One thing we've learned from The Matrix Reloaded is that power plant control systems use SSH version 1, and that the software that controls the power grid is apparently some variant of Cisco IOS.
Ironically, 10.2.2.2 was the IP of a development penetration test machine in our east coast datacenter until about 2 months ago. No, I didn't pick the IP cause it looked cool or anything. First 2 == east coast (3 == west coast, there was no 1 for reasons I cannot remember), second 2 == second internal network segment, third 2 == first machine set up after the router.
I should probably add this new text to xmatrix. If anyone has (or has the ability to make) better/more complete screen grabs of this scene, so I can get all the text, let me know...
i want someone to write terminal / xterm / console software that makes my computer text look all green and old, either like The Matrix, or like the computers from War Games.I'm surprised it hasn't happened already.
Did you take a look at the exploit? They used the SSH v1 CRC32 Exploit. Someone's done their homework.
She nmap'ed the machine, then ran something called sshnuke against it.
Interestingly enough, this is a reasonable and accurate attack on a machine!
The SSHv1 CRC32 exploit is widely known and remote root exploits have been around for awhile. If you had this exploit compiled as ssh nuke, you could run the remote root exploit to change root's password, and then log in as she did in the scenario.
hahah yeah- i saw that and thought "oh shit- nmap!"- i missed the crc32 stuff cause my eyes then went down to the prompt- then the scene was over hahah this was in the mercado 20 in santa clara- so lotsa people laughed at the ssh prompt :p
yeah- finally an accurate representation of a system being exploited, and even a real command line interface- hahaha none of that jurassic-park 3d BS :)
The folks at insecure.org (run by the author of nmap) have a bunch of screen captures from this scene. Some of them are at least as readable as the ones you link to, possibly a little better, and may help in figuring out the details.
Interestingly no one seems to have bothered with the following few seconds where it verbosely runs the disable command, which you'd presumably want to include.
Ewen
Comments are closed because this post is 20 years old.
Ironically, 10.2.2.2 was the IP of a development penetration test machine in our east coast datacenter until about 2 months ago. No, I didn't pick the IP cause it looked cool or anything. First 2 == east coast (3 == west coast, there was no 1 for reasons I cannot remember), second 2 == second internal network segment, third 2 == first machine set up after the router.
I like how it echoes the new root password to the terminal after it's been changed.
I should probably add this new text to xmatrix. If anyone has (or has the ability to make) better/more complete screen grabs of this scene, so I can get all the text, let me know...
here's another grab.
makes perfect sense!
excellent movie btw. I don't think anyone else giggled when she ssh'd in though.
Our premiere audience was geek-saturated. They were squealing with delight at that scene.
i want someone to write terminal / xterm / console software that makes my computer text look all green and old, either like The Matrix, or like the computers from War Games.
I'm surprised it hasn't happened already.
Dude! "phosphor". Written by jwz. In xscreensaver.
Non-interactive, though. Bummer.
Did you take a look at the exploit? They used the SSH v1 CRC32 Exploit. Someone's done their homework.
She nmap'ed the machine, then ran something called sshnuke against it.
Interestingly enough, this is a reasonable and accurate attack on a machine!
The SSHv1 CRC32 exploit is widely known and remote root exploits have been around for awhile. If you had this exploit compiled as ssh nuke, you could run the remote root exploit to change root's password, and then log in as she did in the scenario.
I give it an A for accuracy.
hahah yeah- i saw that and thought "oh shit- nmap!"-
i missed the crc32 stuff cause my eyes then went down to the prompt- then the scene was over
hahah
this was in the mercado 20 in santa clara- so lotsa people laughed at the ssh prompt :p
yeah- finally an accurate representation of a system being exploited, and even a real command line interface- hahaha
none of that jurassic-park 3d BS :)
Was anyone able to read that post without saying "Greetings, Professor Falken" aloud in their dorkiest voice?
http://www.securityfocus.com/news/4831
Damnit... that's the root password I use on my machine.
I should change it to the access code on my luggage. "123456"
unrelated:
Robot rat masters
http://www.nytimes.com/2003/05/15/technology/circuits/15next.html
they shoulda just used a lightbulb
http://news.com.com/2100-1009_3-1001406.html?tag=fd_top
Screw all that, is she using Gnome or KDE?
Either GNOME 1.x or AfterStep with a Mac-like theme, unless my eyes deceive me ;)
Of course, this all depends on when tthe Matrix began ... and how much old technology was still in use. Posit the thing being based pre-2K :)
The folks at insecure.org (run by the author of nmap) have a bunch of screen captures from this scene. Some of them are at least as readable as the ones you link to, possibly a little better, and may help in figuring out the details.
Interestingly no one seems to have bothered with the following few seconds where it verbosely runs the disable command, which you'd presumably want to include.
Ewen