDOWNBIOGRAPHYTIMELINEEVIDENCE
PURSUITCOVERAGESCENIC TOUR


Copyright © 1995 Vicious Fishes Web Design and Dan Meriwether. All rights reserved.
Contact: webmaster@takedown.com