New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 22)
· Marcia's (CO8)
· Bill G's (CO10)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 853
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image General: Matrix Hacking – A Slice of Reality in a World of Make Believe image
General News
Anonymous writes "It might be all make believe, but the film - The Matrix: Reloaded – has opted for reality in one of its most important scenes, the hacking of the computer that creates the fantasy world in which the film has been set.



“Not since “Wargames” in the early 1980’s has hacking been portrayed in such a realistic fashion,” claims James McGregor, a consultant with the specialist IT security consultancy, DNS.

Trinity, the leather-clad butt-kicking female superhero, who initially gained Neo’s respect in the original film by apparently hacking the IRS database, is the hacker in question.

“Usually, cinema audiences are treated to some ridiculously gratuitous animated multicoloured blobs from a computer monitor while the protagonist gets busy, hacking away with some feverish keyboard tapping that bears little or no relation to what’s actually going on with either the hacking process or, for that matter, the blobs,” explains McGregor. “Occasionally viewers get the odd muttered technical term like ‘128-bit encryption’ or ‘DoD level security, but after a short time the hero will sit back and we are to assume that the process is complete, total access has been gained and the plot can move on.

“However, in The Matrix: Reloaded, Trinity gets busy with a command-line interface and kicks off NMAP, a port-scanning piece of freeware. She then correctly identifies an open port and the SSH version 1 service running on it, and runs a further command called “sshnuke”, the output from which is “attempting to exploit SSHv1 CRC32”, a genuine SSH bug discovered in 2001 (the Compensation Attack Detector Vulnerability, no less).

“The exploit works and Trinity gets a root shell, from which she changes the password to Z1ON0101, a choice that mixes numbers and letters in true hax0r tradition.

“The whole process only takes a few seconds, but crucially the bits of software that Trinity uses are real, the methodology she used would work in the real world, and there are no multicoloured blobs in sight,” said McGregor.

Not only can viewers be sure that the method used by Trinity is realistic, but it also conveys a serious message, underlining the need for adequate patching of systems.

“Although it is perhaps unlikely that the SSHv1 CRC32 software vulnerability would not have been patched during the course of around 200 years, it is far more likely that unpatched servers running SSH version 1 are still vulnerable today, just two years after details about the exposure and a released patch have been made available,” comments McGregor.

“So, unless the “machines” get round to patching their server, we will see Trinity logging back in during the final episode of the trilogy, no doubt using the back door she left last time. After uploading some suitably dubious warez and then changing the system’s message of the day to “0wn3d by Tr1n1ty”, she will log off with a final, resolute thud of the “Return” key.”

And all without any multicoloured blobs in sight.

Ends

For further information please contact Grant White, Acumen, tel: 0131 624 1155 or [email protected]

DNS
dns is a security-focused professional services organisation, delivering network security and secure infrastructure through consultancy, systems integration and software development.

Headquartered in Scotland, and operating across the UK and Europe, it provides end-to-end delivery of security and secure infrastructure to a wide range of blue-chip organisations. This ranges from setting strategy and policy, audit and security testing, through design and delivery, to support and management.

dns is a Government CESG CLAS trained, accredited and approved security consultancy. It performs security testing and review assignments for government classified networks, financial houses, banks, telecommunications companies and large corporates across the United Kingdom.

Beyond this, dns has particular technical skills and capability in the construction of highly secure Extranet and hosting environments, from network and host through directory, identity management and secure code development techniques.

dns is a Microsoft Gold Certified Partner for security solutions. Its clients include The Royal Bank of Scotland, Wood MacKenzie, Thus, ScottishPower, Baillie Gifford, the Scottish Parliament, Scottish Enterprise, Deutsche Bank, NatWest, Clifford Chance and BP.

dns also has a managed security service providing e-mail and URL content security management; enterprise vulnerability assessments and continuous reporting; and managed intrusion monitoring and response.



THIS RELEASE HAS BEEN DISTRIBUTED BY WEBITPR (www.webitpr.com)

Disclaimer:

Whilst WebitPR.com Limited endeavor to ensure the accuracy of the information contained in this Release, WebitPR.com Limited cannot accept any liability for:-

• the inaccuracy or otherwise of any information contained in this Release; or
• any loss liability or expense which may be suffered by any party in consequence of acting or omitting to act as a result of any information contained in or omitted from this Release.; or
• any loss or suffering which may be caused by or to any party either as a result of the information contained in this Release or such information contained in this Release being inaccurate or otherwise misleading.

In the event that any information contained in this Release is inaccurate or misleading then please contact WebitPR.com at the above e-mail address.
"
Posted on Wednesday, 21 May 2003 @ 09:17:10 EDT by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Linux Games
· Microsoft
· PHP-Nuke
· HotScripts
· W3 Consortium
· More about General News
· News by phoenix22


Most read story about General News:
Weekly Spyware Alert: CoolWebSearch

image
Article Rating
Average Score: 3.33
Votes: 6


Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 2 comments | _SEARCHDIS
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register

Re: Matrix Hacking – A Slice of Reality in a World of Make Believe (Score: 0)
by Anonymous  on Wednesday, 04 June 2003 @ 08:52:55 EDT
You should buy more than 2 videos mate, ever heard of anti-trust ?

hacker.. linux.. root.. even got /dev/null in there

pleanty of other ones but obviusly this dude has only watched them 2...