{"id":26557,"date":"2020-08-23T13:51:46","date_gmt":"2020-08-23T08:21:46","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=26557"},"modified":"2020-08-23T13:53:20","modified_gmt":"2020-08-23T08:23:20","slug":"hacker-movies-that-hackers-love","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/hacker-movies-that-hackers-love\/","title":{"rendered":"Hacker movies that hackers love"},"content":{"rendered":"<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Source: by <a href=\"https:\/\/blog.f-secure.com\/author\/justjasonsattler0\/\">Jason Sattler<\/a> | F Secure<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">One reason there aren\u2019t many great movies about hacking is that there just aren\u2019t that many movies about hackers.\u00a0<a href=\"https:\/\/twitter.com\/tomituominen\" target=\"_blank\" rel=\"noopener noreferrer\">Tomi Tuominen<\/a>, Global Technical Director for F-Secure Consulting, has a theory why the art of breaking into computers rarely makes it to the big screen.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">\u201cHonestly, there are no movies that feature hacking properly, mostly because hacking rarely is something that you could visualize easily,\u201d he said. \u00a0<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Watching hacking is generally like watching paint dry for months, he says. \u00a0It\u2019s not exactly a satisfying cinematic moment to watch an evil villain finally brought to justice by clicking on a link in an email.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">For a quick thought experiment about why it\u2019s so hard to put hacking on film, think about the big hack that Tomi his colleague Timo Hirvonen\u00a0<a href=\"https:\/\/blog.f-secure.com\/hotel-room-keys-can-be-hacked\/\">revealed in 2018<\/a>. They came up with a key that could open hotel locks around the world. Neat, right?<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">The story begins with a somewhat exciting scene at\u00a0<a href=\"https:\/\/blog.f-secure.com\/podcast-popping-hotel-locks-hacking\/\">a hacker conference in Berlin<\/a>\u00a0where the pair\u2019s friend\u2019s laptop is stolen from a hotel room without a trace. Pretty good scene. Cut to more than a decade of Tomi and Timo spending their spare time figuring out every possible way that keycards cannot be hacked, until finally they figure out the one hack that works. And what do they do with this information that they spent large chunks of their lives uncovering? They go to the manufacturer so the vulnerability can be fixed.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Inspiring? Yes. But it\u2019s not exactly\u00a0<i>Casablanca<\/i>\u00a0or\u00a0<i>Scarface<\/i>.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Yet there are a few movies \u2014 and one TV show \u2014 that F-Secure\u2019s cybersecurity experts feel capture the spirit, if not always the exact technical drudgery, of hacking.<\/span><\/p>\n<p><span style=\"color: #800000; font-size: 14pt;\"><strong><span style=\"font-family: 'trebuchet ms', geneva, sans-serif;\"><em>Sneakers<\/em><\/span><\/strong><\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Principal Security Consultant\u00a0<a href=\"https:\/\/twitter.com\/0xtosh\" target=\"_blank\" rel=\"noopener noreferrer\">Tom Van de Wiele<\/a>\u00a0feels 1992\u2019s\u00a0<i>Sneakers<\/i>\u00a0illustrates a number of key concepts about hacking and penetration testing \u2014 as long as you take it with a grain of salt.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">\u201cIt shows that the success of a compromise or hack is not the result of a single tool, method or person like in most other hacker movies, but rather the result of a collective or based on the work of individuals that came before you,\u201d he said. \u201cIn addition, I think it does a good job of demonstrating the dangers of governments having access to secret backdoors or master keys, and what the risks are of having a master key to something. Especially when the master keys falls into the wrong hands.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">The film provides a Hollywood-ized depiction of social engineering, targeted surveillance, open-source information gathering, physical intrusion of buildings, intrusion detection evasion, computer hacking over the phone lines, \u201cphreaking\u201d AKA telephone hacking, access control \u201chacking\u201d and reverse engineering.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">While some of the film\u2019s tactics are realistic, Tom noted that he and his fellow red teamers at F-Secure never feel the need to invade the personal space of businesses they test, the way the hackers in Sneakers do.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">\u201cHistory has shown us that targeting employees at a company in and around their personal living space happens and is performed by foreign spies, but it is unnecessary, excessive and usually even illegal in the corporate world. Whatever the risk is of abuse or misuse caused by an employee or through their privileges can be simulated in ways that does not endanger anyone\u2019s personal lives in any way.\u201d<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">And Tom also praised the film\u2019s \u201cEaster eggs,\u201d hidden notes in that nod to cyber security sources for some of the film\u2019s plot.<\/span><\/p>\n<p><span style=\"color: #800000; font-size: 14pt;\"><strong><span style=\"font-family: 'trebuchet ms', geneva, sans-serif;\"><em>War Games<\/em><\/span><\/strong><\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\"><a href=\"https:\/\/twitter.com\/mikko\" target=\"_blank\" rel=\"noopener noreferrer\">Mikko Hypponen<\/a>\u00a0\u2014 F-Secure\u2019s Chief Research Officer \u2014 shares Tom\u2019s appreciation for the winks in Sneakers. He also enjoyed the only other film from the brains behind the Sneakers \u2014 1983\u2019s\u00a0<i>War Games<\/i>.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">\u201cThey both center on hacking, and they were written by the same writers: Walter Parkes and Lawrence Lasker,\u201d he said. \u201cIn War Games, the main character was inspired by a real-world hacker David Scott Lewis. Also, there\u2019s a math scene in Sneakers which had math calculations created for it specifically by Len Adleman. Mr. Adleman is better known as the \u2018A\u2019 from the abbreviation \u2018RSA.\u2019\u201d<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Mikko also gives an honorable mention for the realistic hacking in a movie not necessarily known for realism.<\/span><\/p>\n<p><span style=\"color: #800000; font-size: 14pt;\"><strong><span style=\"font-family: 'trebuchet ms', geneva, sans-serif;\"><em>The Matrix<\/em><\/span><\/strong><\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">\u201cMy favorite hacking scene is from The Matrix series, specifically when Trinity uses Nmap version 2.54BETA25 to find a vulnerable SSH server, and then proceeds to exploit it using the SSH1 CRC32 vulnerability. This was all very real and doable,\u201d he said. \u201cMatrix was probably the first mainstream movie to get a hacking scene so right.\u201d<\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"Trinity uses nmap in The Matrix Reloaded\" src=\"https:\/\/www.youtube.com\/embed\/0PxTAn4g20U?feature=oembed\" width=\"500\" height=\"281\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">So while you cannot freeze time to avoid bullets, you can actually exploit a vulnerable SSH server using the SSH1 CRC32 vulnerability \u2014 though you probably shouldn\u2019t try to do either.<\/span><\/p>\n<p><span style=\"color: #800000; font-size: 14pt;\"><strong><span style=\"font-family: 'trebuchet ms', geneva, sans-serif;\"><em>Hackers<\/em><\/span><\/strong><\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\"><a href=\"https:\/\/twitter.com\/AndreaBarisani\" target=\"_blank\" rel=\"noopener noreferrer\">Andrea Barisani<\/a>\u2014who hacks systems on cars, planes and ships as F-Secure\u2019s Head of Hardware Security \u2014 also puts\u00a0<i>War Games<\/i>\u00a0on his very short list of hacker cinema classics.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">And he also includes 1995\u2019s\u00a0<i>Hackers<\/i>.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Andrea says both are \u201cboth pretty realistic in terms of techniques use \u2014 except for \u2018the Gibson\u2019 in Hackers, but, hey, we all secretly want that to be true.\u201d<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Here\u2019s the \u201cHack the Gibson\u201d scene. Definitely do not try this at home.<\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"Hackers (8\/13) Movie CLIP - Hack the Gibson (1995) HD\" src=\"https:\/\/www.youtube.com\/embed\/Bmz67ErIRa4?feature=oembed\" width=\"500\" height=\"281\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">But the technical details in these films aren\u2019t what makes them stand out for Andrea.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">\u201cI tend to like such movies more for the mindset they portray rather than the tools and techniques involved,\u201d he said. \u201cHaving said that both movies feature vintage, but awesome, phone phreaking acts.\u201d<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">If you want a depiction that almost gets hacking right, a two-hour film probably won\u2019t ever be the right form for you. But a television series might be.<\/span><\/p>\n<p><span style=\"color: #800000;\"><strong><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 14pt;\"><em>Mr. Robot<\/em><\/span><\/strong><\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">\u201cIf we leave out the movies, the most realistic hacking scenes can be found on the TV series\u00a0<i>Mr. Robot<\/i>,\u201d Tomi said.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">He praised the \u201cwide range of hacking techniques\/tools\/effects\u201d shown over the course of the show\u2019s 45 episodes, which delve deep enough into hacker culture that they include a \u201cCapture the Flag\u201d competition that the show\u2019s protagonist solves in about a minute.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Hackers may be too complicated for Hollywood<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Another reason filmmakers may struggle with telling stories about hackers is that society is very conflicted about what hackers do. Like the witches in the <i>Wizard of Oz<\/i>, there are good hackers and bad hackers. And they both use similar techniques.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">\u201cThis term has been unfortunately twisted toward negative connotations, and it didn\u2019t use to be like that,\u201d Andrea.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">While the techniques hackers use may go out-of-date, Andrea feels the mindset never ages. Hackers hunt for weaknesses and depending on their inclination, they either exploit vulnerabilities or try to fix them. And Andrea believes the good that hackers do is even more relevant today than ever.<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">\u201cA good hacker cannot rely solely on tools. It\u2019s a combination of skills, mindset, motivation\u2026the tools are secondary.\u201d<\/span><\/p>\n<p><span style=\"font-family: 'trebuchet ms', geneva, sans-serif; font-size: 12pt;\">Or, as Tomi says, \u201cA\u00a0fool with a tool is still a fool. It is the mindset and persistence that matters.\u201d<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Source: by Jason Sattler | F Secure One reason there aren\u2019t many great movies about hacking is that there just aren\u2019t that many movies about hackers.\u00a0Tomi Tuominen, Global Technical Director for F-Secure Consulting, has a theory why the art of breaking into computers rarely makes it to the big screen. \u201cHonestly, there are no movies [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11970,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,9231],"tags":[13685,13687,13686],"class_list":{"0":"post-26557","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-pics-and-videos","8":"category-top-stories","9":"tag-hacker-movies","10":"tag-hacking-movies","11":"tag-movies-on-hacking"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/26557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=26557"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/26557\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media\/11970"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=26557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=26557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=26557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}