WebApp Sec mailing list archives
RE: Hacking/security in main-stream media
From: "Levenglick, Jeff" <JLevenglick () fhlbatl com>
Date: Thu, 7 Oct 2004 09:02:05 -0400
"fictional attack tool to bust open ssh using a buffer overflow or similar." nmap is a real program and so is/was the exploit. She did not bust ssh. She used the exploit in ssh to change the root password and gain access to the host. A real hack that can be used today if someone did not patch ssh. -----Original Message----- From: Andrew van der Stock [mailto:vanderaj () greebo net] Sent: Tuesday, October 05, 2004 11:56 PM To: stijn () securityworld be Cc: Mike Andrews; webappsec () securityfocus com Subject: Re: Hacking/security in main-stream media
Mike Andrews wrote:Jurassic Park - insider threat (the programmer gets the system to bypass security while he steals the DNA/embryos) Any other suggestions? I'm only wanting short (5min) sections, but I'm willing to edit bit's out if needed.
The Matrix 2 has a reasonably accurate if short section on using a fictional attack tool to bust open ssh using a buffer overflow or similar. Unlike "The Net", they actually use reasonable IP addresses in the screen shots and real program names and Unix is Unix. Then there's always Swordfish. It's a comedy. My favorite bit is when Hugh Jackman is required to crack 128 bit encryption in 30 seconds and he's typing furiously on two screens, with a gun held to his head and something else is occuring as well. I also get a nice warm feeling watching the scene in Charlies Angel's where they put a bug in the mainframe, which itself is a variation on a theme from Mission Impossible. I particularly like the bit where they get around the biometrics. In fact, that bit is roughly accurate. Lastly, Three Colors Red goes into social and privacy issues. It's also in French, sad yet joyful, and one of the best films ever made. Absolutely beautiful and haunting to watch. thanks, Andrew ----------------------------------------- This e-mail message is private and may contain confidential or privileged information.
Current thread:
- RE: Hacking/security in main-stream media, (continued)
- RE: Hacking/security in main-stream media David Munge (Oct 04)
- RE: Hacking/security in main-stream media Jeffrey Gorton (Oct 05)
- FW: Hacking/security in main-stream media Jason Gregson (Oct 04)
- RE: Hacking/security in main-stream media WebAppSecurity [Technicalinfo.net] (Oct 05)
- RE: Hacking/security in main-stream media Bob Davies (Oct 04)
- RE: Hacking/security in main-stream media Levenglick, Jeff (Oct 04)
- RE: Hacking/security in main-stream media Bob Davies (Oct 04)
- Re: Hacking/security in main-stream media Stijn Vande Casteele (Oct 05)
- Re: Hacking/security in main-stream media Andrew van der Stock (Oct 06)
- Re: Hacking/security in main-stream media adeel hussain (Oct 05)
- RE: Hacking/security in main-stream media Levenglick, Jeff (Oct 07)
- RE: Hacking/security in main-stream media Chacon, Oscar (Oct 19)
- RE: Hacking/security in main-stream media Kevin Poulsen (Oct 21)
- Re: Hacking/security in main-stream media q q (Oct 21)
- Re: Hacking/security in main-stream media Matt Joyce (Oct 21)
- RE: Hacking/security in main-stream media Craig Skelton (Oct 21)
- RE: Hacking/security in main-stream media Kevin Poulsen (Oct 21)
- RE: Hacking/security in main-stream media Frank Draeger (Oct 21)
- RE: Hacking/security in main-stream media Arun Vishwanathan (Oct 21)
- Re: Hacking/security in main-stream media XinuniX SuriviruS (Oct 22)
- Re: Hacking/security in main-stream media Mariano Cunietti (Oct 22)
- Re: Hacking/security in main-stream media Serg Belokamen (Oct 22)
(Thread continues...)