I am doing a little research on famous hacking/cracking/phreaking individuals/communities and the type of hacking they do.

I want to also document some cool/fun/good hacks

It would be great if you can share the knowledge :)

here is example of some hacking groups :

the Legions of the Underground (LoU)
Chaos Computer Club
Legion of Doom
Masters of Deception
Phrack
Cult of the Dead Cow

here are example of nice hacks

1989 DOE, HEPNET and SPAN (NASA) connected VMS machines world wide were penetrated by the anti-nuclear WANK worm. [...] WANK penetrated machines had their login screens altered to:

W O R M S A G A I N S T N U C L E A R K I L L E R S
< WANK ascii art >
Your System Has Been Officially WANKed
You talk of times of peace for all, and then prepare for war.

In 1972, John T. Draper discovered he could make free long-distance phone calls using a whistle from a Cap'n Crunch cereal box. The whistle emitted a 2,600-hertz tone that got him into the internal authorization system at the phone company.
Captain Zap: Ian Murphy, known to his friends as Captain Zap, was the first cracker to be tried and convicted as a felon. Murphy broke into AT&T's computers in 1981 and changed the internal clocks that metered billing rates. People were getting late-night discount rates when they called at midday.

Looking forward for your replies
Well, there's a difference between hacking and cracking, but I'm not going to lecture on that!

One of the most epic cracks I know of was perpetrated by a truly great hacker: Ken Thompson.
Ken Thompson's 1983 Turing Award lecture to the ACM admitted the existence of a back door in early Unix versions that may have qualified as the most fiendishly clever security hack of all time. In this scheme, the C compiler contained code that would recognize when the `login' command was being recompiled and insert some code recognizing a password chosen by Thompson, giving him entry to the system whether or not an account had been created for him.

Normally such a back door could be removed by removing it from the source code for the compiler and recompiling the compiler. But to recompile the compiler, you have to *use* the compiler -- so Thompson also arranged that the compiler would *recognize when it was compiling a version of itself*, and insert into the recompiled compiler the code to insert into the recompiled `login' the code to allow Thompson entry -- and, of course, the code to recognize itself and do the whole thing again the next time around! And having done this once, he was then able to recompile the compiler from the original sources; the hack perpetuated itself invisibly, leaving the back door in place and active but with no trace in the sources.

The talk that suggested this truly moby hack was published as "Reflections on Trusting Trust", "Communications of the ACM 27", 8 (August 1984), pp. 761--763 (text available at http://www.acm.org/classics). Ken Thompson has since confirmed that this hack was implemented and that the Trojan Horse code did appear in the login binary of a Unix Support group machine. Ken says the crocked compiler was never distributed. Your editor has heard two separate reports that suggest that the crocked login did make it out of Bell Labs, notably to BBN, and that it enabled at least one late-night login across the network by someone using the login name `kt'.
From: http://www.jargon.net/jargonfile/b/backdoor.html
saeidw wroteOne of the most epic cracks I know of was perpetrated by a truly great hacker: Ken Thompson
Loved it.


So no one is going to mention Stuxnet? It's probably the most talked about computer worm ever. Not because of the complexity of the code, or because of the magnitude of damage, but because of the disproportionate media frenzy it generated.
6 days later
Check out the first superstar hacker Kevin Mitnick. He wrote a very good book about social engineering.
And I remember seeing a movie about him.
More recently, there has been the whole iTunes/AT&T email listing hack debacle. Those two "hackers" (more like idiots in this case) got caught. Lookup 'Goatse Security' and Andrew Auernheimer.

Or this (check out this guy's face):
http://mashable.com/2010/06/15/ipad-hacker/

Their fame won't last tho.