Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Nmap Featured in The Matrix Reloaded

CmdrTaco posted more than 11 years ago | from the ain't-that-special dept.

The Matrix 651

rajiv was among dozens to report that unlike most "Hacks" in film, The Matrix reloaded actually has an ounce of reality where other films would rely on fancy 3D graphics. You can see more at Insecure.org where they have screenshots. It's only on screen for a split second, but Tritnity uses Nmap to find a vulnerable SSH server, and then exploits it using the SSH1 CRC32 exploit from 2001.

cancel ×

651 comments

Sorry! There are no comments related to the filter you selected.

fp (-1, Troll)

Anonymous Coward | more than 11 years ago | (#5985308)

fuck you. michael sucks. editors are gay. moderators are faggots. plzdiekthx. www.gnomercy.net sucks

Nice Password (3)

krisp (59093) | more than 11 years ago | (#5985311)

I like her password: Zion1010

Re:Nice Password (2, Funny)

2MuchC0ffeeMan (201987) | more than 11 years ago | (#5985326)

no, she speaks l33t, so it's Z10N0101 ... :)

Re:Nice Password (3, Insightful)

cubedbee (629822) | more than 11 years ago | (#5985327)

That's Zion0101, i.e Zion5. This is the fifth incarnation of the city, after all. But nobody is supposed to know that...

Re:Nice Password (1)

debrain (29228) | more than 11 years ago | (#5985382)

I thought it was actually the 7th incarnation of the city -- 6 saviors came before, after all.

Re:Nice Password (3, Funny)

usr122122121 (563560) | more than 11 years ago | (#5985405)

I thought it was actually the 7th incarnation of the city -- 6 saviors came before, after all.
Well, if you take all the zeros and letters out of the password "Z10N0101", you're left with "111", which is 7 in binary.

Coincidence? PERHAPS NOT. :-p

Re:Nice Password (0)

Anonymous Coward | more than 11 years ago | (#5985448)

or,

Z10N0101
01000101

64 + 4 + 1 = 69 :)

Re:Nice Password (0)

Anonymous Coward | more than 11 years ago | (#5985472)

If you keep all digits in place, you get 37.
100101
This was a popular number in Clerks.

Re:Nice Password (1)

weave (48069) | more than 11 years ago | (#5985475)

101 is featured a lot in the film, like the mythical interstate 101 sign at the freeway entrance (although california does have a 101 freeway, it's US route 101, not Interstate 101).

There's a lot of talk about his on road geek newsgroups. See, it's not just computer geeks that lack a life! :)

Re:Nice Password (1)

cruppel (603595) | more than 11 years ago | (#5985459)

Neo is the sixth One

Re:Nice Password (0)

Anonymous Coward | more than 11 years ago | (#5985328)

It's Z1ON1010

What Can Illegal Hacking Do For MY Business? (0, Interesting)

Anonymous Coward | more than 11 years ago | (#5985317)

Slashdot has an interview [slashdot.org] with security legend Fyodor [kitetoa.com] , admin of the famed insecure.org [archive.org] and author of the world's cheapest port scanner, nmap [archive.org] .

The best part of this interview is that Slashdot does not often interview criminals. Many Slashdot readers know that Fyodor used his tool to illegally attack a college student in 2002, for his personal amusement but also to the benefit of Slashdot's admins. For those that don't know the story, I will present a brief summary.

*Those individuals interested in independently verifying the facts presented in this article should skip to the "Verification" section near the end.

Sdem [slashdot.org] had created a hoax account entitled electricmonk [slashdot.org] , and used it to post this comment [slashdot.org] pronouncing that we was actually a cute Linux booth babe. "electricmonk" left an email at Yahoo and encouraged Slashdot readers to get in touch.

Fyodor proceeded to do so, boasting of his previous exploits with women he'd met online. He was even helpful enough to attach a picture.

This is where the story turns ugly. Sdem responded with a truthful email, in which he advised Fyodor that the whole thing was a hoax. After that, sdem posted a log of his exploits to sid=20721 (trolltalk), mentioning that he had tricked Fyodor and referring to many of the biters as "wankers". This apparently really set Fyodor off, and he began to plot criminal revenge.

First, Fyodor dug through insecure.org's referrer logs to find what IP address had requested the picture of Fyodor & his paramour. Using this information (and the logged User-Agent), Fyodor knew from the get-go Sdem's IP address and O/S. From this point, he launched nmap against Sdem's box (he didn't have the money for a more effective port scanner) and was greeted with the holy grail of sorts for BlackHats: an open X windows server on port 6000.

Sdem had been running an X-windows server for Windows on his Win2k box. Fyodor was able to bypass the authentication on the X-windows server and used the X-windows server to take complete screen captures of Sdem's machine whilst sniffing and recording keystrokes.

Fyodor proceeded to take hours worth of screen captures, including information on a "secret troll irc server" that sdem was using. Fyodor wrote a detailed writeup of what he observed, including an irc robot used on the server to detect new Slashdot stories for the purpose of early posting. Fyodor also mined and posted as much information about Sdem as he could find, including his real name and contact information. Jamie McCarthy used this illegally obtained information shortly after it was posted to log on to the irc server, monitor the bot, and modify Slashdot in order to break the story monitor.

Fyodor even submitted his "troll hunting" story to Slashdot, though it was rejected.

After he was done hacking Sdem's computer, Fyodor posted his screen captures and a log of his breakin to www.insecure.org/tmp/trolls [insecure.org] . The content was removed 24 hours later. He went on to boast in sid=20721 about his "troll hunting finale". While sid 20721 is regularly cleaned, a cache of Fyodor's boasting about his illegal break-in is available here [trollaxor.com] . Very interesting reading.

So, while Fyodor's interview is no doubt very interesting, I think that, as an accomplished (and due to the lack of prosecution very successful) criminal, the nature of questions given to Fyodor in the interview don't do justice to the type of expertise this man has in illegally penetrating computers across state lines and getting away with it. I'm sure that many companies would like to have a man of this caliber at their disposal in order to infiltrate and destroy their competitor's IT infrastructure.

Of course, no sane person would use this man's software without compiling it from inspected source, given his history. Fortunately the folks at Redhat pore over his code with a fine toothed comb before including it in their distribution, so if you've ever wanted to peer into the mind of a madman, I encourage you to take a look at Redhat's copy of nmap.

Also if anyone has a cached copy of fyodor's insecure.org/tmp/trolls page, please let me know in the comments so we can get it hosted. This particular piece of sordid Slashdot history just became more relevant.

Additional reading:
Sdem's account of the incident [slashdot.org]
Trolltalk cache, circa break-in [trollaxor.com]

Verification:
We're still working on contacting someone who cached Fyodor's web boasting and screen captures. Sadly, even when we post this information, it will not provide definitive proof. Those interested in verifying this story do have an option though.
The Slashdot editorial staff was well aware of this story when it happened. Jamie McCarthy used Fyodor's information to penetrate the irc server Fyodor discovered and attack the irc bot he found there. Jamie McCarthy and Michael Sims are both aware of the details surrounding this incident and can confirm their recollection and involvement in the incident by email. Their email addresses are easily available to a curious researcher so I won't bother repeating them for spam robots, but suffice it to say that asking Jamie the question "did you see Fyodor's page on his web site in which he took screen captures from a hacked trolls computer" will probably yield you positive confirmation. There is the possibility that they won't want to involve themselves for legal reasons, but I doubt it. Jamie is historically honest to a fault and forthcoming when approached with a legitimate question.
So, if you're a doubter, email the Slashdot editorial staff. Fyodor is a Black Hat, and the eds know it.

Oh really? (0, Flamebait)

buddha42 (539539) | more than 11 years ago | (#5985321)

Cuz I didn't read about it on every other tech-news site four days ago. lets do the time warp again...

Re:Oh really? (0)

Anonymous Coward | more than 11 years ago | (#5985379)

Oh oh oh. I've got to see this: a Tim Curry movie with nmap :-) And take a hack to the left ...

Uhm... (5, Funny)

Anonymous Coward | more than 11 years ago | (#5985322)

In response to :-

> The Matrix reloaded actually has an ounce of
> reality where other films would rely on fancy
> 3D graphics.

So in several hundred years time people STILL won't have patched their bloody SSH holes?

Yah actually I guess that is reality ;o)

AL

Re:Uhm... (5, Informative)

marx (113442) | more than 11 years ago | (#5985372)

So in several hundred years time people STILL won't have patched their bloody SSH holes?
Inside the Matrix it's present time, and the exploit was launched against a standard power plant computer, not against a Matrix computer.

So it's accurate.

Re:Uhm... (3, Interesting)

Ann1ka (604222) | more than 11 years ago | (#5985378)

In the matrix they are only a few months or a year after the first movie, which took place in the year 1999. The date in the 'real' world is unknown, but believed to be 2199, which is totally irrelevant to this matter.
So if the exploit had already been possible in 1999/2000 it would have been correct. On the other hand, the matrix is fake, there is no reason to believe the machines based it on real facts from so many years back, from their perspectieve.

The first time they try to keep it correct and still people are complaining.

Re:Uhm... (1, Troll)

The Only Druid (587299) | more than 11 years ago | (#5985392)

The date in the real world, actually, is not 2199. Its closer to 2499. Morpheus mistakenly believed it to be closer to 2199 because he thought it was a century since the first One released people and started Zion. The Architect, however, has revealed that this is actually the 5th or 6th Zion.

Re:Uhm... (0, Troll)

Q2Serpent (216415) | more than 11 years ago | (#5985404)

Thanks for spoiling it!

SHITE!

No warning or nothing. You just came out and said it.

Re:Uhm... (1)

Anonymous Coward | more than 11 years ago | (#5985451)

Moron. Knew what you were getting yourself into when you started to read the comments in this article.

Re:Uhm... (1, Interesting)

13Echo (209846) | more than 11 years ago | (#5985491)

This post should be modded down as *spoiler*, if that was possible. These comments are part of a big plot twist in the movie.

Thanks for ruining it for people.

Re:Uhm... (4, Insightful)

mrpuffypants (444598) | more than 11 years ago | (#5985401)

Don't forget that the matrix was simply a projection of the world as it was circa 1999-2001

In that regard it would be rather accurate.

And there was much rejoicing.. (5, Interesting)

Trevalyx (627273) | more than 11 years ago | (#5985323)

When I went to the 1AM showing on release night, there were a lot of interesting people.. When it got to the hacking scene, only a few people cheered, however, they did it with enough vigor that everyone else was caught of guard.. And when I tried to explain to the guy nibbling his foot next to me, "Nmap," I just got a blank stare...

suck my dick, geekface (-1, Flamebait)

Anonymous Coward | more than 11 years ago | (#5985325)

the fighting scene with all the smith clones in that park after meeting with the whoracle has some OBVIOUS 3d created neo shots in it!

zero-day warez screenshots? (5, Interesting)

Speare (84249) | more than 11 years ago | (#5985329)

Where did the nmap folks get all these screenshots of a movie that's ostensibly fresh-in-theaters? And why oh why did they name their sources? I'm imagining Agent Smith from the MPAA will be giving out a few cease and desist visits soon.

Re:zero-day warez screenshots? (5, Interesting)

ThePatrioticFuck (640185) | more than 11 years ago | (#5985434)

If you read the article @ Insecure, the guy says when he heard it was in the movie, he asked if anybody could send him some screen captures and ended up being flooded with pics, video, etc. And mentions he found it strange that many of them showed Windows Media Player in the capture :) TPF

Re:zero-day warez screenshots? (1)

ankit (70020) | more than 11 years ago | (#5985450)

The movie has been available on kazaa/edonkey and the like for a while now!

realistic! (1)

swimfastom (216375) | more than 11 years ago | (#5985331)

It is great that movies have become so realistic that they actually portray an existing (at the time of creation) ssh exploit!

No IPv6 huh? (5, Funny)

hillct (230132) | more than 11 years ago | (#5985332)

Severla hundred years in the future and still, IPv6 hasn't been adopted. Personally, I'm not suprised. It'll take an act of god to get it deployed.

--CTH

Re:No IPv6 huh? (1)

10Ghz (453478) | more than 11 years ago | (#5985355)

Didn't the hacking take place in "today", not hundreds of years in to the future?

Re:No IPv6 huh? (0, Troll)

hillct (230132) | more than 11 years ago | (#5985411)

hmm. yah, now that you mention it, I believe the hacking did take place in the matrix, so would simulate the infastructure of the present day, but she was hacking into a 'core network' outside the matrix (controlling matrix-external security systems) wasn't she? I duno. I guess I'll have ot go see the movie again and re-confirm.

--CTH

Re:No IPv6 huh? (0, Troll)

cruppel (603595) | more than 11 years ago | (#5985489)

No she was hacking a power grid systrem to shut down power in the matrix time of 2000 or so

Re:No IPv6 huh? (1)

DaLiNKz (557579) | more than 11 years ago | (#5985364)

I notice this too.. Perhaps the movie creators are seeing into the future? :P

Re:No IPv6 huh? (5, Funny)

Waffle Iron (339739) | more than 11 years ago | (#5985425)

Even if everyone on Earth were ready to migrate to IPv6, it still wouldn't happen. As we found out in Independence Day, IPv4 is an entrenched *intergalactic* standard. There are just too many star systems involved to be able to roll out this upgrade in the forseeable future.

reported yesterday (1)

ramzak2k (596734) | more than 11 years ago | (#5985333)

reported yesterday by one of our slashdotters [slashdot.org] ;)

I still miss the swordfish like graphics though.
It was a lot more exciting - with Trovolta going yes! yes ! from the back.

Re:reported yesterday (0)

Anonymous Coward | more than 11 years ago | (#5985399)

It was much more exciting when Hali Berry was topless.

Sexy (3, Funny)

Anonymous Coward | more than 11 years ago | (#5985334)

"...Tritnity uses Nmap to find a vulnerable SSH server, and then exploits it using the SSH1 CRC32 exploit from 2001.."

Now THAT is sexy! :)

Private Network! (4, Informative)

Anonymous Coward | more than 11 years ago | (#5985338)

Now we know that we cannot hack into the Matrix from our Personal Computer:

As you can see on the screenshot, the IP is 10.2.2.2, which is on the 10.0.0.0/255.0.0.0 network reserved for private usage.

It's impossible to reach such an IP directly (without hacking their server / router / firewall first) from an arbitrary point of the Internet.

Damn!

Re:Private Network! (4, Funny)

mrpuffypants (444598) | more than 11 years ago | (#5985414)

After assing the movie I promptly went home and changed my entire home IP network to the 10.2.2.x subnet. The home FreeBSD server is now 10.2.2.2, so everytime I jump in to modify the firewall or whatever I can feel like I'm "hacking the matrix" ...my life is pathetic :(

Re:Private Network! (0)

Anonymous Coward | more than 11 years ago | (#5985420)

for the last time she wasn't hacking the Matrix, she was inside the POWER PLANT hacking the POWER PLANT


sigh

Re:Private Network! (1)

usr122122121 (563560) | more than 11 years ago | (#5985429)

As you can see on the screenshot, the IP is 10.2.2.2, which is on the 10.0.0.0/255.0.0.0 network reserved for private usage.
Well, wouldn't it make sense that if you were hacking the matrix from inside of it, that it would have an internal IP?

Hell, if I ran the matrix, I'd want to have it on a LAN protected by a firewall as well.

Re:Private Network! (1)

SCHecklerX (229973) | more than 11 years ago | (#5985437)

They were connecting to a power grid computer from the inside, not the 'Internet' I would certainly hope that power grid controlling computers are not on the public internet.

Well that's why she had to BREAK INTO the office! (5, Informative)

cculianu (183926) | more than 11 years ago | (#5985442)

If you will remember the movie, that computer _was_ on a private network. She had to break into this private secure office building before she even began hacking. So she was behind the firewall already because she was physically in the building.

Re:Well that's why she had to BREAK INTO the offic (0)

Anonymous Coward | more than 11 years ago | (#5985487)

Hopefully she took the time to NAT it so they wont have to break in to turn off the lights.

Before you say it... (5, Informative)

tbmaddux (145207) | more than 11 years ago | (#5985339)

...exploits it using the SSH1 CRC32 exploit from 2001.
I'm sure there will be lots of funny jokes posted about using a 2001 exploit far into the future, patching systems, etc. etc. However, while the Matrix films are set in the future, the Matrix is set in the present, at the "peak of your civilization" according to Agent Smith. So it is appropriate for Trinity to hack a present-day system using a present-day exploit. She could even be ahead of her time, if the first movie was set in 1999 and it's only 6 months later, then the Matrix might not even have gotten through Y2K yet (did I just spoil the third movie).

Aside from the amusing idea of having someone hack a computer program using their avatar inside the computer-generated construct of the Matrix, this sameness of the Matrix over long time periods raises an unanswered question in my mind. Why don't the people notice the lack of advancement in the Matrix? Over a hundred years of 1999-ness... no stunning advances in CGI, or science, or anything!

Re:Before you say it... (2, Insightful)

The Only Druid (587299) | more than 11 years ago | (#5985375)

Thats the point: the world has progressed most likely. The matrix has apparently been running between 500 and 600 years (since The One is a systemic anomoly, and Morpheus makes repeated note that this current Zion has been around for 100 years, its likely that each One takes 100 years). Most likely, after the first [Utopic] Matrix failed, they did one of the following:

1: To periodically reset the time in the matrix, by permitting all the adults to die while not maintaining crops of infants in suspended animation. Once the adults died, they would then revive the children, and have software "parents" raise them. I dont really like this option, it seems pretty unlikely.

2: The first matrix after the Utopic failure was set in the 14th century, i.e. the beginnings of the Renaissance. This would fit with Smith's description of "the peak of your civilization", depending on your perspective, since this was the period of scientific enlightment. This also sits well with the Oracle's statement that the myths of supernatural creatures all derive from bugs/rogue programs in the Matrix. This also sits well with the idea of the first One appearing, since this was a period wherein people were dramatically reforming their conception of the universe.

There are probably other solutions, but these are two I've thought of.

Re:Before you say it... (1)

the_2nd_coming (444906) | more than 11 years ago | (#5985503)

if that were true then the machines would have had a way for humans to hack into the matrix even in the renesonce.

I would love to agree with your second point but right now we do not have the entire story. I think we will have to wait to have neo rip out the information about the true history of the matrix from the architect before we truely understand it.

Re:Before you say it... (1)

weave (48069) | more than 11 years ago | (#5985396)

It's interesting the relationships of the "code" in the matrix, like eating a cake causes a routine to execute in the cake to achieve the desired effect.

So the human subjects in the matrix still are working their brains in their little tubs, so I imagine as they invent things, those things would be adapted, assimilated, and used by the machines running the matrix, especially if...

SPOILER

SPOILER

SPOILER

SPOILER

SPOILER

SPOILER

SPOILER

SPOILER

SPOILER

SPOILER

SPOILER

SPOILER

SPOILER

SPOILER

... if it was invented in a prior instance or nested concurent instance of the matrix...

Imagine the ability to hack the matrix by writing bad code on purpose. The ssh1 coder would then be a hero, by introducing indirectly a vulnerability into the machine's control system -- if there is one that is...

END SPOILER

END SPOILER

END SPOILER

Re:Before you say it... (1)

dokutake (587467) | more than 11 years ago | (#5985400)

Maybe they set it at 1999 because they were worried about the Y2K bug. I guess robots don't see the need for four digit dates.

Re:Before you say it... (0)

Anonymous Coward | more than 11 years ago | (#5985470)

Robots also prefer to keep their dates in ASCII instead of just binary. Duh.

Re:Before you say it... (1)

Sentry21 (8183) | more than 11 years ago | (#5985454)

Why don't the people notice the lack of advancement in the Matrix? Over a hundred years of 1999-ness... no stunning advances in CGI, or science, or anything!

Because the new tech is always hyped on Slashdot, then everyone forgets about it for years until an 'Ask Slashdot' is posted wondering where all this cool shit went.

Re:Before you say it... (1)

the_2nd_coming (444906) | more than 11 years ago | (#5985471)

becasue the machines have control over them so tehy can blank their memories. also it could be due to the fact that the matrix gets reset every time the one comes around.

though considering the probabilities of the one showing up the matrix could be as old as 7000 years old but if you take morpheus's statment about how they have been fighting the machiines for 100 years and there have been 6 ones before then it could only be 700 years old. (it is interesting though that the only reason the previouse one knew he would return some day was becasue he had talked to the Architect and been clued in :-) )

Re:Before you say it... (1)

CGP314 (672613) | more than 11 years ago | (#5985495)

Why don't the people notice the lack of advancement in the Matrix? Over a hundred years of 1999-ness... no stunning advances in CGI, or science, or anything!

I wondered the same thing myself.

My guess is that the simulated physics of the matrix is simplified so that 1999 level technology is as far as one can go. For example, its possible to get to the moon using only Newtonian physics. (We did it after all) But if your world is only Newtonian, there are somethings you will never do. (Modern Transistors and Nanotechnology) Perhaps the scientists of the Matrix think they have found the Theory of Everything, or are very close.

Re:Before you say it... (1)

sc00p18 (536811) | more than 11 years ago | (#5985501)

then the Matrix might not even have gotten through Y2K yet (did I just spoil the third movie).

Nope, not even close.

nmap is easily fooled (4, Funny)

Adam Rightmann (609216) | more than 11 years ago | (#5985343)

While namp is a neat hack, before any of you juvenile deliquents think of using it to commit computer hacking felonies, be aware that it is easily fooled.

If you look at the source code, you can see which ports it queries, and which responses it maps against. We used this for great affect at Adequacy, http://www.adequacy.org, editing the registry of our Win 2k box, and the configuration files of the various TCP/IP programs to make it appear as a simple FreeBSD to the casual hacker.

Oh, the laughs were on us when those script children proceeded to attempt to hack us with canned scripts for use against FreeBSD, only to fail. The looks on their pimply, greasy faces were probably priceless, only to be matched when the local law enforcement arrived at their parents house to confiscate their computers.

Re:nmap is easily fooled (1)

DaLiNKz (557579) | more than 11 years ago | (#5985367)

nice work of fiction, but after our IRCd servers were DoS'd attacked, hacked, and violated, not anyone, police or the FBI really cared. The firewall logs took 92MB. You smell of... bull.

Re:nmap is easily fooled (1)

Paleomacus (666999) | more than 11 years ago | (#5985371)

And when the cops arrived at these kiddies homes I'm sure kids claimed they didn't do anything. Then the police said, "Yeah right man" Your last name is awesome :P

OMG! (0)

Anonymous Coward | more than 11 years ago | (#5985391)

Your user ID is triple-6, triple-9. Yuo are the k3wl!

Script children? (0)

SumDeusExMachina (318037) | more than 11 years ago | (#5985398)

Are you sure that it wasn't Fyodor himself [slashdot.org] ?

Re:nmap is easily fooled (5, Funny)

antsquish (320643) | more than 11 years ago | (#5985436)

... and after all that work making it appear as a FreeBSD box, you go and confess to all of slashdot that it's really a Win2k box...... I guess that saves everyone a bit of work? :-)

screenshots? (1)

mnemon1c (51802) | more than 11 years ago | (#5985344)

so, exactly how did they acquire the movie screen shots (legally)?

Re:screenshots? (1)

danheskett (178529) | more than 11 years ago | (#5985387)

Farir use, friend.

Copyrighted works can be excerpted within the bounds of the principles of fair use. How you obtain the material is pretty much irrelevant - the end result is that it is legal to post them.

Screen Shots ?! (4, Funny)

gurnb (80987) | more than 11 years ago | (#5985346)

How do they have screen shots ?! Is it possible that this movie has been leaked out to the INTERNET?!

It's madness I tell you, madness!!!

Still waiting for disc 2 to d/l, so I can verify this for myself. Purely for educational reasons.

lol.. (3, Funny)

DaLiNKz (557579) | more than 11 years ago | (#5985350)

This was actually sorta cool when i read it in this story [slashdot.org] .. It was interesting to see her portscan then jump into the server.. The chick sittin next to me wasnt aware of anything about it because she doesnt use linux, but i was like "OI!!! Thats real! look look!!! SSH!!! LOOK!!" .. then a few people looked at me weird :s

Lies (0)

Anonymous Coward | more than 11 years ago | (#5985514)

I knew this story was a lie when you mentioned a chick sitting next to you.

Unless of course this chick was with another guy or of the feathered variety, I have no choice but to call bullshit.

Pix (4, Interesting)

spoonist (32012) | more than 11 years ago | (#5985351)

Pictures can be found on Fyodor's site [insecure.org] .

Oh, and I must say, that Trinity freakin' kicks ass. As you can see from the pictures [insecure.org] , nmap says "No exact OS matches for host". Trinity goes ahead and throws the sploit anyway without knowing the system's architecture AND IT WORKS!

That just kicks ass.

A big Eartha-Kitt-Cat-Woman growl for Trinity.

horse cock (-1, Offtopic)

Anonymous Coward | more than 11 years ago | (#5985354)

horse cock

Re:horse cock (-1, Offtopic)

Anonymous Coward | more than 11 years ago | (#5985419)

Sorry. We're out of horse cock today. You'll just have to continue ramming a fist up your ass like usual.

2001? (0)

kisrael (134664) | more than 11 years ago | (#5985356)

2001? Is that how HAL got so messed up?

Har har.

Seriously, yeah it was nice to see something like ssh -l root, though they couldn't resist throwing in little status popups rather than keeping it on the commandline...

Whoah (5, Funny)

parkanoid (573952) | more than 11 years ago | (#5985357)

Deja Vu! (read: dupe. Must be a glitch in the matrix).

Re:Whoah (1)

devilspgd (652955) | more than 11 years ago | (#5985427)

So basically what you're saying is that all the dupes on slashdot are just as a result of glitches? Hell, maybe we're slashdotting the Matrix itself?

Private Network! (0, Redundant)

uli9999 (186305) | more than 11 years ago | (#5985358)

Now we know that we cannot hack into the Matrix from our Personal Computer:

As you can see on the screenshot, the IP is 10.2.2.2, which is on the 10.0.0.0/255.0.0.0 network reserved for private usage.

It's impossible to reach such an IP directly (without hacking their server / router / firewall first) from an arbitrary point of the Internet.

Damn...

Re:Private Network! (0)

Anonymous Coward | more than 11 years ago | (#5985407)


As you can see on the screenshot, the IP is 10.2.2.2, which is on the 10.0.0.0/255.0.0.0 network reserved for private usage.


Which is no different from the classic 555-[0-9]* telephone numbers used in movies. I also seem to recall that the IP's used in Antitrust were in the 192.168.x.y reserved block.

Re:Private Network! (2, Insightful)

WWWWolf (2428) | more than 11 years ago | (#5985428)

Now we know that we cannot hack into the Matrix from our Personal Computer: As you can see on the screenshot, the IP is 10.2.2.2, ...

Well at least they bothered to use the RFC 1918 space in same vein as the 555-xxxx phone numbers. Same as in "AntiTrust". I guess Hollywood folks gringe every time someone mentions "Hackers" and the impossible IP addresses in it =)

Re:Private Network! (0)

Anonymous Coward | more than 11 years ago | (#5985443)

Yeah, dude, and all the phone numbers, like, begin with 555, so we can't like call them from arbitrary phones and stuff.

Damn...

Only fitting (-1, Troll)

SumDeusExMachina (318037) | more than 11 years ago | (#5985381)

That they would use tools written by a malicious hacker [slashdot.org] to get the job done. I wouldn't want it any other way.

Sequels detract from the original (1)

hillct (230132) | more than 11 years ago | (#5985395)

I saw the movie last night and was disappointed generally, in that it was not as good as the first movie, but sequels are produced with the recognition that each sequel will have 2/3 the audience of it's predecessor, so I guess it's proffitable, but at some point producing sequels will devalue the original to the point where it will affect the overall perception of the franchise.

My biggest objection is Trinity has lost her whole S&M mystique in favor of this nice cuddly feel. Seems a real shame. Oh Well.

--CTH

Re:Sequels detract from the original (0)

Anonymous Coward | more than 11 years ago | (#5985421)

My biggest objection is Trinity has lost her whole S&M mystique in favor of this nice cuddly feel. Seems a real shame. Oh Well.

You're the type of person that would fuck a man in the ass, and not even have the common courtesy to give him a reach-around.

Trilogy, not original vs. schmequel (2, Interesting)

TeknoHog (164938) | more than 11 years ago | (#5985465)

I wonder how many times this has to be stated until people learn... The Matrix is a trilogy (like Back to the Future and LOTR), a single story split into three volumes/movies for convenience (because it's so long) and perhaps profit.

The trilogy status hasn't been so obvious with The Matrix because, at the time of making the first part, the producers weren't sure if it would be worth it. As a side effect, the first part is a rather well contained story in itself, which is not a bad thing in a trilogy. Still, the first part left many important questions open, like the awakening of the rest of humanity, and any details on Zion.

Back to The Future? (1)

Chuck Chunder (21021) | more than 11 years ago | (#5985505)

Your argument was pretty good, apart from that!

Re:Trilogy, not original vs. schmequel (1)

Mossfoot (310128) | more than 11 years ago | (#5985507)

Which is the same strategy used by Back to the Future (as you mention) as well as the first Star Wars trilogy. Too much money at stake to invest in a whole Trilogy (except for LOTR, but then they planned it well), so it's safter to go this route.

SSH: security through obscurity? (1)

gpinzone (531794) | more than 11 years ago | (#5985408)

In this article, [securityfocus.com] I'm surprised by the following quote:

"I think there are at least two public exploits in circulation right now," said Zalewski, in a telephone interview. "They just got released about a month after the advisory. And I know there are some that are not public."

I though security through obscurity was something only Microsoft did? Why are there ssh exploits that we (the users) don't know about? Everyone has access to the code so where are these millions of eyeballs? It appears there's only a few who are able to really decipher the source code and understand it.

Re:SSH: security through obscurity? - NOPE (0)

Anonymous Coward | more than 11 years ago | (#5985479)

Why are there ssh exploits that we (the users) don't know about?

Are you trying to be funny, or did you not understand the statement you quoted?

This is completely normal, as they're usually kept out of the public's hands by the black hats that write them.

Sheesh, learn a little bit about security before you go trolling.

Wooh (1, Funny)

Anonymous Coward | more than 11 years ago | (#5985409)

You should never log in as root :x

My 2 cents... (1)

Dthoma (593797) | more than 11 years ago | (#5985446)

...I'm going to risk taking a karma hit for being Offtopic with a bit of speculation.

If cracking someone's system, then why shouldn't you login as root? You might get caught? You're probably going to get caught anyway, so it doesn't matter too much. There's not too much point trying to get into an ordinary user's account since there's no guarantee that a particular username exists. The only one you can be reasonably sure of is "root".

And once you have logged in as root, can't you just do:

$ touch /etc/nologin
$ /etc/init.d/sshd stop
$ killall -9 mingetty
$ killall -9 login

to stop someone else logging in and stopping you?

A touch of realism. (2, Insightful)

Gray (5042) | more than 11 years ago | (#5985416)

Now if only that human body as a power supply thing made a lick of sense.

I hope some Saberhagen Berserker's show up in the next movie and settle everybodies hash real good.

I KNEW it was too good to be true (0)

slainfu (528905) | more than 11 years ago | (#5985417)

My beautiful Trinity is nothing more than a lousy script-kiddie! :(

future? (2, Informative)

DreadSpoon (653424) | more than 11 years ago | (#5985418)

Keep seeing posts about "in the future they still have this hole" or similiar items.

Remember, folks, the hack wasn't taking place in the future - it was in the Matrix. They weren't hacking the machines, they were hacking the "fake" computers in the power plant.

Think of it like hacking into an ancient copy of usermode linux. ;-)

Best. Story. Evar. (0)

Anonymous Coward | more than 11 years ago | (#5985423)

Trinity is a supar 1337 h4x0r!!! SSH rules! Nmap rulez! I love you all! Mod everyone up! Almost all of these comments are insightful!

I can see it now... (3, Funny)

iceT (68610) | more than 11 years ago | (#5985439)

"The envelope, please."

"And the award for the best open-source hacking tool used in a motion picture goes to nmap, for it's cameo-appearence in Matrix: Reloaded"

"Camera scans the audience where we see tripwire, sitting with his girlfriend ethereal... cuts to ndiff, who is just beaming w/ pride..."

Bay Area (3, Interesting)

tedrlord (95173) | more than 11 years ago | (#5985440)

The great thing about watching the Matrix in a theater in Mountain View, CA, is that when that hacking scene came up, half the theater laughed or cheered. We're all geeks here.

Re:Bay Area (0)

Anonymous Coward | more than 11 years ago | (#5985498)

I was surprised when I saw this scene. It was one of the more realistic hacks that I've ever seen in a movie. Very well done.

1337! (-1)

j0nkatz (315168) | more than 11 years ago | (#5985460)

Th15 iz s0 phunny!
Sh3 h4X0r3d j00 4g3n7 5m17h!!!
LOLz!

j00 guy5 r gr347!!!

Retards (1)

Jerk City Troll (661616) | more than 11 years ago | (#5985461)

This has been mentioned on /. more times than any human can count since the movie was released. This story is -1, Redundant.

hax0r the c0w (-1)

Anonymous Coward | more than 11 years ago | (#5985463)

____________________
< mykey = 0xDEADBEEF >
--------------------
\ ^__^
\ (oo)\_______
(__)\ )\/\
||----w |
|| ||

MooKore, at the herd of the game!

Respect (0)

Anonymous Coward | more than 11 years ago | (#5985473)

I must admit that I'm surprised (yes I haven't seen it yet), but positively so, that a filmmaker has finally moved beyond the flashy 3d crap, most prominently featured in Jurassic Park .. "It's a Unix system!" ... *barf*

Argh! (1)

eonblueye (627191) | more than 11 years ago | (#5985478)

Its been posted on The Regsiter since May 16 (16 May 2003 3:12pm) http://www.theregister.co.uk/content/55/30747.html (link) [theregister.co.uk] and today May 18 and Slashdot is just now posting the story about it? ~Sigh.

There's some other strange things too. (1)

Dthoma (593797) | more than 11 years ago | (#5985485)

One of the other available screenshots actually shows a command prompt, which appears to be just "RF-CONTROL>", which is rather odd. (No bash in the Matrix?) And there's a command in $PATH called "disable", which is executed as "disable grid nodes 21 - 40". Hmmm. I don't recall any tool written with getopt which would handle that sort of thing by default. And best of all, it actually gives a confirmation message. Huh? That can't be right. No UNIX tool gives a confirmation message without your prompting it to. It even has "ARE YOU SURE (y/n)" plastered across the centre of the screen!

Yep it is amazing (1)

ThunderRiver (634589) | more than 11 years ago | (#5985494)

I know I know..they often use ip that's local, but still it is the first major step for Hollywood movie. I mean, it is just a movie, why would they even bother to make such technical step forward into hacking scene? Well, since they have done that, it shows that they have true profession in film industry ;)
Load More Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>