• rtxn@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      8 months ago

      No, no, first you need to reroute, to be able to patch it through, and THEN you can override the command sequence in order to exploit parallelisms at the core root interface.

    • cynar@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      8 months ago

      One of the funnier ones is that the matrix actually did hacking right. It was also so quick you don’t notice it.

      When Trinity hacks into the power station, it’s legit. She checks the software version, which shows an out of date version. She then uses a known flaw in that version to reset the password.

      It’s the only bit of actual hacking in the movie. They obviously knew that geeks would be checking it frame by frame, so they actually did their homework on it.

    • onlinepersona@programming.dev
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      8 months ago

      I’ve love to watch a realistic hacker movie, because the shit that hackers get into is genuinely bonkers. For example, some white hats got all the way into Apple’s inventory system and IIRC they could’ve disrupted all of Apple’s logistics. Imagine if a black hat got into that. Or the Ukrainian hackers that got into the taxation system of the Russians and were there for a few months. Or the USAians who got into the biggest Belgian telecom and were kicked out years later by a Dutch security company.

      Movies or even better TV series showing the time it takes to get into such systems would be amazing. Day 1 phishing, day 40 established beachhead, day 120 gained access to internal system X, day 121 triggered internal alarm and was nearly discovered but was able to cover up traces, etc.

      Nobody watches 90 minutes of football matches. Everyone watches the highlights and that’s what movies could be too.

      CC BY-NC-SA 4.0

  • snrkl@lemmy.sdf.org
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    FWIW, Little known fact: Matrix 2 used real vuln (SSH CRC32) for trinity power grid hacking scene.

    Even better to know: the scene was completed before the CRC32 vuln was public. So the scene used real 0day vuln…