If you liked this post, you may also be interested in...
- Please Join Techdirt In Celebrating 'National Law Enforcement Appreciation Day!'
- Hey The North Face! When You Said Sending Us A Bogus Trademark Threat Was A Mistake, We Believed You; So Why Did You Do It Again?
- Devin Nunes Retires From Congress To Spend More Time Banning Satirical Cows From Trump's New Social Network
- Ken Popehat White (Again) Shows How To Respond To A Completely Thuggish Legal Threat Letter
- Minnesota Dept. Of Public Safety Now Handing Out License/Insurance Carriers In Hopes Of Keeping Cops From Killing More Drivers
Reader Comments
Subscribe: RSS
View by: Time | Thread
You'd like to think that
[ link to this | view in chronology ]
You know what?
I doubt I'm the only computer geek in the world who can't wait to get home and emulate some realistic hack seen in a flick.
[ link to this | view in chronology ]
Re: You know what?
[ link to this | view in chronology ]
Threats and Vulnerabilities and Exploits, Oh My
The funny thing about their advice, and most folks advice in this manner, is that running the sshd exploit is not always illegal. In a matter of fact, I've run the sshd exploit numerous times, and have never once had to worry about the feds cracking through my door. I run the exploit against my own hardware, my own operating systems, on a non-Internet connected network run by me using my own hardware. This, along with many other exploits I am testing out in order to figure out ways to securely run services and defeat attacks.
Furthermore, advice like this actually stands to harm administrators, who don't realize that they can use "safe" exploits to test their systems for vulnerabilities. I hear folks all the time saying they would never run exploits against their own machines to test security, yet my real servers have never been exploited, and their's have, likely because they haven't taken the time to figure out what the problem is and how to fix it like I have. Yet folks still point to what I do as being either illegal (it isn't) or unethical (how?).
No, you shouldn't run these exploits against systems you do not have a legitimate reason for attacking, but this blanket "do not hack" attitude has to stop for the benefit of society.
[ link to this | view in chronology ]
Re: Threats and Vulnerabilities and Exploits, Oh M
I was impressed with the care and detail which that scene was filmed
[ link to this | view in chronology ]
Re: Threats and Vulnerabilities and Exploits, Oh M
I WAS impressed with the care and detail with which that scene was filmed.
[ link to this | view in chronology ]
Re: Threats and Vulnerabilities and Exploits, Oh M
[ link to this | view in chronology ]
Re: Threats and Vulnerabilities and Exploits, Oh M
and sshnuke is a real exploit, it was an exploit in SSH 1 only, and was fixed as soon as SSH 2 was released.
[ link to this | view in chronology ]
How could she use that vulnerability
The first Matrix movie was set up in 1999 and in Reloaded, Morpheus says that in the last six months (since Neo joined them) they have freed many more minds than before. So reloaded is set up at best in mid 2000.
How could trinity use a nonexistent tool with an unknown vulnerability?
OK, maybe trinity is the best cracker of them-all (according to the first movie she is one of the best) and she knew the SSH v1 vulnerability and she developed the sshnuke program herself, but how could she use Nmap 2.54 beta?
[ link to this | view in chronology ]
Uhm,
Keep in mind, that it is only 2000 within the Matrix. The hacking tools are brought into the Matrix with them. So she brought tools applicable to the current technology back then, despite the fact that, within the program, they had not been created yet.
Just like how they are flying around in a hover-craft, even though they have not been invented yet.
Nuff said.
[ link to this | view in chronology ]
Re: How could she use that vulnerability
sshnuke was coded in 2001
:DDD
[ link to this | view in chronology ]
Re: Threats and Vulnerabilities and Exploits, Oh M
[ link to this | view in chronology ]
Re: Threats and Vulnerabilities and Exploits, Oh M
[ link to this | view in chronology ]
ssh nuke...
[ link to this | view in chronology ]
i wnt 2 become a hacker
[ link to this | view in chronology ]
whatash** some things nmap, etc
[ link to this | view in chronology ]