These screen grabs snarfed from titney:
<LJ-CUT " ...not really a spoiler... ">
Ironically, 10.2.2.2 was the IP of a development penetration test machine in our east coast datacenter until about 2 months ago. No, I didn't pick the IP cause it looked cool or anything. First 2 == east coast (3 == west coast, there was no 1 for reasons I cannot remember), second 2 == second internal network segment, third 2 == first machine set up after the router.
I like how it echoes the new root password to the terminal after it's been changed.
I should probably add this new text to xmatrix. If anyone has (or has the ability to make) better/more complete screen grabs of this scene, so I can get all the text, let me know...
here's another grab.
makes perfect sense!
excellent movie btw. I don't think anyone else giggled when she ssh'd in though.
Our premiere audience was geek-saturated. They were squealing with delight at that scene.
i want someone to write terminal / xterm / console software that makes my computer text look all green and old, either like The Matrix, or like the computers from War Games.I'm surprised it hasn't happened already.
Dude! "phosphor". Written by jwz. In xscreensaver.
Non-interactive, though. Bummer.
Did you take a look at the exploit? They used the SSH v1 CRC32 Exploit. Someone's done their homework.
She nmap'ed the machine, then ran something called sshnuke against it.
Interestingly enough, this is a reasonable and accurate attack on a machine!
The SSHv1 CRC32 exploit is widely known and remote root exploits have been around for awhile. If you had this exploit compiled as ssh nuke, you could run the remote root exploit to change root's password, and then log in as she did in the scenario.
I give it an A for accuracy.
hahah yeah- i saw that and thought "oh shit- nmap!"-i missed the crc32 stuff cause my eyes then went down to the prompt- then the scene was overhahahthis was in the mercado 20 in santa clara- so lotsa people laughed at the ssh prompt :p
yeah- finally an accurate representation of a system being exploited, and even a real command line interface- hahahanone of that jurassic-park 3d BS :)
Was anyone able to read that post without saying "Greetings, Professor Falken" aloud in their dorkiest voice?
Damnit... that's the root password I use on my machine.
I should change it to the access code on my luggage. "123456"
Robot rat mastershttp://www.nytimes.com/2003/05/15/technology/circuits/15next.html
they shoulda just used a lightbulbhttp://news.com.com/2100-1009_3-1001406.html?tag=fd_top
Screw all that, is she using Gnome or KDE?
Either GNOME 1.x or AfterStep with a Mac-like theme, unless my eyes deceive me ;)
Of course, this all depends on when tthe Matrix began ... and how much old technology was still in use. Posit the thing being based pre-2K :)
The folks at insecure.org (run by the author of nmap) have a bunch of screen captures from this scene. Some of them are at least as readable as the ones you link to, possibly a little better, and may help in figuring out the details.
Interestingly no one seems to have bothered with the following few seconds where it verbosely runs the disable command, which you'd presumably want to include.