All The Software Two Ohio Inmates Needed To Hack Wi-Fi Networks From The Comfort Of Prison

Last week, news got out that two prisoners in the Ohio Department of Rehabilitation and Correction were caught with a few hacked together computers hidden in the ceiling above a closet. What'd they do with these computers? Aside from obviously downloading porn, they were also laying down a wide variety of scams and hacks.

Photo by Donald Tong.

The two inmates, Adam Johnston and Scott Spriggs, were somehow not only able to piece together entire computers with stolen parts without anyone noticing, they were also able to run ethernet cables through the ceiling and down to the network switch to gain internet access without any restrictions. They then accessed those computers and their unfettered access to the internet with remote desktop software.

With this newfound power, they stole the identity of one inmate and used it to apply for five credit cards; downloaded a ton of porn and other movies then sent them over to other inmates on thumb drives; and then used a variety of software to brute force crack passwords, spam emails, and perform a few man-in-the-middle attacks to grab account details so they could grant passes for inmates within the prison.

Good news too, we have the full Ohio Inspector General report, and that includes a list of all the software the inmates used. If you've been reading Lifehacker for a while, you're going to recognise some of this software:

The whole thing is something out of an episode of Mr Robot, but in Ohio, and slightly less political in nature. Still, it's a fascinating story, and one that despite the illegal nature of it all, any geek can at least nod their head in respect at.


Comments

Be the first to comment on this story!

Trending Stories Right Now