WebApp Sec mailing list archives
RE: Hacking/security in main-stream media
From: "Levenglick, Jeff" <JLevenglick () fhlbatl com>
Date: Thu, 30 Sep 2004 09:19:09 -0400
'Matrix: Reloaded' Most realistic hack trick in a movie Quote from www.nmap.org - "Trinity is as smart as she is seductive! She whips out Nmap (!!!), scans her target, finds 22/tcp open, and proceeds with an über ssh technique!" " She whips out Nmap version 2.54BETA25, uses it to find a vulnerable SSH server, and then proceeds to exploit it using the SSH1 CRC32 exploit from 2001." The only thing wrong was the date. "Below is an interesting email related to timing. Note that this screen shot shows that Trinity is using Nmap version 2.54BETA25, which was released on June 4, 2001. The next version (2.54BETA26) was released on July 9. The vulnerability she seems to be exploiting was released on February 8, 2001. Date: Fri, 16 May 2003 03:36:24 -0700 (PDT) From: Neil Kandalgaonkar <neil_j_k&at&yahoo.com> To: fyodor () insecure org Subject: nmap... in the PAST! You wrote:
Not only is it important for the coolness factor, but we can learn how Nmap looks in the future by studying that output!
Maybe not. In the first movie, the Matrix world is in 1999. Morpheus mentions how since Neo became the One, they have "freed more minds in the past six months than the past six years". So Trinity is actually using an exploit discovered in 2001, in a simulated world that can be no later than June 2000. " Jeffrey Levenglick Federal Home Loan Bank of Atlanta Internet Systems Engineer 404-888-5398 -----Original Message----- From: Mike Andrews [mailto:mike () se fit edu] Sent: Wednesday, September 29, 2004 04:01 PM To: webappsec () securityfocus com Subject: Hacking/security in main-stream media A bit off the wall, but as good a place to post this as any :) I'm writing a tutorial/courseware on security (both basic topics and programming) and I'm looking for clips from movies or tv to introduce subjects - I've found that videos work well with introductions and short breaks to getting the audience in the right frame of mind (as well as getting them relaxed). So far I have the following.... Jurassic Park - insider threat (the programmer gets the system to bypass security while he steals the DNA/embryos) Sneakers - Cryptography (when the team discovers it's a crypto box they have) The Net - Personally identifiable information (main characters personal information is deleted) War Games - [Not sure yet, not managed to pickup the film] Hackers - [Not sure yet, not managed to pickup the film] Any other suggestions? I'm only wanting short (5min) sections, but I'm willing to edit bit's out if needed. Cheers, Mike. ---- Mike Andrews Florida Institute of Technology ----------------------------------------- This e-mail message is private and may contain confidential or privileged information.
Current thread:
- RE: Hacking/security in main-stream media Levenglick, Jeff (Sep 30)