Monday, May 19, 2003

Matrix Uses Real Exploit

""That's exactly how the fictional Trinity uses it. In a sequence that flashes on screen for a few scant seconds, the green phosphor text of Trinity's computer clearly shows Nmap being run against the IP address 10.2.2.2, and finding an open port number 22, correctly identified as the SSH service used to log into computers remotely."

"But the unexpected nod to hackerdom doesn't end there. Responding to the Nmap output , Trinity summons a program called "sshnuke" which begins "[a]ttempting to exploit SSHv1 CRC32."

Discovered in February, 2001 by security analyst Michal Zalewski, the SSH CRC-32 bug is a very real buffer overflow in a chunk of code designed to guard against cryptographic attacks on SSH version one. Properly exploited, it grants full remote access to the vulnerable machine.""

Matrix Sequel Has Hacker Cred

No comments: