THIS ACTION IS NOT ALLOWED
> OVERRIDE
ACCESS GRANTED
deleted by creator
No, no, first you need to reroute, to be able to patch it through, and THEN you can override the command sequence in order to exploit parallelisms at the core root interface.
FWIW, Little known fact: Matrix 2 used real vuln (SSH CRC32) for trinity power grid hacking scene.
Even better to know: the scene was completed before the CRC32 vuln was public. So the scene used real 0day vuln…
At least in Mr Robot they talk about real stuff
Needs more hoodie and random text and numbers being projected onto his face.
movie about hackers comes out and is extremely realistic
It’s 16 hours long and mostly just of a dude sitting at a computer typing code
It bombs at the box office.
I’ve love to watch a realistic hacker movie, because the shit that hackers get into is genuinely bonkers. For example, some white hats got all the way into Apple’s inventory system and IIRC they could’ve disrupted all of Apple’s logistics. Imagine if a black hat got into that. Or the Ukrainian hackers that got into the taxation system of the Russians and were there for a few months. Or the USAians who got into the biggest Belgian telecom and were kicked out years later by a Dutch security company.
Movies or even better TV series showing the time it takes to get into such systems would be amazing. Day 1 phishing, day 40 established beachhead, day 120 gained access to internal system X, day 121 triggered internal alarm and was nearly discovered but was able to cover up traces, etc.
Nobody watches 90 minutes of football matches. Everyone watches the highlights and that’s what movies could be too.
There’s a podcast called Darknet Diaries you might like. Skip the first year or so and start after that.
Yes! I’ve listened to those. Having some of those episodes in an anthology TV series could be wonderful. Some even deserve a series of their own.