Nmap Featured in The Matrix Reloaded 651
rajiv was among dozens to report that unlike most "Hacks" in film, The Matrix reloaded actually has an ounce of reality where other films would rely on fancy 3D graphics. You can see more at Insecure.org where they have screenshots. It's only on screen for a split second, but
Tritnity uses Nmap to find a vulnerable SSH server, and then exploits it using the SSH1 CRC32 exploit from 2001.
Private Network! (Score:4, Informative)
As you can see on the screenshot, the IP is 10.2.2.2, which is on the 10.0.0.0/255.0.0.0 network reserved for private usage.
It's impossible to reach such an IP directly (without hacking their server / router / firewall first) from an arbitrary point of the Internet.
Damn!
Before you say it... (Score:5, Informative)
Aside from the amusing idea of having someone hack a computer program using their avatar inside the computer-generated construct of the Matrix, this sameness of the Matrix over long time periods raises an unanswered question in my mind. Why don't the people notice the lack of advancement in the Matrix? Over a hundred years of 1999-ness... no stunning advances in CGI, or science, or anything!
Re:Uhm... (Score:5, Informative)
So it's accurate.
future? (Score:2, Informative)
Remember, folks, the hack wasn't taking place in the future - it was in the Matrix. They weren't hacking the machines, they were hacking the "fake" computers in the power plant.
Think of it like hacking into an ancient copy of usermode linux.
Well that's why she had to BREAK INTO the office! (Score:5, Informative)
Re:Uhm... (Score:1, Informative)
But it's just another Hollywood flick, of course.
Re:SSH: security through obscurity? (Score:3, Informative)
Re:My 2 cents... (Score:3, Informative)
1) You have not stopped telnet or other services run from inetd.
2) Killall only does what you think it does on Linux. On Solaris, for instance, it does something rather more destructive.
3) getty is started from init, killing it won't help.
4) killing login will only stop people in the middle of logging in.
Re:Uhm... (Score:1, Informative)
Re:Uhm... (Score:5, Informative)
She's IN the power plant.
She's running the attack on a PRIVATE IP address.
Personally, I think she wasn't on "teh Intarweb!!1"
Re:Uhm... (Score:2, Informative)
Come on, people (Score:2, Informative)
How can this guy get modded up for being insightful when he doesn't know the name of a major player in the film?
The Merovingian dynasty was the first kingdom of France to emerge from the ruins of the Roman empire, led by Clovis I. Unlike most ruling families in Europe, though, it's not named after it's founding member. Or I guess you could say it is, since "Merovec" is considered to be a half sea-monster. This gives the cruel character a little more depth
Re:Nice Password (Score:3, Informative)
It's the 5th incarnation of the city, with the 6th "One"
In the beginning, there wouldn't be a Zion, but there would be the first "One", who, through the whole process, would create the first Zion. He'd die of age, and this Zion would survive until the 2nd "One"... so on, so forth.
Neo is the 6th "One", coming from the 5th Zion -- if he were to go through the other door, he would create the 6th Zion.
Some here understand this progression. Some don't. Hope this helps
Re:Nice Password (Score:2, Informative)
Hence, the password puts the two together, Zion and 01.
Re:Nice Password (Score:4, Informative)
Wouldn't that mean the first "Neo" built the first Zion, second Neo built the second, etc and now it's the 5th Zion that about to get wasted? This Neo will / was supposed to build Zion 6?
I could be wrong, but I THOUGHT that's what I heard. The Architect also said the 5 before you, didn't he?
nmap source in Battle Royale (Score:1, Informative)
Unfortunately, the hacker never actually uses nmap. After it compiles, we see a standard unrealistic hacking scene (nice GUI, alarms sounding everywhere).
I don't have the movie anymore, so I can't get screenshots of it. Can someone else post them?
Re:A theory (Score:2, Informative)
if the brain accepts the Avatar program as being part of itself, then if the Avatar is altered, then the brain's "self" would be altered, right? A little weird, but it does allow for this to happen.