Hacker Breaks Down 26 Hacking Scenes From Movies & TV | WIRED

Spread The Viralist



Hacker and security researcher Samy Kamkar takes a look at a variety of hacking scenes from popular media and examines their authenticity.

Still haven’t subscribed to WIRED on YouTube? ►► http://wrd.cm/15fP7B7

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV. Here you can find your favorite WIRED shows and new episodes of our latest hit series Masterminds.

ABOUT WIRED
WIRED is where tomorrow is realized. Through thought-provoking stories and videos, WIRED explores the future of business, innovation, and culture.

Hacker Breaks Down 26 Hacking Scenes From Movies & TV | WIRED

source

Recommended For You

About the Author: WIRED

40 Comments

  1. PDF readers have been infamous in the past for containing security vulnerabilities allowing stuff like remote execution. There's nothing particularly unrealistic about a PDF file embedding a keylogger — picture, for example, a scenario where a mail is sent to you about you needing to change the password, with a PDF attachment containing instructions on how to do this — except that embedded within it is also a keylogger that will inevitably log your password change.

  2. Hollywood has challenge of making something entertaining, yet accurate to people who can do it really, yet not so accurate that normal people can actually duplicate the crimes, yet logical all at the same time.

  3. Matrix as a sci fi could be more accurate than it's given credit for. Since matrix is a computer simulation somehow every powergrid is in fact "connected to internet". Also sshnuke could be just a piece of software built with algorithms to take down a server, think of it as a piece of executable code that has "prewritten" command line codes.

  4. The scene in Blackhat was accurate as well. PDF files sometimes do contain security exploits which can install software on a machine or create other forms of access to a malicious actor. PDF exploits are fixed all the time and it's advisable to keep your PDF reader up to date.

  5. The matrix hacking scene was realistic. It's possible that sshnuke is just a custom shell script designed to run other commands to try and break into a potentially vulnerable server. You might want to put it into a shell script if you planned to re-use the attacks later on.

  6. He's way too nice to Hackers and Swordfish, the most embarrassing depictions of computer usage and hacking ever filmed, made by and for people who know less about computers than my 82 year-old mother.

  7. I do Cybersecurity for a living and have done plenty of red team exercises,, etc..
    Hacking In movies is wayyyyyyyyyy more exciting than real life. Defense/Blue team is wayyyyy more exciting ?

  8. For the traffic lights, it's enough to change only the time variable value. To ad longer wait or more time of the light turned on. Source: I made a miniature traffic light with Atiny and BASCOM (ofc irl it's more complicated, but I think I could do it).

Comments are closed.