As someone who worked in Big Corporate for years, it is pretty spot-on if you dial back the nonsense a couple notches. There is always drama and stupid corporate crap going on. There is a Dwight in every office. There is always a short-timer around that won't do anything.
@@chuckhoyle1211 Depending on the place, you even have those oddball bosses that don't seem to do anything worthwhile but still get all the promotions and rewards too.
I like that she has actually seen all shows the scenes are from and she knows the context. Many other experts criticize the scene without knowing that the context explains away some of their critique.
Yeah, quite refreshing! I also found her ratings pretty good, like she gave good points for the stuff that was done well, and properly rated the bad ones low. Though her criticism of the time is a hard one, most movies have time compressions because they can't sit there and show you a real hack in real time or that would be the whole movie's runtime. Even for "based on a true story" scenarios, thye often have a lot of time compression for events that happened over a longer space of time. If it's comically short, then yeah, it should be low rated. But for a real life hack that is show to take a few hours as opposed to a few more hours, I think we can cut them some slack.
Also she's glossing over the fancy 3d fly-by math formula, greek character screen-saver effect in Hackers because it's clear that this is just a mental image for the audience and should explain the thought process in his brain which of course you can't really visualize. Many often claim that Hackers was soo unrealistic, but some parts were just a bit exaggerated. I started programming 30 years ago and I have to confess that I actually did write some fancy visual tools back then, just for fun. I dived deep into OpenGL around 2000. I always was and still am a sucker for technology. About a year ago I wrote my own DNS server in C# just for fun. I do actually run it with mono on my raspberry pi to this day. So it is in use, but not really for important stuff. I'm more interested in how things work. I read so many specifications. One of my favourite ones was the GIF specification. I wrote a gif loader and I was impressed by the format design. Especially that it was actually really extensible. PNG kinda followed the footsteps and is also "chunking" the file so a parser could simply ignore chunks it does not understand. It's kinda sad that animated gif support was better back then. Nowadays the Graphic Control Extension is always interpreted as a sequance of frames to conduct an animation. However back then it was actually possible to create gif files with images with more than 256 colors by splitting the colors up into several frames which were painted on top of each other. Gif actually uses a virtual canvas and contains write instructions for pixel image data but also could render text.
@@MrWarrenRB I'd expect someone agreeing to do a piece like this to have context and background of what they are about to comment on as an "expert", yes. It's obviously not live, so there isn't any excuse for on the spot reactions without context
@@cooperthegrandkid5639 what do you read header files for fun lmao? Usually all preprocessor variables are all caps... it's not just in your favorite header file
she gave the movie hackers a 8 out of 10 lol those gibbons and gifs in the malware the sprinkler system is connect to the internet the lights in the building just so much in that movie lol
Yeah, but it should've been 10/10. The "should take longer" is so obvious, I don't think you should know about programming and hacking to figure that out. 9.5 at least, and even 9... The whole show is that well curated when it comes to programming details
@@disco.lemonade Mostly agree. The same is kinda true of the whole show, it's pretty much all possible but probably wouldn't be done by such a small group and/or in such a short amount of time. Points to consider though, firstly that nation-state threat actors were involved and there was a lot going on the background, and we don't exactly get every piece of the story. Second, as far as getting rid of the backdoor, wasn't the Mr. Robot alter already aware of this information? That was probably more a hole in the plot than in the technicals, though that also is not necessarily a hole...the show was riddled with bizarre internal conflicts between the alters(Tyrell: "You, as a person, make no sense"). Ultimately if the show was any more realistic, it'd be a documentary. Aside from the hacking portions, I'd also like to see different aspects of this show rated by intelligence officials, law enforcement officials, and psychologists. Like the creepy personnel tactics of the Dark Army("Have you ever cried during sex?" "Have you ever cheated on your wife?"), law enforcement procedures("Green! FBI! Don't shoot!" "We call it the python approach."), and the nature of dissociative identity disorder. Seems like one of these Hollywood realism clips mentioned Dom keeping her gun and badge in a locked safe at her house but I can't remember.
@@disco.lemonade I have the tendency to put pause watching intense shows (I think the issue is that I binged, so getting burnt out is quicker). I enjoy the S1 and half of S2, but there are certain subplots that I just roll my eyes on.
There's actually a very good reason why they'd use "impossible" IP addresses in movies, and that's to simply avoid accidentally posting someone's actual IP address and setting them up for potential cyber-harassment. It's the same reason they used to use "555" for everyone's phone number, because people were actually attempting to call those numbers. Nowadays it's easy to buy a phone number used in a movie, the studio will use it as a marketing tool or simply not activate it, and for URLs mentioned in movies they'll do the same, register it and then use it as a marketing site or simple redirect to their studio website. Can't really do that with IP addresses.
Was wondering if there would be this comment about the IP addresses already and wasn't dissapointed. Honestly that's one of the mistakes I think actually shows that they know what they're doing (or don't and got lucky :-D )
@@_Tomon I know for sure, bigger productions do a thorough search on anything that can be mistaken or misused. They even check character names, they don't want to risk getting sued because anyone of note with the same name as someone in the movie might be defamed. So I'm sure they also check things like IPs and phone numbers (remember until recently, all movie phone numbers started with 555. Now, studios buy the phone numbers mentioned in the movie and use them as marketing).
@@crazyg666 Depending on the ISP, this may or may not work. On most ISPs, you'd have to turn the router off for like a full day or more to have the IP recycled, and even then the ISP might choose specifically not to do so, whether or not your IP is dynamic.
@@arturszatkowski8062 I worked for one of those companies at the time. This was not published but something I saw myself. I should probably add that we concluded the hardware systems in place would have prevented it. Their commitment for accuracy was stunning though.
Hahaha. I'm guilty of trying to kid my own self that "I am understanding everything she is staying" Even though my mind, attention was completely in kuku land and would refocus on the video which lasted a few seconds, to then only go back to kuku land for the next couple of minutes, after a few seconds of coming back to reality! Hahaha
Which parts did you find confusing? I may be able to explain some areas better. She never went too deep into the topics due to time and the audience this video is for, but I think if you give some specific aspect I can write a more in-depth explanation that may help.
I'm not even a self-proclaimed hacker even though I've hacked things before, but I do understand most of what she's talking about and I can say that she is indeed a "legit" hacker.
@@savsaga4991 Dude don't be silly. She's well known and her resume is easy to verify. Also, she's 41 years old (dob: 1980). Good genetics & self care. "Hackers" movie came out in '95 and targeted teenagers.
I love that her only complaint about Hackers was the lack of seeing the code. Thank you, people rip on it all the time for being inaccurate - but we're never actually shown enough code to know if its accurate: instead we experience what it Feels Like for the hackers, not specifically the steps they go through. Also, because we don't see them taking specific actions, the movie is timeless - it doesn't date itself to the early 90's. Hackers is arguably the best hacker movie ever made, it doesn't teach you anything about How To hack, but it explores why and why not.
It is one of my all time favorite movies with one of the greatest soundtracks (why I still listen to The Prodigy and Orbital to this day.) My gripe though was always the silly scenes where they are flying through this computer landscape representing the company's network and stuff. I know, it's Hollywood Hacking but they could have at least off set that with some actual code.
Hackers was a silly joke that only little kids that never seen a hacker movie before thought was 133t when it came out. It was embarrassing in every way possible. Literally nothing accurate at all. WarGames was the only movie that was any good.
People rip on it because it *isn't* accurate. But it's not supposed to be. It's entertainment, not educate or documentary. And yes, it very much dates itself to the 90's... payphones, "686", "RISC", BBS's, hacking the cable company's _VCR!_ ... And the f'ing "gibson". No computer has EVER looked like that. Computer operation rooms are not black f'ing pits. (until midnight when we took over the NOC to watch movies / TV on the wall-o-monitors - rear projection monitors.)
She also makes this a fun experience and doesn't take the clips too serious. She respects that Hackers or Matrix for example are movies with a lot of goofy stuff happening that are nowhere near realistic - but she's focussing on the things that might or might not be accurate, which is very nice. If you've seen certain expert reacts episodes on gameology you know what I'm talking about.
Oh my. I have a story of programing courses, IT degree, and have a lot of notes for writing that makes me loot like a psychic. Now my fingerless gloves are totally make me look suspicious!
This was great. I love that Hackers actually influenced her to become a Hacker. Please bring her back for more. I would have loved to see Die Hard 4...wanna know how much of the Fire Sale is real. Also Leverage and some of Hardison's hacks, like the car theft hack or against the Sterenko.
I'm a software engineer and my laptop is actually covered in stickers 😂 It's a pretty common practice, and some companies even give employees stickers to put on their laptops. Granted, my hacking skills are somewhat lacking.
@@johntucker3695 Cold environments too, maybe? I used to have my comp sci class as the first class of the day in high school and on cold days I could barely type for a good portion at the beginning of class.
Mr. Robot is the best IT/Hacking show or movie that's been made. It's combination of the technical elements and the psychological complexity of the characters with Elliot being one of the best written characters I've ever seen. A brilliant show and if your a tech nerd you need to watch this.
True,only because creators of Mr.Robots are smart people who want to create realistic hacker show. They are backed with elite hacking team of top security engineers and IT specialist that perform all Mr Robots hacks for them in real life,everything that team was doing was build in a flash animations that are later played on the show so it seems that eliot or other characters performed them.
Sure, for people who don't know any better, it's very entertaining. But for me and my "tech nerd" friends, it's infuriating how things are trivialized, and the otherwise hatchet job done in the name of hollywood. (sure thing Deviant... many doors can be slipped, and once inside the water treatment plant f'ing nothing has a password; no one is watching the cameras, and the drive in the NVR has been full or broken for years.)
@@jfbeam Hey, it beats NCIS two people typing on the same keyboard hacking, looking like they just downloaded something dodgy from early 2000's Limewire and getting flooded with popups. It's progress!
In some ways, the errors in the terminal session graphics in Mr. Robot (season 1) bothered me more (or in different ways) than shows which don't even try to be realistic. Like, if you're seriously trying to be realistic, actually get the fine details right. Stuff I remember included having the command prompt printed at the left of the output of the command, so you know they didn't actually set up a test network that would let them just run `nmap` or whichever command it was. Like, you were so close, but clearly just made this image in an image editor, not on a real terminal session. Or another scene had the arguments backwards to ln for making a symlink. It's ln -s target_name link_name_to_create not the other way around. I've used GNU/Linux as my desktop OS for about 25 years, mostly with the command line other than a web browser. Plot-wise I appreciated the accuracy of what hacks can/can't do, but the expectation of accuracy made things like that break suspension of disbelief for me for a few minutes each time, and made me want to double-check every other screen image.
@@Peter_Cordes Even if the hacking isn’t completely accurate, you can see the effort that was put into those sequences. This is also entertainment, so some creative liberties must be taken. It’s a bit like _Breaking Bad_ . The show looks like it’s teaching you how to perform these cool illegal things, but if they showed you how to do it verbatim, it could potentially be very problematic.
@@justincruz5720 - My issue wasn't with any "hacking commands" or techniques, instead with the basic appearance of the UI sometimes, or with a basic command like `ln` (similar to file-copy, a bit like DOS `copy`). As an analogy, imagine if Top Gun had had incredibly realistic dogfighting techniques, but occasionally they left the landing gear down while doing so. (More people know about planes than about Unix/Linux, and it's not a perfect analogy.) Or maybe a Windows analogy: if somebody ran a program, and its window appeared behind the desktop icons instead of on top. People who use Windows regularly would be saying "WTF" the one time that happened; people who don't might not notice. If the things that bothered me don't bother other people, that's great. It wasn't a showstopper for my enjoyment of the show, but it did bug me and stick in my memory. The realism of the actual hacking was great, just an occasional error in the super basics, like having the command prompt appear at the left of output lines of a command. So if they had a Unix/Linux user reviewing the screen images, that one slipped through the cracks. As for getting `ln` args backwards, that's more understandable; I sometimes have to think about it when I use it, and from some perspectives it seems backwards. So that's just an amusing reminder that they mock this stuff up in an image editor instead of actually running it. Easy to imagine someone getting that backwards even if they do know Unix/Linux command line tools. But still, if you notice it, it's a clear reminder this isn't real. :/
For a layman, one of the most fun educating, eye opening things about hacking in 25 minutes. Would love to have more of her with such equally good movies.
I really enjoyed this, nice to see at least a chunk of them are making efforts to get it marginally correct. But, I got a 2-ad-break after every single scene she analyzed. Skippable ads, but dear God it's annoying to see a cluster of ads every 3 minutes.
I had zero surprise when she said that Hackers (1995) movie was her absolute love... c'mon, it's every hackers holy grail and in most cases inspiration to become one.
Even when it came out everybody I knew that knew anything about computers loved that movie, but as an ironic comedy rather than a thriller. The music was spot on and clearly somebody did research lots of real stuff involving hackers. But then hollywood got ahold of that info and just threw it around all slapdash and made a complete mess of it. The scene where they are using acoustic couplers in phone booths for VR rigs is just peak absurdity. For reference, assuming you have the world cleanest connection you might maintain a connection of a few hundred bits per second. A decent typist can type faster than you can transmit on a connection like that and the machine will start beeping at you because the keyboard buffer is full.
My brother works in IT, more on the hardware side. He was tasked once with helping do a security audit. He was basically given a hi-vis vest, a hard hat, clipboard, and fake ID, and told to see what he could access without question. He said it was amazing how many places he could get without even showing an ID...and how many more he could get just flashing a badge. People will always be the weakest link. Edit: SQL for the foreseeable future. I work at a corporation running emulations of 60 year old hardware for chunks of their operations because they've never decided to update. We call it going greenscreen, because the software emulates the old green CRT terminal monitors. Everything we do is command line based. We basically have an emulation of the whole network (server and terminals) on each device, and they all regularly sync to make sure everyone is on the same page.
Okay, but Star Trek doesn't take place in the foreseeable future. Also, SQL injection barely works today. Basically you need VERY sloppy developers to have a site or service that is vulnerable to SQL injection. Discovery is set 230 years from now. Even if SQL will be used then, it's highly unlikely SQL injection could work.
@@sgtGiggsy practices turn to nouns all the time. maybe SQL injection is a type of hack in the future? tho imo they should have used better terms, there are systems, languages etc. which have survived since a long time in tech. some of the basic code and the things that make tech work are still used today as OP posted (I've seen it myself after working in tech for 7 years).
Being an ex white hat hacker myself I understood everything she said as I get frustrated sometimes with hackers in movies but you must understand it is done for entertainment. Real hacking is boring and tedious, well until you hack something then it gets exciting.
😂 id love to see a movie where the hacker says i need a month, start researching for 2 weeks, build some hard and software for another 2 weeks and than just simply fries the target because he accidently made a ground loop xD
@@TigerGreene Personally, I don't put most of the blame on the two actors, I also blame the writers, directors, editors, etc. Someone should've pointed out that it was dumb and nobody did! It's crazy to me that so many people had to be involved, like with any scene, and that made it on the show. Also, I doubt anybody gives her too much grief, cuz Abbie was everybody's goth tech bae fantasy, that some didn't even know they had. It's universal, even people who aren't into goth love Abbie! 😍😆
When she said you can do beautiful things with code, she didn't mean graphics, she meant elegant code that a master of the art looks upon with tears of joy.
yes but , if I wrote a beautiful program whose aim is to produce spaghetti code , would it still be beautiful ? would that program be spaghetti complete ? what if I wrote a spaghetti meta code , to produce spaghetti code , would that be considered a spaghetti machine ? would goldon ramsay's brain halt ?
One of the things that I'm disappointed that she didn't mention is social engineering, which is also used in Hackers where he takes over the TV station by calling up the guard to get the number to the modem. It is a real thing that was also used to gain access to different places by pretending to belong there and someone willingly gives you the access you want.
I was at one of those demo where they did it (with a bunch of other tech me). At first everyone was searching for a cheat thinking it was a trick then everyone started hacking and doing it themselves. Ended up being the show stopper event of that conference. Haha
its pretty real, maybe not in the exact points but CAN exploitation or Controller Area Network exploitation is very very real, CAN is the interface often used in cars, all it is is finding the CAN address and Network, Sniffing the data off of that interface, making a bluetooth logger hang onto the card ( Most CAN interfaces have bluetooth ), dumping the information and exploiting the device if there is a working or current vulnerability that has not been patched yet or has been abandoned by the developers
Bogus IP addresses might be a movie thing like putting "555" in a phone number. An actual IP address probably belongs to a computer and will undoubtedly get unwanted attention from real hackers and unnecessary litigation for filmmakers. So, I wouldn't take points away because of the fake IP as it's an entertainment-inspired legal deal, possibly.
@@androgynousmaggot9389 If they showed a real IP address in a scene and then that IP address got DDOSsed afterwards the owner of the IP would sue for sure.
@@nonyabidness6492 They used the number 256 in an ip address in the picture, which is exactly 1 higher than allowed. So it seems pretty deliberate, hard to imagine that they would have picked that number randomly.
considering you need zero computer science classes to be a hacker, that is ok. You mostly need an interest in understanding how things work and a will to look up it up until you do. Hackers are creative tinkerers. A computer science education does help in getting a broad set of basics and get them right. Some things you might otherwise not even know you would want to look up.
@@lePoMo it's gonna take you a lot if you didn't finish some kind of computer science degree. There's just so much to learn. It takes a lot of work in college with mentors that can teach you. Think about what would it take if you were to learn it alone...
In Trinity's full-finger glove defense, she's inside the Matrix, she doesn't actually need to touch the keys to type, it's her mind injecting commands into the simulated machine: she may not even be touching the keys, she's just making the gesture of typing to signal that she's doing it.
It’s no surprise that David Fincher’s movies are some of the highest rated. His attention to detail translates to showing off real world hacking techniques
Alex North That's why it's being called unrealistic. It's simply not possible for any human to do what he did in basically 2 mins. That was a poor execution by the show's writer and directors, kind of ruined the hard work that the security consultant put in.
@@randomuser5237 Well he could have done a preview of the CTF. Or maybe just lucky on solving things out, considering his proven skills since he was a kid. But I do agree if you are pointing ot other scenes on the series where they are extremly lucky or you just notice a plot-tool, by the percentage not likely but technically yes the exploits and ways on Mr.Robot is great.
In Mr. Robot he could have noticed some easy to spot defect like SQL injection, saw an input argument to a function which just got invoked as a DB statement as is. That kind of a defect can be spotted quickly an no need to dig into the code. Enjoyed the video, thank you!
Five seconds in I knew this would be a great episode when Keren shouted "This is terrible!" and "YIKES" at those scenes. We need a part 2, and she needs to be in it!
The IP address with 256 in it, is probably similar to them using 555 as the city code for telephone numbers in TV and movies, to keep people from trying those numbers and successfully reaching some random person. Don't want them trying to reach Jenny's laptop, only to accidentally to to connect to something like a server at the NSA, which gets your own IP logged for potential cyber crimes, when you are just a kid playing around with something they saw in a movie.
@@derleonator2232 They also show at least one real valid IP owned by Level3, the way they use leading zeros so inconsistently shows that whoever designed that scene has heard about IPv4, over the phone. Definitely not done on purpose to prevent DDoS/spamming against real IPs. If that were the concern (which it should be), they would use local IP addresses (RFC1918) or APIPA addresses which would guarantee nobody would ever be affected by it.
@@someguy4915 It's done for legal liabilities, as every legal IP is borrowed by a company, and they could be liable to the owner, even if there was no attacks against it. The most appropriate IPs to use are probably those reserved for documentation besides private and zeroconf addresses. I'm guessing they like to use big and random numbers instead because they look "cooler", and because they don't have to think too much about it.
I am a automobile security researcher. Everything she depicts is accurate. Even with driverless vehicles, I would be hard pressed to make the vehicle perform the maneuvers depicted in the movie. Just FYI, your vehicle’s computer systems are incredibly insecure. It is frightening just how insecure they are.
It's only certain models that can do the remote thing. The factory has to install the 'On Star' feature. It usually comes with a price tag to the end user who purchases the vehicle. But what she stated in the scene about computing power; that's real. You maybe able to hack in to the system. But that's really as far as your able to go. You would need some top of the line servers to make that all happen that quick.
I don't own a car, but I do not like that all appliances and even cars are becoming smart. Give me my stupid fridge and a car that just needs a key to open it. It only creates weak spots where things can break (or be broken into).
@@snazzypazzy The fact is, things much more vital than your car or fridge are already potentially vulnerable to hacking. Interconnectivity goes hand in hand with globalization. Cyber security is, and always has been, an arms race and will continue to be for the foreseeable future.
@@anthonymonge7815 You would need processing power. I'm not sure how similar it would be to running a brute force attack. I've seen computers with 4,6, even 8 PCIe slots that house as many GPU's to utilize their processing power for password cracking. I would have to assume you would need something similar but on steroids to manage that type of attack. Even so, I doubt the NICs in self-driving cars are broadcasting their network traffic in plain text. Thats just something you dont see anymore with AES. I think self-driving cars use GPS and proximity sensors to navigate and I'm sure theres some kind of AI that processes the information in real time. Im sure we will see self-driving car hacks happen with greater frequency in the coming years.
On the topic of Elliot, I assume anytime we see something happen too fast, it's because we're seeing it from his perspective. We already know he doesn't process things well and hyperfocus is a pretty common trait that causes people to "lose time". He might be spending an hour on a task, but only really processing it as a few minutes. Since we follow his perspective we process time the way he does. This probably isn't right, but I like it as a head canon.
There used to be a big problem with people just picking up any random USB stick and plugging it in. Hackers would leave malicious USB sticks lying around at banks, offices, etc, and a surprising amount would get plugged in. Policies on USB sticks have changed, especially at banks, this is a huge no no.
Regarding the last one: My guess is that they deliberately used an invalid IP address, just like all phone numbers in US-movies that start with 555. Being off by a single digit indicates to me that they knew exactly what they were doing there.
@@MrSparda1989 I have a lot of co-workers and friends with laptop cameras covered but you're the first person I hear to have your phone camera covered as well. Kudos to you! Too bad you can't 'cover' your microphone if you want to actually use your phone for talking with people.
The most informative video I have seen on this channel! Never knew what the backdoor operation meant, even after research. She explained it so well with the "secret handshake" analogy. On point 👌
In all fairness, Trinity is in the Matrix when she's hacking. Given the powers she has about bending the rules of the simulation, including jumping across streets from building to building and kinda flying thru tiny windows w/o a scratch, outrunning Agents, typing correctly with leather gloves doesn't strike as unbelievable... I think we can grant her the 0.5 back :)
I'm shocked they didn't review the most powerful hacker of all time: Hackerman from Kung Fury. You won't ever catch him on rookie mistakes like wearing fingered gloves. I learnt everything I know from that guy.
They were generous in picking the scenes to analyze, simply because there are many more examples to bury under a 1/10 than there are worthy of a 5+/10 🤭
she gave the movie hackers a 8 out of 10 lol those gibbons and gifs in the malware the sprinkler system is connect to the internet the lights in the building just so much in that movie lol
As a software developer, I hate how movies make coding out to be this thing that can be done in a breeze with no time needed at all. Idiots try to contract me to build super complex software and say "this should be easy if you know what you're doing" ... Hollywood and the American education system are to blame.
Technically the Matrix Reloaded would be a 10 since when Trinity is doing the hack with the gloves, she is within the matrix, where she has learned to go beyond certain limits that would otherwise impede her performance, for example, doing those really high jumps. Had she done this outside of the Matrix then yes, there we could have judged her in comparison to "reality".
@@LinkinVerbz44 Yes, hence why I said, technically, since in all the Matrix movies we can see and tell the difference between the digital and the real realms. Neo for example can fly within the Matrix, but not outside of it. Trinity can hack with gloves flawlessly within the Matrix, not outside of it. So for that scene, as she is within the Matrix, techinically should be a 10.
Plot twist: You didn't watch a RUclips video of a white hat hacker reviewing a Matrix scene. You are not even reading this comment of your own free will. You are in the Matrix. 😅
I'd say you're biased as we all are. Also,math and computer science despite being interdependent don't necessarily equate in knowledge of one amounting to knowledge of another.
I saw this just as I was about to give up studying Cybersecurity. I guess the universe doesn't want me to stop, maybe its my calling. This video just gave me the push to study hard and be as cool as her knowing all these stuff.
This was fun to watch, I disagree with her critique of Trinity from Matrix resetting the root password after gaining root access being unnecessary. It’s very smart to reset the password when you gain access to keep the actual root out while you’re working 😎
if you want to be inconspicuous, you don't touch the pw. If you need to be fast, there ain't no time for that. If the girl just wanna hv fun... oh yeah 🥳
What's funny is she said it was based on an actual program and vulnerability found in it yet a hacker in another wired video said this scene's program was fake lmao
@@YungFrenchToasty He is wrong - that vulnerability was quite real. I remember patching my systems, and looking through logs, when this came out. Got quite impressed that the movie used it too.
@@mizar_copernicus138 Because hacking is boring, if it was so entertaining everyone would be a hacker. Moreover, hacking requires social ingenieering capacities that most geeks don't have.
I am SOOO glad that most of my IT work was done before ransomware. In all honesty that is the main reason I stopped. It was fun keeping things running, but it is not fun having to play defense 24/7. May the gods bless all you brave souls that picked up the torch.
@@digitalcyclone7218 In the old days I had one of my users request a new 3.5-inch boot disk every day. One day I followed her and noticed that after she used it she secured it by using a magnet to hold it to her desk drawer. After that I put NOTHING past the masses. Also, the number of times I came into a new client only to find that there backups were not working properly for years is only surpassed by the stars in the sky. Hopefully these newer generations of techno-savvy users will mitigate some of these issues, but I spent decades teaching Luddites not to click on spam links.
Evolution of RUclips Ads. 2010: No ads. 2015: Skip ads. 2018: Skip ads after 5 seconds. 2020: Video will play after ads. 2030: Video may play 2040: Video unavailable, watch ads. 2050: RUclips renames AdTube".
A lot of the points deducted were for things happening faster than they would in real life. I'm willing to be a bit more forgiving about those because screenwriting is all about hitting your story beats as quickly as possible. Nobody wants to watch a hacker stare at a monitor for hours on end. You can do it with a montage like Hackers did, but even montages get tedious if you use too many.
To be fair a way I would get around that is show something else that is simultaneously going on. And if not that, a quick cut to an outside shot showing light being at a deeper angle also helps. It will be subtle, but people watching Mr Robot would probably notice
For anyone who loves real life hacking stories, "The Cuckoo's Egg" was a great read, a true account in the very early days of the internet about an astronomy grad student who got roped into chasing a hacker around through various school and military networks.
That book was amazing and the author Clifford Stoll is on RUclips but he usually talks about his other pursuits like his klein bottles. Not only is the book good but it might be the first time someone laid the groundwork on how to deal with a digital intruder instead of just kicking them off the network.
@@AramatiPaz I wish I had known (or thought) about them two years ago. My old office had an hvac system that dumped cold air down my back every day. My hands were always cold and stiff. In some especially cold server rooms I do jumping jacks, wall push ups, and squats to stay warm.
@@Wynner3 i Actually bought two mini heaters that i placed on both sides behind the keyboard! I switched to fingerless gloves but these look more appropriate. Going to try to find some i can buy.
might be a way to keep the relay on over buffering but it wouldn't work on all modems i doubt it would really work on any modem tracert is a thing but yea there is so much wrong there
I absolutely love season 1 of Mr. Robot. There has never been a mind ducking of that level for me. I was so looking forward to new episodes with extreme excitement and enjoyment. No other show has done that for me. I miss the characters.
I’m a digital forensics and network security tech and she is so right on a lot of these points. When I did a security training for a bank I handed out password generators just so people did reuse passwords. I have done several CTFs and got to do Def Con once. So much fun. I’m terrible at them I score around the low 1000s, best I got was mid 500s (complete luck and a leap of faith). The team ones are so much more fun then the solo ones (at least for me). Was team leader twice and we had a monitor where I watched what everyone else was doing, again only scored low 1000s. I’m just not a great hacker, haha. As for PIN number sounds, there was a book that told you what numbers to hit to play songs.
The tones are know as DTMF tones 🤦🏻♂️ should know that being a security boffin, it's part most compliance audits for phone system these days As for physical password generators 😵 hopefully none have been flashed with dodgy firmware with set passwords preloaded so hackers know what password will bs issued by the generator for any given month 🤦🏻♂️
I feel like shes wrong about the password cracking box tool. I feel this very much is likely a real thing that could easily go through 1000's of pws. Im not sure why she is claiming it couldnt exist.
@@lastninjaitachi she's referencing that the computing power required to brute-force hack or even using rainbow tables far exceeds not just the best supercomputers around rn, but around in the foreseeable next 50 years. It's a mathematical/physics issue and not a clever engineering one.
Remember when the FBI played the game with Apple by "asking them" for some access to a device as if it wasn't very easy. As a Network administrator i was surprised at how many people thought and still think Apple has some sort of super security and android doesn't when they are both Linux.
I have years of practical experience with corporate IT infrastructure. When I started out on mine hacking journey, I felt very discouraged and down because I would take days or even weeks to figure out how to crack a box. After awhile, I realized its because I've been watching too much Hollywood hacker movies where hackers could crack boxes in seconds and I had been benchmarking myself too much to these illusions. It does take alot of effort, time and incredible depth of technical knowledge to pull off stuff like that. Keep studying guys! 😀
I've actually seen 2 popups for Express VPN that show my IP address and location as a way of showing how "insecure" my information is. They told me I was in New Jersey, but I think I should be pretty safe. I'm in Canada, already using Express VPN :/
I could listen to her talk shop all day. She could teach me so much and I really understand what she's talking about now that I have my Cybersecurity degree. Would love to meet her at Def Con and work for her. Awesome stuff.
Mind if I join in? Digital forensics degree and work in cyber security; I just want to be a fly on the wall and take notes. I’ve done so much but still feel like there is so much more to know, haha.
Lots of people liked it. In fact it is liked enough to have had multiple seasons and a decent critical reception. Picard is good also. Not suitable for the alt-right or the crazy anti-sjw brigade though as it causes them panic.
Not panic...just general disgust at the amount of force-fed SJW nonsense. Star Trek was about the story and exploration, now it’s just how many woke characters and topics can we squeeze in an episode w/ Star Trek uniforms.
@@BigBear-- Star Trek was always kind of woke though? The Federation was implied to be a post-scarcity socialist society. The original series had a diverse cast for the time, and it even depicted the first interracial kiss on American TV. Like, are you even a Star Trek fan?
To hide their palm prints. Duh. After burning off finger prints,they realized itt hurt way more than they thought it would and they give up before destroying palm prints. Hey, it sounds good anyways. Besides, she is super hot and has a super sexy accent. I'll forgive the nerd gloves. LOL
Not sure if this was rhetorical, but it is harder to type with cold hands. Your fingers becomes stiffer, and slower. Gloves that also cover your finger tips are (as mentioned in the video) generally terrible to type in; as you lose dexterity and feeling. Of course some people wear them just for the style points...
*Mr. Robot* shows the most realistic, accurate and the best hacking ever shown in all of movies, series or whatever. On the basis of the reason she told for giving Mr. Robot hacking scene the 9/10, I think it should have been 9.5 instead of 9 as it's almost equally big mistake as in The Matrix Reloaded.
I took cyber security in college for my master's degree. I had so much fun doing the lab assignments but the amount of forms we had to sign really sucked. Oddly enough, I do development now and not so much security.
Huh. They didn't make us sign any forms in my cyber security class, they just told us never to do anything we learned without permission from the owner.
"I do development now and not so much security" In theory you should be utilizing some of those skills in your development. Defenses to vulnerabilities start with knowing what classes of attack vectors exist and developing software to (ideally) not have them.
@@JimBob1937 I use more of the concepts when I do designing and testing. In Salesforce development, we often to do code reviews and validations to find vulnerabilities that would be rejected when going through federal guidelines. Some people tend to be very lax when coding and as a release management I've dinged them for it.
@@kparsa1 , yep, that sounds like a good process. Have knowledge of vulnerabilities, code defensively with those vulnerabilities in mind, then a code review and validation of known vulnerabilities. In general we're seeing a tighter integration and cross-disciplinary approach to security these days towards security for hardware and software developers and engineers. Tacked on security is most usually weaker than a proper implementation from the start.
The Wachowskis are no slouches when it comes to computer knowledge. They had to rewrite the original script in order to make it more accessible to laypeople. Humans weren't supposed to be batteries, but sub-processors that gave the machines more power.
@@joelcastro-reyes1667 I'm actually still salty about that because it wasn't even their choice. they only did it because the higher-ups wanted it to be more "easier to grasp". now because of that, the matrix has one gigantic logical flaw poked into it.
Great job from the Insider on selecting meaty examples, and great job from the expert on having seen the movies and coming prepared with props and information about comparable hacks that really happened.
Eh, setting up firewalls and authentication is easy enough. The hard part isn't the software. The hard part is keeping the human factors in check. Most hacks are done by exploiting the users. You can have the most secure system in the world but a dumbass employee can bring it all down by accidentally leaking his login info.
Great video and nice to see so many high ratings. I'm glad movies have moved toward more realistic hacking scenes. Only thing I'm surprised is at 10:25. Is there really access-giving keypads that makes different sounds on different digits? In phones that happens because historical reasons, but other than phones?
she's got fingerless gloves, I'll believe everything she says about hacking
Probably carpal tunnel syndrome and not a fashion statement...LuLz
@@kemolowlow you're probably right buuut I stand by my joke tho
@@BMoore556 Do hackers really wear gloves? Just wondering.
@@IGamingStation nah, pretty sure it's a movie/TV trope you see a lot
LMFAO you made my day with this comment
I think the most realistic hacking scene ever is in Archer, where he correctly guesses the password is "guest"
Admin
password123
There certainly was a time
Security1
Phone lock: [date of birth]
You should bring a regular guy review The Office
More like Office worker rate Office scene in movies and tv shows.
I'd watch that
As someone who worked in Big Corporate for years, it is pretty spot-on if you dial back the nonsense a couple notches. There is always drama and stupid corporate crap going on. There is a Dwight in every office. There is always a short-timer around that won't do anything.
@@chuckhoyle1211
Depending on the place, you even have those oddball bosses that don't seem to do anything worthwhile but still get all the promotions and rewards too.
That real funny
I like that she has actually seen all shows the scenes are from and she knows the context. Many other experts criticize the scene without knowing that the context explains away some of their critique.
You can’t expect every expert to watch every movie and tv show of their own job.
@@MrWarrenRB Yea but it's nicer like this anyway.
Yeah, quite refreshing! I also found her ratings pretty good, like she gave good points for the stuff that was done well, and properly rated the bad ones low. Though her criticism of the time is a hard one, most movies have time compressions because they can't sit there and show you a real hack in real time or that would be the whole movie's runtime. Even for "based on a true story" scenarios, thye often have a lot of time compression for events that happened over a longer space of time. If it's comically short, then yeah, it should be low rated. But for a real life hack that is show to take a few hours as opposed to a few more hours, I think we can cut them some slack.
Also she's glossing over the fancy 3d fly-by math formula, greek character screen-saver effect in Hackers because it's clear that this is just a mental image for the audience and should explain the thought process in his brain which of course you can't really visualize.
Many often claim that Hackers was soo unrealistic, but some parts were just a bit exaggerated. I started programming 30 years ago and I have to confess that I actually did write some fancy visual tools back then, just for fun. I dived deep into OpenGL around 2000. I always was and still am a sucker for technology. About a year ago I wrote my own DNS server in C# just for fun. I do actually run it with mono on my raspberry pi to this day. So it is in use, but not really for important stuff. I'm more interested in how things work. I read so many specifications. One of my favourite ones was the GIF specification. I wrote a gif loader and I was impressed by the format design. Especially that it was actually really extensible. PNG kinda followed the footsteps and is also "chunking" the file so a parser could simply ignore chunks it does not understand. It's kinda sad that animated gif support was better back then. Nowadays the Graphic Control Extension is always interpreted as a sequance of frames to conduct an animation. However back then it was actually possible to create gif files with images with more than 256 colors by splitting the colors up into several frames which were painted on top of each other. Gif actually uses a virtual canvas and contains write instructions for pixel image data but also could render text.
@@MrWarrenRB I'd expect someone agreeing to do a piece like this to have context and background of what they are about to comment on as an "expert", yes. It's obviously not live, so there isn't any excuse for on the spot reactions without context
"Hackers dont break in we login" - TRUE.
Yeah buddy
@@cooperthegrandkid5639 what do you read header files for fun lmao? Usually all preprocessor variables are all caps... it's not just in your favorite header file
@@BacklTrack That's what Eliot does to wind down.
600 likes. Congo 🎊 🤣 🤣
Script kiddie
Nothing like listening to a really enthusiastic hacker that knows what they’re doing to really make you want to change your passwords
she gave the movie hackers a 8 out of 10 lol those gibbons and gifs in the malware the sprinkler system is connect to the internet the lights in the building just so much in that movie lol
Doesn't have to hack me, I'll just give her my password
@@joejacko1587 stroke
@@joejacko1587 Yep. all her ratings are too high.
@@joejacko1587 lmao armchair coders commenting on an experts opinions if the best description of youtube comments
Her standards for critiquing Mr Robot is just absolutely wonderful to watch. Just shows how good Mr Robot is.
Yeah, but it should've been 10/10. The "should take longer" is so obvious, I don't think you should know about programming and hacking to figure that out. 9.5 at least, and even 9... The whole show is that well curated when it comes to programming details
@@disco.lemonade I completely agree with you, I too expected a solid 10 but don't know why she didn't give.
@Untitled 1 Welcome to Mr. Robot. It'll be an interesting ride for four seasons
@@disco.lemonade Mostly agree. The same is kinda true of the whole show, it's pretty much all possible but probably wouldn't be done by such a small group and/or in such a short amount of time. Points to consider though, firstly that nation-state threat actors were involved and there was a lot going on the background, and we don't exactly get every piece of the story. Second, as far as getting rid of the backdoor, wasn't the Mr. Robot alter already aware of this information? That was probably more a hole in the plot than in the technicals, though that also is not necessarily a hole...the show was riddled with bizarre internal conflicts between the alters(Tyrell: "You, as a person, make no sense").
Ultimately if the show was any more realistic, it'd be a documentary.
Aside from the hacking portions, I'd also like to see different aspects of this show rated by intelligence officials, law enforcement officials, and psychologists. Like the creepy personnel tactics of the Dark Army("Have you ever cried during sex?" "Have you ever cheated on your wife?"), law enforcement procedures("Green! FBI! Don't shoot!" "We call it the python approach."), and the nature of dissociative identity disorder.
Seems like one of these Hollywood realism clips mentioned Dom keeping her gun and badge in a locked safe at her house but I can't remember.
@@disco.lemonade I have the tendency to put pause watching intense shows (I think the issue is that I binged, so getting burnt out is quicker). I enjoy the S1 and half of S2, but there are certain subplots that I just roll my eyes on.
There's actually a very good reason why they'd use "impossible" IP addresses in movies, and that's to simply avoid accidentally posting someone's actual IP address and setting them up for potential cyber-harassment. It's the same reason they used to use "555" for everyone's phone number, because people were actually attempting to call those numbers. Nowadays it's easy to buy a phone number used in a movie, the studio will use it as a marketing tool or simply not activate it, and for URLs mentioned in movies they'll do the same, register it and then use it as a marketing site or simple redirect to their studio website. Can't really do that with IP addresses.
Was wondering if there would be this comment about the IP addresses already and wasn't dissapointed.
Honestly that's one of the mistakes I think actually shows that they know what they're doing (or don't and got lucky :-D )
@@_Tomon I know for sure, bigger productions do a thorough search on anything that can be mistaken or misused. They even check character names, they don't want to risk getting sued because anyone of note with the same name as someone in the movie might be defamed. So I'm sure they also check things like IPs and phone numbers (remember until recently, all movie phone numbers started with 555. Now, studios buy the phone numbers mentioned in the movie and use them as marketing).
Yeah she's 👽
well, you can try resetting your router and after many times, you're gonna eventually get the right ip address lmao
@@crazyg666 Depending on the ISP, this may or may not work. On most ISPs, you'd have to turn the router off for like a full day or more to have the IP recycled, and even then the ISP might choose specifically not to do so, whether or not your IP is dynamic.
The Mr Robot data center UPS scene was so detailed that companies depicted on screen actually reviewed their designs after the episode aired.
Can you direct me to the article about it, I can't find anything
@@arturszatkowski8062 I worked for one of those companies at the time. This was not published but something I saw myself.
I should probably add that we concluded the hardware systems in place would have prevented it. Their commitment for accuracy was stunning though.
I loved mr robot
@@justincruz5720 Season 2 Episode 12.
What happened with the UPS es, I forget?
I love how she explain everything in details...
I'm still confused
coming from a red hat, some of it even after a few years is really confusing XD you are not alone
Hahaha.
I'm guilty of trying to kid my own self that "I am understanding everything she is staying" Even though my mind, attention was completely in kuku land and would refocus on the video which lasted a few seconds, to then only go back to kuku land for the next couple of minutes, after a few seconds of coming back to reality! Hahaha
Lmfao
Which parts did you find confusing? I may be able to explain some areas better. She never went too deep into the topics due to time and the audience this video is for, but I think if you give some specific aspect I can write a more in-depth explanation that may help.
I'm not even a self-proclaimed hacker even though I've hacked things before, but I do understand most of what she's talking about and I can say that she is indeed a "legit" hacker.
"I have been in cybersecurity... for more than 25 years"
I thought she is just 25.
D u think she is hacker? or is she lying for youtube?
You'd be surprised what moisturizer and hair dye can do.
@@savsaga4991 Dude don't be silly. She's well known and her resume is easy to verify. Also, she's 41 years old (dob: 1980). Good genetics & self care. "Hackers" movie came out in '95 and targeted teenagers.
@@bm_wuratli6883 you know that she can be a white hat hacker....not a black or red hat
I can say she looks her age. Obvious from the first glance that she was at least in her later thirties to early forties.
I love that her only complaint about Hackers was the lack of seeing the code. Thank you, people rip on it all the time for being inaccurate - but we're never actually shown enough code to know if its accurate: instead we experience what it Feels Like for the hackers, not specifically the steps they go through. Also, because we don't see them taking specific actions, the movie is timeless - it doesn't date itself to the early 90's. Hackers is arguably the best hacker movie ever made, it doesn't teach you anything about How To hack, but it explores why and why not.
It is one of my all time favorite movies with one of the greatest soundtracks (why I still listen to The Prodigy and Orbital to this day.) My gripe though was always the silly scenes where they are flying through this computer landscape representing the company's network and stuff. I know, it's Hollywood Hacking but they could have at least off set that with some actual code.
I still love the movie Hackers as it shows them actually going into buildings to line in rather than just sitting there.
Hackers was a silly joke that only little kids that never seen a hacker movie before thought was 133t when it came out. It was embarrassing in every way possible. Literally nothing accurate at all.
WarGames was the only movie that was any good.
People rip on it because it *isn't* accurate. But it's not supposed to be. It's entertainment, not educate or documentary. And yes, it very much dates itself to the 90's... payphones, "686", "RISC", BBS's, hacking the cable company's _VCR!_ ... And the f'ing "gibson". No computer has EVER looked like that. Computer operation rooms are not black f'ing pits. (until midnight when we took over the NOC to watch movies / TV on the wall-o-monitors - rear projection monitors.)
I think it exposes Angelina Jolie's boobies too so extra points for that (Imma girl, she's just too much of an icon to not appreciate).
Excellent presentation skills, good sense of humor, knows not only what's going on in the scenes but able to put them in context. She gets 10/10.
And she is very beautiful
She also makes this a fun experience and doesn't take the clips too serious. She respects that Hackers or Matrix for example are movies with a lot of goofy stuff happening that are nowhere near realistic - but she's focussing on the things that might or might not be accurate, which is very nice.
If you've seen certain expert reacts episodes on gameology you know what I'm talking about.
and she's a cutie too
Didn't know Aunt May is a hacker.
Lmfaoo
there's a lot of things May keeps a secret
She's not. Her much fatter kid sister is.
So I guess I'm not the only one who thought of that 😂😂
Maybe she learnt it from peter
Plot twist: The CIA is now monitoring fingerless glove sales in order to go on a phishing expedition.
Hahahahah punny humor!
Thats gonna flag alot of bicyclists.
@@kriss3d and motorcyclists, european sports car drivers, and mma fighters!
Oh my.
I have a story of programing courses, IT degree, and have a lot of notes for writing that makes me loot like a psychic.
Now my fingerless gloves are totally make me look suspicious!
You joke but I bet intelligence services are monitoring some crazy things around the world. Not just the obvious, like amonium nitrate sales and such.
This was great. I love that Hackers actually influenced her to become a Hacker. Please bring her back for more. I would have loved to see Die Hard 4...wanna know how much of the Fire Sale is real. Also Leverage and some of Hardison's hacks, like the car theft hack or against the Sterenko.
Oh my, yes I remember Die Hard 4, the Fire Sale hack, I'm also curious about the real aspect of this thing...
I want to see her comment on that infamous NCIS scene lol
“We can tell she’s a hacker shes got all those stickers on her laptop”
I sense some sarcasm
I'm a software engineer and my laptop is actually covered in stickers 😂 It's a pretty common practice, and some companies even give employees stickers to put on their laptops. Granted, my hacking skills are somewhat lacking.
I am a programmer but I don't like stickers on my laptop.
I am not a programmer and don't like stickers on laptop.
I am not a programmer but I like stickers on my laptop
I'm not a laptop but I like programmers on my stickers
I didn’t know it was actually possible to have “hacker gloves”
Probably for really bad carpal tunnel
@@johntucker3695 Cold environments too, maybe? I used to have my comp sci class as the first class of the day in high school and on cold days I could barely type for a good portion at the beginning of class.
@@JKTCGMV13 This sounds sarcastic but that is actually very interesting. I never really thought about how cold hands would make it harder to type.
Shows whos not a hacker then.
It's needed because of hand sweats
“Why is this air freshener connected to the internet”
It's a _smart_ air freshener
Has to download that fresh air from out of country, obviously!
XD XD XD Your description is hellarius.
💀💀💀
To auto surf for new brands on sale?
Mr. Robot is the best IT/Hacking show or movie that's been made. It's combination of the technical elements and the psychological complexity of the characters with Elliot being one of the best written characters I've ever seen. A brilliant show and if your a tech nerd you need to watch this.
True,only because creators of Mr.Robots are smart people who want to create realistic hacker show.
They are backed with elite hacking team of top security engineers and IT specialist that perform all Mr Robots hacks for them in real life,everything that team was doing was build in a flash animations that are later played on the show so it seems that eliot or other characters performed them.
@@JohnRiley-r7j An elite hacking team built animations using flash? Something doesn't add up here.
Sure, for people who don't know any better, it's very entertaining. But for me and my "tech nerd" friends, it's infuriating how things are trivialized, and the otherwise hatchet job done in the name of hollywood. (sure thing Deviant... many doors can be slipped, and once inside the water treatment plant f'ing nothing has a password; no one is watching the cameras, and the drive in the NVR has been full or broken for years.)
@@jfbeam Hey, it beats NCIS two people typing on the same keyboard hacking, looking like they just downloaded something dodgy from early 2000's Limewire and getting flooded with popups. It's progress!
Finally, they got a hacker who REALLY knows what she’s talking about
They have done 3 other of these pieces with other Hackers.
@@gavinvelez1468 OP is saying that those three didn't know what they were talking about.
The video was boring af.
@Nybbl er The content of this video is for kids, though.
@Nybbl er It's actually kind of perfect for those with adhd if it interests them enough for them to hyperfocus on it.
I feel like Mr. Robot has some of the most realistic examples of hacking to date
@G T Or the FBI paid Microsoft to keep the backdoors open. It literally happened with Wanacry.
Also some of the most idiotic and boring tv shows ever.
@@ghostabastard2208 What's idiotic about it?
@@ghostabastard2208 you really are a high school drama enjoyer, go watch your vampire diaries and call it entertaining
@@ghostabastard2208 You justify your answer.
Very proud of Mr. Robot. Its attention to realistic hacking is very much appreciated.
In some ways, the errors in the terminal session graphics in Mr. Robot (season 1) bothered me more (or in different ways) than shows which don't even try to be realistic. Like, if you're seriously trying to be realistic, actually get the fine details right. Stuff I remember included having the command prompt printed at the left of the output of the command, so you know they didn't actually set up a test network that would let them just run `nmap` or whichever command it was. Like, you were so close, but clearly just made this image in an image editor, not on a real terminal session.
Or another scene had the arguments backwards to ln for making a symlink. It's
ln -s target_name link_name_to_create
not the other way around. I've used GNU/Linux as my desktop OS for about 25 years, mostly with the command line other than a web browser.
Plot-wise I appreciated the accuracy of what hacks can/can't do, but the expectation of accuracy made things like that break suspension of disbelief for me for a few minutes each time, and made me want to double-check every other screen image.
@@Peter_Cordes hi, fella nerd
@@Peter_Cordes Even if the hacking isn’t completely accurate, you can see the effort that was put into those sequences. This is also entertainment, so some creative liberties must be taken. It’s a bit like _Breaking Bad_ . The show looks like it’s teaching you how to perform these cool illegal things, but if they showed you how to do it verbatim, it could potentially be very problematic.
@@justincruz5720 - My issue wasn't with any "hacking commands" or techniques, instead with the basic appearance of the UI sometimes, or with a basic command like `ln` (similar to file-copy, a bit like DOS `copy`).
As an analogy, imagine if Top Gun had had incredibly realistic dogfighting techniques, but occasionally they left the landing gear down while doing so. (More people know about planes than about Unix/Linux, and it's not a perfect analogy.)
Or maybe a Windows analogy: if somebody ran a program, and its window appeared behind the desktop icons instead of on top. People who use Windows regularly would be saying "WTF" the one time that happened; people who don't might not notice.
If the things that bothered me don't bother other people, that's great. It wasn't a showstopper for my enjoyment of the show, but it did bug me and stick in my memory.
The realism of the actual hacking was great, just an occasional error in the super basics, like having the command prompt appear at the left of output lines of a command. So if they had a Unix/Linux user reviewing the screen images, that one slipped through the cracks.
As for getting `ln` args backwards, that's more understandable; I sometimes have to think about it when I use it, and from some perspectives it seems backwards. So that's just an amusing reminder that they mock this stuff up in an image editor instead of actually running it. Easy to imagine someone getting that backwards even if they do know Unix/Linux command line tools. But still, if you notice it, it's a clear reminder this isn't real. :/
@@Peter_Cordes Is any of it real? 😂 In all seriousness, I heard Sam had some programmers as consultants to help work on the show.
For a layman, one of the most fun educating, eye opening things about hacking in 25 minutes. Would love to have more of her with such equally good movies.
I'm surprised that so many competent scenes were found for analysis. I didn't realise this many existed.
Watch the Mr. Robot series. Arguably the best show about a hacker so far.
I really enjoyed this, nice to see at least a chunk of them are making efforts to get it marginally correct.
But, I got a 2-ad-break after every single scene she analyzed. Skippable ads, but dear God it's annoying to see a cluster of ads every 3 minutes.
haha noob
@@NX-gw7wg adblooooooooooocker is worth the price
@@NX-gw7wg how much does it cost?
@@Itaygaming311Xx thanks! 🙂
@@kerrim508 ublock origin extension for chrome is free, free and free. Not seen ads for the last 10 years myself.
I had zero surprise when she said that Hackers (1995) movie was her absolute love... c'mon, it's every hackers holy grail and in most cases inspiration to become one.
I am older for me it is "wargames"
Even when it came out everybody I knew that knew anything about computers loved that movie, but as an ironic comedy rather than a thriller. The music was spot on and clearly somebody did research lots of real stuff involving hackers. But then hollywood got ahold of that info and just threw it around all slapdash and made a complete mess of it. The scene where they are using acoustic couplers in phone booths for VR rigs is just peak absurdity. For reference, assuming you have the world cleanest connection you might maintain a connection of a few hundred bits per second. A decent typist can type faster than you can transmit on a connection like that and the machine will start beeping at you because the keyboard buffer is full.
@@peterjeffery8254 both for me.....
Doubt
@@peterjeffery8254 yep. Wargames, Sneakers, and Hackers are why I am in infosec now.
My brother works in IT, more on the hardware side. He was tasked once with helping do a security audit. He was basically given a hi-vis vest, a hard hat, clipboard, and fake ID, and told to see what he could access without question. He said it was amazing how many places he could get without even showing an ID...and how many more he could get just flashing a badge. People will always be the weakest link.
Edit: SQL for the foreseeable future. I work at a corporation running emulations of 60 year old hardware for chunks of their operations because they've never decided to update. We call it going greenscreen, because the software emulates the old green CRT terminal monitors. Everything we do is command line based. We basically have an emulation of the whole network (server and terminals) on each device, and they all regularly sync to make sure everyone is on the same page.
Okay, but Star Trek doesn't take place in the foreseeable future. Also, SQL injection barely works today. Basically you need VERY sloppy developers to have a site or service that is vulnerable to SQL injection. Discovery is set 230 years from now. Even if SQL will be used then, it's highly unlikely SQL injection could work.
@@sgtGiggsy practices turn to nouns all the time. maybe SQL injection is a type of hack in the future? tho imo they should have used better terms, there are systems, languages etc. which have survived since a long time in tech. some of the basic code and the things that make tech work are still used today as OP posted (I've seen it myself after working in tech for 7 years).
Being an ex white hat hacker myself I understood everything she said as I get frustrated sometimes with hackers in movies but you must understand it is done for entertainment. Real hacking is boring and tedious, well until you hack something then it gets exciting.
Script goes brrr
Except Mr Robot is not boring at all. Granted he is supposed to be a super genius and almost all of his attempts are immediately successful.
Ex-white hat hacker AKA current black hat 🤣😜
Teach me.
😂 id love to see a movie where the hacker says i need a month, start researching for 2 weeks, build some hard and software for another 2 weeks and than just simply fries the target because he accidently made a ground loop xD
Can't believe you didn't show her the iconic NCIS scene
The part where they're both typing on the same keyboard is one of the dumbest things I've ever seen... 😆😂🤣
Would be hilarious if she confirmed it was real
That's low-hanging fruit to pick. So obvious even to someone slightly familiar with computer.
Can you imagine the sheer volume of mockery that actress gets for that scene? That is like, her whole life! lol
@@TigerGreene Personally, I don't put most of the blame on the two actors, I also blame the writers, directors, editors, etc. Someone should've pointed out that it was dumb and nobody did! It's crazy to me that so many people had to be involved, like with any scene, and that made it on the show. Also, I doubt anybody gives her too much grief, cuz Abbie was everybody's goth tech bae fantasy, that some didn't even know they had. It's universal, even people who aren't into goth love Abbie! 😍😆
When she said you can do beautiful things with code, she didn't mean graphics, she meant elegant code that a master of the art looks upon with tears of joy.
It really is like looking at a piece of fine art when someone does a nice code. I’m not a coder but man is it beautiful.
You guys and your 'nice code'. Spaghetti is a feature, not a bug! if it was hard to write, it should be hard to read!
@@petertrudelljr 😂
@@petertrudelljr You can also claim that the spaghetti code is a form of "obfuscation"
yes but , if I wrote a beautiful program whose aim is to produce spaghetti code , would it still be beautiful ?
would that program be spaghetti complete ?
what if I wrote a spaghetti meta code , to produce spaghetti code , would that be considered a spaghetti machine ?
would goldon ramsay's brain halt ?
One of the things that I'm disappointed that she didn't mention is social engineering, which is also used in Hackers where he takes over the TV station by calling up the guard to get the number to the modem. It is a real thing that was also used to gain access to different places by pretending to belong there and someone willingly gives you the access you want.
This is true
14:58 *remote hack starts driving a car*
Me: haha ridiculous 1/10
Keren: "This is a real-world hack..."
Me: ah yes I love the realism
I was at one of those demo where they did it (with a bunch of other tech me). At first everyone was searching for a cheat thinking it was a trick then everyone started hacking and doing it themselves. Ended up being the show stopper event of that conference. Haha
its pretty real, maybe not in the exact points but CAN exploitation or Controller Area Network exploitation is very very real, CAN is the interface often used in cars, all it is is finding the CAN address and Network, Sniffing the data off of that interface, making a bluetooth logger hang onto the card ( Most CAN interfaces have bluetooth ), dumping the information and exploiting the device if there is a working or current vulnerability that has not been patched yet or has been abandoned by the developers
Bogus IP addresses might be a movie thing like putting "555" in a phone number. An actual IP address probably belongs to a computer and will undoubtedly get unwanted attention from real hackers and unnecessary litigation for filmmakers. So, I wouldn't take points away because of the fake IP as it's an entertainment-inspired legal deal, possibly.
Doubt they are smart enough to think about that
Doesn't really matter if you use private IPs
It's to make sure not to use real IP address, same as tel number and avoid getting sued! Maybe there are laws, or rules, about it! ¯\_(ツ)_/¯
@@androgynousmaggot9389 If they showed a real IP address in a scene and then that IP address got DDOSsed afterwards the owner of the IP would sue for sure.
@@nonyabidness6492 They used the number 256 in an ip address in the picture, which is exactly 1 higher than allowed. So it seems pretty deliberate, hard to imagine that they would have picked that number randomly.
Me: *takes one single computer science class in college*
Also me: “You know I’m somewhat of an hacker myself”
considering you need zero computer science classes to be a hacker, that is ok.
You mostly need an interest in understanding how things work and a will to look up it up until you do. Hackers are creative tinkerers.
A computer science education does help in getting a broad set of basics and get them right. Some things you might otherwise not even know you would want to look up.
More like the "hacker" reacting to this is: "Considered somewhat of a hacker" lol.
@@lePoMo it's gonna take you a lot if you didn't finish some kind of computer science degree. There's just so much to learn. It takes a lot of work in college with mentors that can teach you. Think about what would it take if you were to learn it alone...
@@lePoMo bruh you just can't "Look up" stuff related to hacking, it's not that easy.
@@CG-ej8nu What about those textbooks and reddit? I can't be a hacker? :C
In Trinity's full-finger glove defense, she's inside the Matrix, she doesn't actually need to touch the keys to type, it's her mind injecting commands into the simulated machine: she may not even be touching the keys, she's just making the gesture of typing to signal that she's doing it.
It’s no surprise that David Fincher’s movies are some of the highest rated. His attention to detail translates to showing off real world hacking techniques
In fact, I expected 10/10. Even the Linux version the character uses looks like the the one we had then!
Elliot isn't simply set up to be above average intelligence, he's basically portrayed as a genius of I.T!
He is a savant in the hacking world.
Na he is a 1337
Yeah, above average is like... some guys working at FB or something like that. Elliot definitely is in the top 1% of the top 1% programmers.
Alex North That's why it's being called unrealistic. It's simply not possible for any human to do what he did in basically 2 mins. That was a poor execution by the show's writer and directors, kind of ruined the hard work that the security consultant put in.
@@randomuser5237 Well he could have done a preview of the CTF. Or maybe just lucky on solving things out, considering his proven skills since he was a kid. But I do agree if you are pointing ot other scenes on the series where they are extremly lucky or you just notice a plot-tool, by the percentage not likely but technically yes the exploits and ways on Mr.Robot is great.
I really can’t suggest mr robot any more. It’s an absolute masterpiece.
It’s slow and not for everyone
@@moonpie7982 I agree,I watched the first few episodes with my friends and they quickly got bored.
It is AMAZING
It's basically the 4chan version of Fight Club.
Mr.Robot is like watching ART. My favourite series ever
In Mr. Robot he could have noticed some easy to spot defect like SQL injection, saw an input argument to a function which just got invoked as a DB statement as is. That kind of a defect can be spotted quickly an no need to dig into the code. Enjoyed the video, thank you!
She said she had been in cybersecurity for 25 years,lol, I would believe if anyone said to me she is just 22 yrs. Old
She's 41 years old
@@ajay4319really ? but she looks young tho
@@joshjosh2842 yep.
@@pet.me102 she's fit too
this is what happens when you never see daylight lol
"... using open source intelligence, which is a fancy term for 'the internet.'" 😄 Love it, Keren!
Five seconds in I knew this would be a great episode when Keren shouted "This is terrible!" and "YIKES" at those scenes. We need a part 2, and she needs to be in it!
The IP address with 256 in it, is probably similar to them using 555 as the city code for telephone numbers in TV and movies, to keep people from trying those numbers and successfully reaching some random person. Don't want them trying to reach Jenny's laptop, only to accidentally to to connect to something like a server at the NSA, which gets your own IP logged for potential cyber crimes, when you are just a kid playing around with something they saw in a movie.
Came here to say that, they probably didnt want to accidently use someones actual IP Adress so they took one that isnt possible
@@derleonator2232 They also show at least one real valid IP owned by Level3, the way they use leading zeros so inconsistently shows that whoever designed that scene has heard about IPv4, over the phone.
Definitely not done on purpose to prevent DDoS/spamming against real IPs. If that were the concern (which it should be), they would use local IP addresses (RFC1918) or APIPA addresses which would guarantee nobody would ever be affected by it.
@@someguy4915 It's done for legal liabilities, as every legal IP is borrowed by a company, and they could be liable to the owner, even if there was no attacks against it. The most appropriate IPs to use are probably those reserved for documentation besides private and zeroconf addresses. I'm guessing they like to use big and random numbers instead because they look "cooler", and because they don't have to think too much about it.
There are also a lot of times where they will use an IP from the Private IP Ranges for a Public IP.
I am a automobile security researcher. Everything she depicts is accurate. Even with driverless vehicles, I would be hard pressed to make the vehicle perform the maneuvers depicted in the movie. Just FYI, your vehicle’s computer systems are incredibly insecure. It is frightening just how insecure they are.
It's only certain models that can do the remote thing. The factory has to install the 'On Star' feature. It usually comes with a price tag to the end user who purchases the vehicle. But what she stated in the scene about computing power; that's real. You maybe able to hack in to the system. But that's really as far as your able to go. You would need some top of the line servers to make that all happen that quick.
I don't own a car, but I do not like that all appliances and even cars are becoming smart. Give me my stupid fridge and a car that just needs a key to open it. It only creates weak spots where things can break (or be broken into).
@@fightingfalconfan servers have nothing to do with it.
@@snazzypazzy The fact is, things much more vital than your car or fridge are already potentially vulnerable to hacking. Interconnectivity goes hand in hand with globalization. Cyber security is, and always has been, an arms race and will continue to be for the foreseeable future.
@@anthonymonge7815 You would need processing power. I'm not sure how similar it would be to running a brute force attack. I've seen computers with 4,6, even 8 PCIe slots that house as many GPU's to utilize their processing power for password cracking. I would have to assume you would need something similar but on steroids to manage that type of attack. Even so, I doubt the NICs in self-driving cars are broadcasting their network traffic in plain text. Thats just something you dont see anymore with AES. I think self-driving cars use GPS and proximity sensors to navigate and I'm sure theres some kind of AI that processes the information in real time. Im sure we will see self-driving car hacks happen with greater frequency in the coming years.
On the topic of Elliot, I assume anytime we see something happen too fast, it's because we're seeing it from his perspective. We already know he doesn't process things well and hyperfocus is a pretty common trait that causes people to "lose time". He might be spending an hour on a task, but only really processing it as a few minutes. Since we follow his perspective we process time the way he does.
This probably isn't right, but I like it as a head canon.
That is perfect.
''Hey, why does that air freshener have an internet cable plugged in?
- ''Don't worry about it''
-It's a POE powered air freshener.
There used to be a big problem with people just picking up any random USB stick and plugging it in. Hackers would leave malicious USB sticks lying around at banks, offices, etc, and a surprising amount would get plugged in. Policies on USB sticks have changed, especially at banks, this is a huge no no.
You’d be surprised on how many times people don’t question that type of thing.
It's for the Fragrances DLCs
Regarding the last one:
My guess is that they deliberately used an invalid IP address, just like all phone numbers in US-movies that start with 555.
Being off by a single digit indicates to me that they knew exactly what they were doing there.
Me who can't even print hello world in C language- hmm..looks interesting
(TT)O_o:-O:-)^_^8-)B-)ᕙ( • ‿ • )ᕗᕙ( ͡◉ ͜ ʖ ͡◉)ᕗ
9WHQ+8M Boston, MassachusettsTap on a clip to paste it in the text box.
As a 2nd year CS student currently working with C and C++, I wouldn’t hold that against yourself. C is hell. Try python instead.
I was "alphabetized" in Java. I hate C so much. I'm learning C# but Python sure is a given of the Heaven
I think Python is way to go for hacking
Hollywood hacking: *Frantic typing at a 3D visual effects animation* "I'm in."
Needless to say this is one the many reasons why I keep my Laptop Camera covered with tape.
While leaving the one on you cell uncovered I would pressume.
@@rdarkmind nope got that covered too.
@@MrSparda1989 I have a lot of co-workers and friends with laptop cameras covered but you're the first person I hear to have your phone camera covered as well. Kudos to you! Too bad you can't 'cover' your microphone if you want to actually use your phone for talking with people.
mine came with a cover built in to the case B)
@@alexgigelu Just turn off your phone, lol
The most informative video I have seen on this channel! Never knew what the backdoor operation meant, even after research. She explained it so well with the "secret handshake" analogy. On point 👌
In all fairness, Trinity is in the Matrix when she's hacking. Given the powers she has about bending the rules of the simulation, including jumping across streets from building to building and kinda flying thru tiny windows w/o a scratch, outrunning Agents, typing correctly with leather gloves doesn't strike as unbelievable... I think we can grant her the 0.5 back :)
I'm shocked they didn't review the most powerful hacker of all time: Hackerman from Kung Fury.
You won't ever catch him on rookie mistakes like wearing fingered gloves. I learnt everything I know from that guy.
Damn you just brought back so much nostalgia
[ synth wave soundtrack intensifies ]
// _HACKERMAN_ //
They were generous in picking the scenes to analyze, simply because there are many more examples to bury under a 1/10 than there are worthy of a 5+/10 🤭
So true, I'm not a huge tech wizard for a 22 year old, but I know most hack scenes are b.s. This was a fun episode for me to learn something new.
Swordfish is the film that comes to mind.
Blackhat was horrendous. On par with swordfish.
she gave the movie hackers a 8 out of 10 lol those gibbons and gifs in the malware the sprinkler system is connect to the internet the lights in the building just so much in that movie lol
@@joejacko1587 bro can you stop spamming this shit all over the comments
As a software developer, I hate how movies make coding out to be this thing that can be done in a breeze with no time needed at all.
Idiots try to contract me to build super complex software and say "this should be easy if you know what you're doing" ... Hollywood and the American education system are to blame.
Technically the Matrix Reloaded would be a 10 since when Trinity is doing the hack with the gloves, she is within the matrix, where she has learned to go beyond certain limits that would otherwise impede her performance, for example, doing those really high jumps. Had she done this outside of the Matrix then yes, there we could have judged her in comparison to "reality".
If someone is able to long jump 50 feet & run along walls I’m gonna assuming that typing with gloves on isn’t too much of an issue... 😁
@@LinkinVerbz44 Yes, hence why I said, technically, since in all the Matrix movies we can see and tell the difference between the digital and the real realms. Neo for example can fly within the Matrix, but not outside of it. Trinity can hack with gloves flawlessly within the Matrix, not outside of it. So for that scene, as she is within the Matrix, techinically should be a 10.
@@juggerfox Good points. And the Tank in the first Matrix movie living in the real world does use fingerless gloves.
Plot twist: You didn't watch a RUclips video of a white hat hacker reviewing a Matrix scene. You are not even reading this comment of your own free will. You are in the Matrix. 😅
@@laprimaverrra can't argue against that, but still a 10! ^^
As a computer engineering student, I am having fun learning this kind of video
She explains those things so perfectly even tho I'm not a hacker but I learned more from her than my math teacher.
32 x 32 =
@@JLilliquist lmao
I'd say you're biased as we all are.
Also,math and computer science despite being interdependent don't necessarily equate in knowledge of one amounting to knowledge of another.
Your math teacher was teaching you how to hack? lol
im curiouse, what did you learn from her in this vid?
I saw this just as I was about to give up studying Cybersecurity. I guess the universe doesn't want me to stop, maybe its my calling. This video just gave me the push to study hard and be as cool as her knowing all these stuff.
As a hacker I can confirm she is very knowledgeable - good job 👍
Hacking and slashing those Minecraft sheep
Are You really a hacker?
@@raulrus9026 i doubt it
Indeed I too am a real hacker and can confirm
@@orye09 I can vouch that this dude is really a hacker
This was fun to watch, I disagree with her critique of Trinity from Matrix resetting the root password after gaining root access being unnecessary. It’s very smart to reset the password when you gain access to keep the actual root out while you’re working 😎
Also when she deducted points for phony ip addresses, they did it cuz its a movie like “555” in phone numbers
if you want to be inconspicuous, you don't touch the pw. If you need to be fast, there ain't no time for that. If the girl just wanna hv fun... oh yeah 🥳
What's funny is she said it was based on an actual program and vulnerability found in it yet a hacker in another wired video said this scene's program was fake lmao
@@FeduGina too bad we didn't see the nmap triggers. Maybe we could've determined if she was being sneaky or aggressive
@@YungFrenchToasty He is wrong - that vulnerability was quite real. I remember patching my systems, and looking through logs, when this came out. Got quite impressed that the movie used it too.
Great video! But I am missing Swordfish's infamous scene where Hugh Jackman is doing a weird 3d puzzle to hack something 😂
😂😂😂
Wait. Hackers don't actually have chiseled pecs and a muscular a$$ and look like models?
lol i thought u were gonna say halle Berry's sunbathing scene
@@jojotwice8918 Halle Berry: *goes topless*
“I’m in.”
Blackhat (2015) is the most hack accurate and underated movie i ever watched. I wanted it be in the list 😭
Its so fuckin boring. I forgot its about hacking several times throughout the movie
@@mizar_copernicus138 Because hacking is boring, if it was so entertaining everyone would be a hacker. Moreover, hacking requires social ingenieering capacities that most geeks don't have.
@@Darkes336 no that wasnt the case as i mentioned there was hardly any hacking and it was boring without it
@@Darkes336 did you even see the movie?
I am SOOO glad that most of my IT work was done before ransomware. In all honesty that is the main reason I stopped. It was fun keeping things running, but it is not fun having to play defense 24/7. May the gods bless all you brave souls that picked up the torch.
tbh securely backing up your data and not installing HappyFunTime.exe from some random USB stick in the parking lot should be enough to play defense.
@@digitalcyclone7218 In the old days I had one of my users request a new 3.5-inch boot disk every day. One day I followed her and noticed that after she used it she secured it by using a magnet to hold it to her desk drawer. After that I put NOTHING past the masses. Also, the number of times I came into a new client only to find that there backups were not working properly for years is only surpassed by the stars in the sky. Hopefully these newer generations of techno-savvy users will mitigate some of these issues, but I spent decades teaching Luddites not to click on spam links.
@@theelvenwtich fair enough tbh.
Evolution of RUclips Ads.
2010: No ads.
2015: Skip ads.
2018: Skip ads after 5 seconds.
2020: Video will play after ads.
2030: Video may play
2040: Video unavailable, watch ads.
2050: RUclips renames AdTube".
serial killers rating killing scenes
"hey, that's actually good"
takes out notebook
A lot of the points deducted were for things happening faster than they would in real life. I'm willing to be a bit more forgiving about those because screenwriting is all about hitting your story beats as quickly as possible. Nobody wants to watch a hacker stare at a monitor for hours on end. You can do it with a montage like Hackers did, but even montages get tedious if you use too many.
To be fair a way I would get around that is show something else that is simultaneously going on. And if not that, a quick cut to an outside shot showing light being at a deeper angle also helps. It will be subtle, but people watching Mr Robot would probably notice
When you realize she says that the Matrix is real, you know the world has gone to deep hell right now.
It's plausible that we do exist in the matrix.
She doesnt say that though.
The world is going to a made up place? 😂
She didn't say that. She said Nmap is real. The commands Trinity types into the terminal are real.
the tools were real, the exploit used was real and so on, not the matrix. that was the whole point of what she was saying
We need Keren Elezari to react to Watch Dogs and Cyberpunk!! 😭 Please do a special episode on this
"we can tell she's a hacker. She's got all those stickers on her laptop"
Me: looks over at my laptop. I'm a hacker! 🙌
For anyone who loves real life hacking stories, "The Cuckoo's Egg" was a great read, a true account in the very early days of the internet about an astronomy grad student who got roped into chasing a hacker around through various school and military networks.
That book was amazing and the author Clifford Stoll is on RUclips but he usually talks about his other pursuits like his klein bottles.
Not only is the book good but it might be the first time someone laid the groundwork on how to deal with a digital intruder instead of just kicking them off the network.
Your comment currently has 23 likes, so I will not click the like button now.
Those are not "Cool Hacker Gloves."
If I had to take an educated guess.. Those are probably doctor prescribed carpel tunnel bandage - gloves.
Hey now! Those gloves are totally radical to the max! You just need a time machine to travel back to 1985 to be in the 'Beat It' music video.
As a fingerless gloves user and a IT person I say those are great if you have Renaud syndrome or spend much time typing in cold rooms.
Also they help keep the hand moisturized.
@@AramatiPaz I wish I had known (or thought) about them two years ago. My old office had an hvac system that dumped cold air down my back every day. My hands were always cold and stiff. In some especially cold server rooms I do jumping jacks, wall push ups, and squats to stay warm.
@@Wynner3 i Actually bought two mini heaters that i placed on both sides behind the keyboard! I switched to fingerless gloves but these look more appropriate. Going to try to find some i can buy.
this was great! 2:45 when she says "unfortunately mr. Bond" like a villain. hackers are too clever for their own good :)
I was hoping she'd look at "Goldeneye" to see if Boris' SPIKE program was possible....
Slug head!
Even she wouldn't be able to stop it, because he is INVINC-EE-BLE!
I think she would start with what terrible typist both Boris and Natalya were.
might be a way to keep the relay on over buffering but it wouldn't work on all modems i doubt it would really work on any modem tracert is a thing but yea there is so much wrong there
I absolutely love season 1 of Mr. Robot. There has never been a mind ducking of that level for me. I was so looking forward to new episodes with extreme excitement and enjoyment. No other show has done that for me. I miss the characters.
This one is the best of these. Not everything decent is an automatic 10, and point deductions are well explained. Good job!
It's almost as if she was in a profession that requires you to be very logical, organized and detail-oriented.
I’m a digital forensics and network security tech and she is so right on a lot of these points. When I did a security training for a bank I handed out password generators just so people did reuse passwords.
I have done several CTFs and got to do Def Con once. So much fun. I’m terrible at them I score around the low 1000s, best I got was mid 500s (complete luck and a leap of faith). The team ones are so much more fun then the solo ones (at least for me). Was team leader twice and we had a monitor where I watched what everyone else was doing, again only scored low 1000s.
I’m just not a great hacker, haha.
As for PIN number sounds, there was a book that told you what numbers to hit to play songs.
Help me start a career in hacking.
The tones are know as DTMF tones 🤦🏻♂️ should know that being a security boffin, it's part most compliance audits for phone system these days
As for physical password generators 😵 hopefully none have been flashed with dodgy firmware with set passwords preloaded so hackers know what password will bs issued by the generator for any given month 🤦🏻♂️
I feel like shes wrong about the password cracking box tool. I feel this very much is likely a real thing that could easily go through 1000's of pws. Im not sure why she is claiming it couldnt exist.
@@lastninjaitachi there's a reason that she would
@@lastninjaitachi she's referencing that the computing power required to brute-force hack or even using rainbow tables far exceeds not just the best supercomputers around rn, but around in the foreseeable next 50 years. It's a mathematical/physics issue and not a clever engineering one.
3:59 He is super inteligent. Remember the bluetooth car hacking scene? "Did i make a mistake? No. I dont make mistakes." He is like a computer.
Keren is adorable, smart and expert. I have followed her for years. Great video!
I love her. She's amazing at communicating her ideas and has a great sense of humor. :) I want to buy her a drink and learn from her!!!!
She is hella smart and not a alcoholic 😂
Remember when the FBI played the game with Apple by "asking them" for some access to a device as if it wasn't very easy.
As a Network administrator i was surprised at how many people thought and still think Apple has some sort of super security and android doesn't when they are both Linux.
iOS is not based on Linux, it's derived from OSX (which is BSD/UNIX with Mach)
i didn't think anybody had hacked that version yet when they asked them
@@sundhaug92 Unix is just discount Linux, change my mind
@@joejacko1587 - come to South East Asia. just about any roadside phone repair shop can do it for you. For a fee.
Unix existed first and Linux was based on it.
I have years of practical experience with corporate IT infrastructure. When I started out on mine hacking journey, I felt very discouraged and down because I would take days or even weeks to figure out how to crack a box. After awhile, I realized its because I've been watching too much Hollywood hacker movies where hackers could crack boxes in seconds and I had been benchmarking myself too much to these illusions. It does take alot of effort, time and incredible depth of technical knowledge to pull off stuff like that. Keep studying guys! 😀
I was expecting a "This episode was brought to you by today's sponsor, express vpn.."
I've actually seen 2 popups for Express VPN that show my IP address and location as a way of showing how "insecure" my information is. They told me I was in New Jersey, but I think I should be pretty safe. I'm in Canada, already using Express VPN :/
thanks to those ads I looked up free VPNs, and obviously downloaded malicious bullshit.
I could listen to her talk shop all day. She could teach me so much and I really understand what she's talking about now that I have my Cybersecurity degree. Would love to meet her at Def Con and work for her. Awesome stuff.
Mind if I join in? Digital forensics degree and work in cyber security; I just want to be a fly on the wall and take notes. I’ve done so much but still feel like there is so much more to know, haha.
@@gbalfour9618 Why don't you just hack in on their conversation?
Trust me you aren't the only one who turned off Star Trek Discovery in disgust.
I sure did
Lol I did
Lots of people liked it. In fact it is liked enough to have had multiple seasons and a decent critical reception. Picard is good also.
Not suitable for the alt-right or the crazy anti-sjw brigade though as it causes them panic.
Not panic...just general disgust at the amount of force-fed SJW nonsense. Star Trek was about the story and exploration, now it’s just how many woke characters and topics can we squeeze in an episode w/ Star Trek uniforms.
@@BigBear-- Star Trek was always kind of woke though? The Federation was implied to be a post-scarcity socialist society. The original series had a diverse cast for the time, and it even depicted the first interracial kiss on American TV. Like, are you even a Star Trek fan?
Awesome video! Hackers is what made me want to be in Cybersecurity.
Is Cybersecurity cool or good? I want to know because It look Interesting for a Job
Why do all hackers in Movies are wearing those gloves without fingers
9:52
Because the hacker in real life on your screen is wearing them
@@chrys9256 haha lol
To hide their palm prints. Duh. After burning off finger prints,they realized itt hurt way more than they thought it would and they give up before destroying palm prints. Hey, it sounds good anyways. Besides, she is super hot and has a super sexy accent. I'll forgive the nerd gloves. LOL
Not sure if this was rhetorical, but it is harder to type with cold hands. Your fingers becomes stiffer, and slower. Gloves that also cover your finger tips are (as mentioned in the video) generally terrible to type in; as you lose dexterity and feeling.
Of course some people wear them just for the style points...
"👌 One does not simply hack a registrar in two seconds 👌"
Hope they make a part 2 of her rating hacking scene. They need to show Thomas Gabriel's hacking in Live Free Or Die Hard.
This woman is great. Great explanations as opposed to others I've seen.
*Mr. Robot* shows the most realistic, accurate and the best hacking ever shown in all of movies, series or whatever.
On the basis of the reason she told for giving Mr. Robot hacking scene the 9/10, I think it should have been 9.5 instead of 9 as it's almost equally big mistake as in The Matrix Reloaded.
I took cyber security in college for my master's degree. I had so much fun doing the lab assignments but the amount of forms we had to sign really sucked. Oddly enough, I do development now and not so much security.
Huh. They didn't make us sign any forms in my cyber security class, they just told us never to do anything we learned without permission from the owner.
@Nate McGrew
They did the same with us. No paper work but we’re told to only do it with permission or to our own networks at home.
"I do development now and not so much security"
In theory you should be utilizing some of those skills in your development. Defenses to vulnerabilities start with knowing what classes of attack vectors exist and developing software to (ideally) not have them.
@@JimBob1937 I use more of the concepts when I do designing and testing. In Salesforce development, we often to do code reviews and validations to find vulnerabilities that would be rejected when going through federal guidelines. Some people tend to be very lax when coding and as a release management I've dinged them for it.
@@kparsa1 , yep, that sounds like a good process. Have knowledge of vulnerabilities, code defensively with those vulnerabilities in mind, then a code review and validation of known vulnerabilities. In general we're seeing a tighter integration and cross-disciplinary approach to security these days towards security for hardware and software developers and engineers. Tacked on security is most usually weaker than a proper implementation from the start.
I am completely shooketh that the matrix was a nearly perfect score
The Wachowskis are no slouches when it comes to computer knowledge. They had to rewrite the original script in order to make it more accessible to laypeople. Humans weren't supposed to be batteries, but sub-processors that gave the machines more power.
@@joelcastro-reyes1667 I'm actually still salty about that because it wasn't even their choice. they only did it because the higher-ups wanted it to be more "easier to grasp". now because of that, the matrix has one gigantic logical flaw poked into it.
It's for fun, chill
If only she would use those skills AGAINST her government, maybe she could actually save some lives.
Lol what she's an Israeli
And Israel is literally a Cybersecurity powerhouse
If she's that good there's another one even better than her
I'm gonna pretend "I understood everything she said and explained.."😐
mood
I'm not even gonna pretend. I'm just reading the comments. Lol
Great job from the Insider on selecting meaty examples, and great job from the expert on having seen the movies and coming prepared with props and information about comparable hacks that really happened.
I have not even heard of some of these.
Cybersecurity sounds really cool to learn, but also really difficult to get into
It is...
Eh, setting up firewalls and authentication is easy enough. The hard part isn't the software. The hard part is keeping the human factors in check. Most hacks are done by exploiting the users.
You can have the most secure system in the world but a dumbass employee can bring it all down by accidentally leaking his login info.
Great video and nice to see so many high ratings. I'm glad movies have moved toward more realistic hacking scenes.
Only thing I'm surprised is at 10:25. Is there really access-giving keypads that makes different sounds on different digits? In phones that happens because historical reasons, but other than phones?
Wow, she explained all the things so well and in detail. Love to see more of her videos.