The Mitnick attack has five general steps:īefore the attack, Mitnick was able to determine the TCP sequence number generator’s behavior of X-Terminal and a trusted relationship between X-Terminal and Server.ĭetermine the TCP sequence number generator’s behavior Otherwise, it sends a RESET response to drop the connection request. If computer A wants to establish the connection, it sends an ACK response with number (xB+1) back to computer B. Three-way handshake has three steps:Ĭomputer A sends a SYN request under its IP address with a random TCP sequence number xA to computer B.Ĭomputer B sends an ACK response with number (xA+1) and its own random TCP sequence number xB back to computer A. In the Mitnick attack, the three-way handshake used TCP sequence number and IP address as proof for identity and signature. server and client), a connection can be established by a three-way handshake. If there is a trusted relationship between two computers (e.g. Now he is a security consultant in his own firm Mitnick Security Consulting. He was captured by the FBI with the aid of Tsutomu and sentenced 5 years in prison. In his early age, he was on the FBI most wanted cyber criminal list.
He is an expert in social engineering, which helped him to obtain many classified information used for his hacking hobby. Kevin Mitnick(born October 6, 1963) is known as 'the most famous' hacker in United States of America.