• rtxn@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      10 months ago

      No, no, first you need to reroute, to be able to patch it through, and THEN you can override the command sequence in order to exploit parallelisms at the core root interface.

  • snrkl@lemmy.sdf.org
    link
    fedilink
    arrow-up
    1
    ·
    10 months ago

    FWIW, Little known fact: Matrix 2 used real vuln (SSH CRC32) for trinity power grid hacking scene.

    Even better to know: the scene was completed before the CRC32 vuln was public. So the scene used real 0day vuln…

    • onlinepersona@programming.dev
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 months ago

      I’ve love to watch a realistic hacker movie, because the shit that hackers get into is genuinely bonkers. For example, some white hats got all the way into Apple’s inventory system and IIRC they could’ve disrupted all of Apple’s logistics. Imagine if a black hat got into that. Or the Ukrainian hackers that got into the taxation system of the Russians and were there for a few months. Or the USAians who got into the biggest Belgian telecom and were kicked out years later by a Dutch security company.

      Movies or even better TV series showing the time it takes to get into such systems would be amazing. Day 1 phishing, day 40 established beachhead, day 120 gained access to internal system X, day 121 triggered internal alarm and was nearly discovered but was able to cover up traces, etc.

      Nobody watches 90 minutes of football matches. Everyone watches the highlights and that’s what movies could be too.

      CC BY-NC-SA 4.0