this post was submitted on 17 Jan 2024
944 points (98.1% liked)

Programmer Humor

19623 readers
2 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 1 year ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 75 points 10 months ago (1 children)
[–] [email protected] 6 points 10 months ago

Needs more hoodie and random text and numbers being projected onto his face.

[–] [email protected] 67 points 10 months ago* (last edited 10 months ago) (3 children)

THIS ACTION IS NOT ALLOWED

> OVERRIDE

ACCESS GRANTED

[–] [email protected] 34 points 10 months ago* (last edited 10 months ago) (1 children)

No, no, first you need to reroute, to be able to patch it through, and THEN you can override the command sequence in order to exploit parallelisms at the core root interface.

[–] [email protected] 6 points 10 months ago (2 children)
[–] [email protected] 6 points 10 months ago

IDE, Sata, NVMe HDD, with an adequate PSU for the GPU. Stat!

load more comments (1 replies)
[–] [email protected] 46 points 10 months ago (11 children)

movie about hackers comes out and is extremely realistic

It's 16 hours long and mostly just of a dude sitting at a computer typing code

It bombs at the box office.

[–] [email protected] 27 points 10 months ago (2 children)

One of the funnier ones is that the matrix actually did hacking right. It was also so quick you don't notice it.

When Trinity hacks into the power station, it's legit. She checks the software version, which shows an out of date version. She then uses a known flaw in that version to reset the password.

It's the only bit of actual hacking in the movie. They obviously knew that geeks would be checking it frame by frame, so they actually did their homework on it.

[–] [email protected] 16 points 10 months ago* (last edited 10 months ago)

Hackers shows "real hacking" in the form of social engineering, dumpster diving for passwords, as well as the bit about the pay phones that, once was true if maybe not by the time the movie came out.

[–] [email protected] 4 points 10 months ago

https://lemmy.sdf.org/comment/7438870

And it was actually 0day when the production company made the scene...

[–] merc 22 points 10 months ago

Hacking is really a "montage" type activity, but is treated as something you can show in real time.

Like, imagine the A-Team building some weapon out of spare parts but you had to watch the entire build process including measuring, cutting, screwing up the cut, throwing away the part and trying again...

Or, imagine a martial arts film where the hero trains for the big fight... and you include the entire training regimen, showing them getting up at 6am each day to do sit-ups, then following the entire morning run...

Really a hacking sequence should have those zoomed-in calendars with days flipping by and getting crossed out.

If they really need the hack to be in the critical path of the action, it should only be something like:

Boss: We need to hack the satellite!
Hacker: What model is it?
Boss: It's a... let me see... KU-STRZ-4 out of Azerbaijan.
Hacker: A 4-series? We're in luck, NSA's been sitting on a exploit for that model.

Otherwise it's as stupid as:

Boss: We need to defeat Scar Killer in the Kumite tomorrow.
Soldier: I did some basic unarmed combat in boot camp, but...
Boss: You have 24 hours, get training!
Next day, the soldier is massively jacked and is throwing flip kicks etc.

[–] [email protected] 13 points 10 months ago (5 children)

I've love to watch a realistic hacker movie, because the shit that hackers get into is genuinely bonkers. For example, some white hats got all the way into Apple's inventory system and IIRC they could've disrupted all of Apple's logistics. Imagine if a black hat got into that. Or the Ukrainian hackers that got into the taxation system of the Russians and were there for a few months. Or the USAians who got into the biggest Belgian telecom and were kicked out years later by a Dutch security company.

Movies or even better TV series showing the time it takes to get into such systems would be amazing. Day 1 phishing, day 40 established beachhead, day 120 gained access to internal system X, day 121 triggered internal alarm and was nearly discovered but was able to cover up traces, etc.

Nobody watches 90 minutes of football matches. Everyone watches the highlights and that's what movies could be too.

CC BY-NC-SA 4.0

[–] merc 11 points 10 months ago (1 children)

Nobody watches 90 minutes of football matches

Um...

[–] [email protected] 4 points 10 months ago* (last edited 10 months ago) (3 children)

I guess tens of millions of people count as nobody.

Unless they don't mean American football. That Jacks the number up to probably over 1b

load more comments (3 replies)
[–] [email protected] 7 points 10 months ago (3 children)

There’s a podcast called Darknet Diaries you might like. Skip the first year or so and start after that.

load more comments (3 replies)
[–] [email protected] 5 points 10 months ago

Mr. Robot was fairly good at the realism, and even there it was mostly just good for jokes like this:

[–] [email protected] 3 points 10 months ago

I could even imagine such a movie being titled "Highlight Reel."

load more comments (1 replies)
[–] [email protected] 5 points 10 months ago* (last edited 10 months ago)

Don't forget 6 hours of digging through the garbage behind the business they want to hack.

load more comments (7 replies)
[–] [email protected] 23 points 10 months ago (2 children)

Be sure to wear a hoodie in a dark room so that you can hack faster.

[–] [email protected] 9 points 10 months ago* (last edited 10 months ago) (2 children)

Don't forget the green font.

[–] [email protected] 6 points 10 months ago

With blue lettering projected onto your face, even though it doesn't match what is on the monitor in front of you.

[–] [email protected] 5 points 10 months ago (1 children)

and it has to scroll so fast that nobody can read it.

[–] merc 3 points 10 months ago

But, make sure that if you pause it, it's part of the Linux kernel source -- the most hacker-seeming stuff out there.

[–] [email protected] 22 points 10 months ago (1 children)

sudo apt-get update

*im in!

[–] [email protected] 33 points 10 months ago (3 children)
[–] [email protected] 8 points 10 months ago* (last edited 10 months ago) (2 children)

-Esc twice

-:wq

-:q!

-kill the process

-fuck it pull the plug

-put a bomb in the power station that powers your house

-have a cosmic ray randomly bitflip vim's internal logic making it quit

[–] [email protected] 3 points 10 months ago
[–] [email protected] 2 points 10 months ago

-Good ol' C-x M-c M-butterfly

load more comments (2 replies)
[–] [email protected] 20 points 10 months ago (2 children)

Maybe we took it out of context, maybe they mean that they are logged into their own computer 😂

[–] [email protected] 3 points 10 months ago

Look, it's got full disk encryption and I'm very forgetful.

[–] [email protected] 17 points 10 months ago (1 children)

FWIW, Little known fact: Matrix 2 used real vuln (SSH CRC32) for trinity power grid hacking scene.

Even better to know: the scene was completed before the CRC32 vuln was public. So the scene used real 0day vuln...

load more comments (1 replies)
[–] Kecessa 14 points 10 months ago (1 children)

At least in Mr Robot they talk about real stuff

[–] merc 5 points 10 months ago (1 children)

Mr. Robot was the best depiction of hacking I can think of. It was fairly realistic while being entertaining too. It shows that anybody who actually wanted to be realistic in a hacking movie could do it, they just choose not to.

[–] [email protected] 3 points 10 months ago

That's because actual hacking is actually pretty boring, from an external viewpoint at least.

[–] [email protected] 12 points 10 months ago (1 children)

One of the reasons I love WarGames is that it shows the hacker character actually doing his homework to figure out the correct credentials to get into the system.

[–] [email protected] 6 points 10 months ago (3 children)

Sneakers is really good about this too. The majority of the movie shows them doing real world research and social engineering.

load more comments (3 replies)
[–] [email protected] 11 points 10 months ago (1 children)
[–] Classy 4 points 10 months ago (2 children)

For how much fun NCIS was to watch it also was such a groan whenever the "code" sequences came up

[–] [email protected] 2 points 10 months ago

Need to look busy at work? Ping -i.2 will repeatedly ping your own router. Tell your boss it’s running a diagnostic or something.

load more comments (1 replies)
[–] [email protected] 10 points 10 months ago

~~Hackers~~ Porn-Actors

[–] [email protected] 4 points 10 months ago

me when i connect to an ssh server

[–] [email protected] 3 points 10 months ago

Excuse me while I transition my terminal to green

[–] [email protected] 3 points 10 months ago

The main reason I never got into Slow Horses was its utterly ridiculous stereotype of the “computer boffin”. It was so cack-handed it was almost hard to believe.

[–] [email protected] 3 points 10 months ago

What about DJ Qualls in "The Core"?

While being interrogated in his introduction sequence, he casually folds an aluminum chewing gum wrapper, puts it to his lips and kinda whistles with it for a second, while holding a cell phone in front of his mouth. After this little public display of phreaking, he hands the cell phone over to the hero and says "Here... now you can call anywhere free for life with it".

load more comments
view more: next ›