Boiledbeans

Drama! Intrigue! Geekiness!

September 20, 2007

psst.. your (censored) are showing!

devadutta @ 9:37 am, GMT +0000 ( 1190281030 ) Play

First featured on screen in 1, popularly shown in 2 and claimed to have been shown in 3.
What?

1. 046674d1b96e9c2c7568ad588a4e5e4f.jpg

2.

3. 90c4039dc1803608bb2a485416242fa7.jpg

Hint: Look closely in 2 :)

Prasad , bs , ramsaravana , Abhishek , Sharath , uma , Tathagata Chatterjee , udupendra , piezocake , Mahesh Herle , Gammafunction , yaksha , Shashank “hacked” the answer. :)

2ndratequizzer got close.

The answer is nmap, a port scanning tool which can be downloaded from insecure.org. Typically, it is used by hackers (ethical or otherwise) to first find out which ports on a target machine are open.

1. Featured the Source code of nmap

2. Trinity in Matrix Reloaded using nmap to port scan and attack the “Grid System” using a well known attack called SSH1-CRC to gain access. This was even featured in a BBC news article. This is also the first Hollywood movie to show a proper hacking scene.

3. Many people claim to have seen nmap in action in this movie. Screen shots are available all around the net.


15 Responses to “psst.. your (censored) are showing!”

  1. Prasad

    nmap!


  2. jayanth
    3

    fire sale??


  3. UNIX/linux ssh prompt ?

    lame answer I know


  4. bs

    nmap


  5. nmap security scanner source code ………


  6. Abhishek
    1
    1
    2

    Nmap


  7. Sharath

    It is the ‘Fyodor’s nmap’!!!
    During the hacking scenes in all 3 movies, the hack implemented is from Fyodor’s nmap, a popular network auditing/hacking tool.


  8. uma

    pic 1 : the poster of the japanese film “battle royale” – the movie had a sequence in which the kid scrolls through Fyodor’s nmap source code in his laptop.

    pic2: unable to see the video , but i assume it should be the matrix film sequence, where lot of nmap action is featured.

    pic3 : live free or die hard,it has been claimed, that it is the first movie which shows nmap

    ans : Fyodor’s nmap


  9. Tathagata Chatterjee
    1

    Nmap, the free security scanner written by Fyoder.
    Sometimes used by unethical hackers to gain an unauthorised break-in ( “hack”) into complex and large IT networks with an intent to disable them.
    Regards,
    Tathagata Chatterjee


  10. udupendra
    4
    4
    7

    nmap.


  11. piezocake

    Fyodor’s nmap, I’d guess.


  12. Mahesh Herle

    nmap


  13. Gammafunction
    1

    NMAP security scanner.awesome question!


  14. yaksha
    1
    3

    Fyodor’s NMAP, a popular network auditing/hacking tool


  15. Shashank
    2

    realistic hacking! Or more specifically, usage of nmap.


« Previous « By the rivers of… « | » Its all in your hand.. » Next »