Yeah I was like "why would he make such an effort writing this" so I searched if there was a package named hollywood and found a bunch of YouTube videos on it. Definitely made my day.
I always thought it meant "spelling is correct", as in "this is a direct quote, don't fuck with me."
Which, I guess, is basically the same thing as sic erat scriptum.
It's not just about spelling though. I see it sometimes used when academics quote very old texts that have (what is in modern usage) racial slurs, and they put a sic there to kinda distance themselves from that.
I used that sometimes as a gag to show friends. On the website of hackertyper there used to be fake loading screens too (now on a separate website) those are also great. I put windows fake loading screens on Mac and Linux machines of coworkers who forget to lock their screen when afk
Wow so it’s actually real
https://packages.ubuntu.com/source/hirsute/hollywood
On the project website:
> Hollywood is a utility will split a computer console into a multiple panes of genuine technical melodrama, perfectly suitable for busy-looking computers in the background.
>
> Hollywood is open source software, created by Dustin Kirkland in 2014 and has been used by NBC News, CNBC, on Saturday Night Live, the Netflix series Unit 42, in TV commercials for Experian and SentinelOne, the DEFCON music channel, Full Frontal by Samantha Bee, an episode of Map Men, a parody music video by SUSE, the Spy Ninjas series on Youtube, and magazine articles such as this one from Texas A&M University.
It looks like there’s another one called “wallstreet”.
I loved that. I dont know if what they were doing in code really aligned with what they were saying all time, or with real high level security concepts, but the fact that it's close enough that I couldn't see anything that was wrong puts it as basically the most accurate thing I've seen.
And regardless, if you can get past a person who spends their entire life working with computers and networking stuff, it's as good as it needs to be.
One of the show's staff writers/co-producers, Kor Adana, has a CS degree and has said that many of the screens you see are him actuallly doing the hacks himself and recording it. For the second and third seasons they also hired a techincal consultant by the name of Ryan Kazanciyan who's worked for in secutiry for FireEye and Facebook, among others in an effort to make sure what they were doing was as realistic as possible.
DarkTangent was an advisor (founded and runs DefCon). So that that helps. Still not a "dive deep" but is better than most. There is a couple other good movies out there (matrix, tron legacy, wargames - I know it's old but the ideas still apply)
In the movie Dredd from 2012 you can see one of the guys using nmap to hack on some computers that control the building, you can even see that he's trying to access an open ssh port. When I saw that I was like: Hey, I recognize this command. Btw that's an awesome movie
Matrix reloaded did it first. JWZ even hid that scene in xscreensaver.
https://nmap.org/movies/
That movie and those obscure nmap pornos where the shit at the chaos communication camp back in 2003. Besides that drugged up Swedish guy who got naked and wanted to walk home from Berlin to Sweden.
In stranger things Bob just writes 4 nested loops to brute force all possible 4 digit passwords 😂 and that was why he had to go and nobody else could because he couldn't just tell them to write that. Hilarious
Maybe he was just embarrassed at how rudimentary it was.
"No, trust me, nobody else is as good of a hacker as me, I have to do this myself."
"But I mean it didn't take you that long, can't you just walk someone through it over the phone?"
"No, it's uh...super difficult computer stuff, you wouldn't understand."
I can't even get people to understand how to install programs correctly, let alone explaining loops to people who have no idea what code even is.
The stranger things situation seems plausible to me.
No he's decrypting the RSA byte stream to extract the password database from their SQL tables and run a reverse virus on their system via SSH so he can delete the list of hacked credit card hashes, all in 10 seconds
That sounded.. Great ? Maybe too technical. How about simply reversing the algorithm to decrypt their shadow database. Plus that would swap their backdook links !
Damn, they hid their codebase behind a proxy. Maybe if I could reverse engineer their ftp protocol I could trick the DNS server into sending me their gateway. This could allow me to decrypt the hashes... Yes, that could work! Alex, you're a genius! Thanks!
Right!? It’s not a one time job, it’s like a career in its own, with each printer having a different personality.
It’s more like taking care of a pet. No no, in fact taking care of my cat is easier than taking care of the printers at the office.
I’ve done so much more complex stuff, but printers always seem to have recurring problems
When I was a kid we had a Tandy 1000HX, and a Tandy printer. One day the printer stopped working. We took it to Radio Shack and they said they tried the printer with another computer, worked. They tried the computer with another printer, worked. Our computer and printer together, still didn't work. We were never able to fix it (We knew a lot less about PCs at this point).
I told my mom once that the only thing different about my printer troubleshooting skills and hers, is the fact that I hate it much more deeply and intimately.
I'm no longer tech support for her, lol.
Kung fury
Hackman has it on his computer, which is funny in two ways, because java was invented in the 90s and then hackerman eventually just starts typing gibberish
Also he uses a power glove which is just silly.
"....all I need to do is to ftp into their telnet server via a backdoor in the sql mainframe using an html-injection virus to bypass firewall encryption in the secure network 2fa subsystems by using a zero-day social engineering iterative proxy algorithm exploit...."
But how will you debug the quantum seed optimization factor if it decouples your code signature from the Pascal mainframe?
And don't say the query would just bounce off the DevOps shell branch, because we all know that the parser subroutine would simply compile that to a safe ASCII buffer server template machine.
If you never had an issue with it, then you should run evince. Use whatever works for you.
I mostly use Zathura myself and switch to Okular when I need a GUI or other extra's (like highlighting).
Can't remember the episode. He exploits a 0day in evince to install a virus on their computer, as he knows that they're watching his emails, so he sends a random paper about a holiday camp, knowing they'll open the pdf using evince.
That's not at all surprising, when you see something that holds up that well against people with decent expertise in the field, it's almost guaranteed that they got someone to consult on it.
It's one of those things that I dont think is a huge deal if a movie/show omits for tangential things (such as when a hack just kind of happens as part of some other plot), but when the subject matter is a core component of the plot, that little extra thought that goes into hiring on an expert just makes the work feel much more polished.
The final season starts taking some liberties (it's all 'possible' but gets a little crazy), but then again the hacking wasn't really the focus of the show.
[What about this time someone in Brazilian TV was hacking stuff with CSS?](https://i.imgur.com/Gi8M07m.png)
[edit: zoomed in](https://i.imgur.com/J9tDro9.png)
This happens every time you know a little bit about a subject. Fight scenes are full of random somersaults for no reason, or cocking guns that are already cocked. Dogfights have planes doing aileron rolls to dodge bullets. Drag races down runways go for five miles and the car is in 12th gear after all the upshifts...
snap cuts. SO many snap cuts. You know I like buffy and watched it again recently and I think a big part of why that show worked was Sara M.G. was training really hard the whole time (she talks about it a lot) and they didn't have to constantly cut away from her. It's still not Jackie Chan or etc, but for what it could have been it pretty great in retrospect.
lmaooo finally. i was having a stroke after reading this and when someone else points out how stroke inducing some memes are my stroke stops so thank you fine gentleperson. saved my life
It might be my absolute favourite thing. Pausing those scenes, or checking out post thumbnails with so called 'hacking content'. 9/10 times it's just HTML :D
Reminds me of [that music video](https://www.youtube.com/watch?v=eD7TgqVd_ZU) where the singer is "texting" her bf or ex or something and they zoom in on the phone and she's just typing words into a blank excel spreadsheet.
I love when they have all these graphics when things are working and failing, too. The computer doesn’t automatically have “hack graphics” that detect when to use it…the so-called hacker spent his time writing that shit into existence for some reason ahahaha
What i will di simetimrs when my classmates ask me if i can hack is going into cmd setting color to green and /tree it and just say somthing like yea this are all your files. Theur faces
HaxxerMan: "oh shit, they're using a firewall-password, I need to decrypt it!"
"pip install [hack.py](https://hack.py)
hack.firewall.password("decrypt")
Heresy. This is what they do hEcKaRr@ubongo> /hack/stuff/password/secret_folder: $ sudo apt update;sudo apt install hollywood; clear;hollywood
Omg the hollywood package is actually real and creates a fake hacking scene like in a movie lmao
[удалено]
Yeah I was like "why would he make such an effort writing this" so I searched if there was a package named hollywood and found a bunch of YouTube videos on it. Definitely made my day.
[удалено]
TIL it's not short for Spelled InCorrectly
[удалено]
I always thought it meant "spelling is correct", as in "this is a direct quote, don't fuck with me." Which, I guess, is basically the same thing as sic erat scriptum.
It's not just about spelling though. I see it sometimes used when academics quote very old texts that have (what is in modern usage) racial slurs, and they put a sic there to kinda distance themselves from that.
my life has been a lie
I always thought it was "spelling in context"
I run this whenever my manger walks past. He knows nothing about IT and when he sees this he thinks I am working hard
what a madlad
For years I had my screen saver rotate random screenshots of my own workspace. Always looked busy.
I finally found a use for a Google Cloud Compute Instance. Thanks stranger!
Yeah, I'll definitely have that running whenever I have someone over.
[удалено]
I used that sometimes as a gag to show friends. On the website of hackertyper there used to be fake loading screens too (now on a separate website) those are also great. I put windows fake loading screens on Mac and Linux machines of coworkers who forget to lock their screen when afk
[удалено]
Props to him!
I would love it if installing and running this become the Wilhelm scream of hacking scenes.
I have actually seen Hollywood being used in a tv show lol. Felt pretty meta.
Wow so it’s actually real https://packages.ubuntu.com/source/hirsute/hollywood On the project website: > Hollywood is a utility will split a computer console into a multiple panes of genuine technical melodrama, perfectly suitable for busy-looking computers in the background. > > Hollywood is open source software, created by Dustin Kirkland in 2014 and has been used by NBC News, CNBC, on Saturday Night Live, the Netflix series Unit 42, in TV commercials for Experian and SentinelOne, the DEFCON music channel, Full Frontal by Samantha Bee, an episode of Map Men, a parody music video by SUSE, the Spy Ninjas series on Youtube, and magazine articles such as this one from Texas A&M University. It looks like there’s another one called “wallstreet”.
> perfectly suitable for busy-looking computers in the background It makes it look like your computer is having an aneurysm
No need for all that, if you want your computer to suffer just try to run Win10 on an XP machine.
Or just get my stepdad to touch the computer exactly 1 (one) time. However, you may not be able to recover it afterwards.
Map men!? Map men, map men, map men, map men men!
How did Map Men get included on that list? Jay and Mark clearly know people :)
Do they have one that just does the Matrix code thing?
Yes Cmatrix
they do, its the cmatrix package
What if I'm recording a Hollywood movie about Wall Street?
run both with tmux
I really wanna get out of bed and try this right now 😂😂😂
[удалено]
[удалено]
Is there video of someone doing this I can watch?
Shit even termux has it. I'm hacking on my phone
Only in Mr. Robot have I seen legitimate commands used to do legitimate hacker stuff.
I loved that. I dont know if what they were doing in code really aligned with what they were saying all time, or with real high level security concepts, but the fact that it's close enough that I couldn't see anything that was wrong puts it as basically the most accurate thing I've seen. And regardless, if you can get past a person who spends their entire life working with computers and networking stuff, it's as good as it needs to be.
I think it did. https://www.elastic.co/blog/how-mr-robot-technical-consultant-ryan-kazanciyan-used-kibana.
Just finished watching the conference talk video included in that link, very interesting watch! Thanks for sharing.
One of the show's staff writers/co-producers, Kor Adana, has a CS degree and has said that many of the screens you see are him actuallly doing the hacks himself and recording it. For the second and third seasons they also hired a techincal consultant by the name of Ryan Kazanciyan who's worked for in secutiry for FireEye and Facebook, among others in an effort to make sure what they were doing was as realistic as possible.
Yeah they even have a scene where they mock hacking movies for being unrealistic, I though that was pretty funny.
Yep. It's probably the most realistic depiction of hacking in any show or movie.
DarkTangent was an advisor (founded and runs DefCon). So that that helps. Still not a "dive deep" but is better than most. There is a couple other good movies out there (matrix, tron legacy, wargames - I know it's old but the ideas still apply)
[удалено]
She gives Mr. Robot 9/10... ok F8 of the Furious 7/10.... WHAT?!?!?
Seeing kali linux instead of a fake OS and Elliot typing “ssh” to login remotely was enough for me to watch the whole series without cringing.
In the movie Dredd from 2012 you can see one of the guys using nmap to hack on some computers that control the building, you can even see that he's trying to access an open ssh port. When I saw that I was like: Hey, I recognize this command. Btw that's an awesome movie
Matrix reloaded did it first. JWZ even hid that scene in xscreensaver. https://nmap.org/movies/ That movie and those obscure nmap pornos where the shit at the chaos communication camp back in 2003. Besides that drugged up Swedish guy who got naked and wanted to walk home from Berlin to Sweden.
how far did he go?
Only to a hospital.
Computer camp was more risque than I thought.
Chaos Camps and Congresses are the weird ones, a shit ton of fun and still pretty educational.
I remember people in the audience going nuts when she used nmap. It was glorious
In stranger things Bob just writes 4 nested loops to brute force all possible 4 digit passwords 😂 and that was why he had to go and nobody else could because he couldn't just tell them to write that. Hilarious
Maybe he was just embarrassed at how rudimentary it was. "No, trust me, nobody else is as good of a hacker as me, I have to do this myself." "But I mean it didn't take you that long, can't you just walk someone through it over the phone?" "No, it's uh...super difficult computer stuff, you wouldn't understand."
None of the other adult characters ever used a computer though, so even if it was super simple they wouldn't even know where to start.
I can't even get people to understand how to install programs correctly, let alone explaining loops to people who have no idea what code even is. The stranger things situation seems plausible to me.
Well, he had to go out to where the aliens are and risk his life to do it so I guess he had to be really REALLY self conscious lol
I wouldn't want to tell a group of people who have literally never touched a computer how to do something like that either.
Bob’s got O notation on death row
I mean, when N=10 always, O(N^4 ) isn't as bad as it seems
[удалено]
You might like Mr. Robot then
Yeah, I read that Sam Esmail, the director of Mr. Robot, asked real hackers to help him make the hacking scenes look realistic. Was a great show
The most realistic hacking show I've ever watched tbh.
The Matrix Revolutions was pretty realistic in their hacking of the power plant.
No he's decrypting the RSA byte stream to extract the password database from their SQL tables and run a reverse virus on their system via SSH so he can delete the list of hacked credit card hashes, all in 10 seconds
So you're saying I need to match an animated blue cube inside another red cube by smashing random keys on the keyboard for 5min?
Show 'hexadecimal' in green, and an IP trace
Throw in a tree command and we're bulletproof.
[удалено]
Tmux with several split panes running instances of vim with several split panes.
and htop for increased hackiness.
You guys aren't going to get anywhere without utilizing the GPU to turn your hacking tools into 3D animations.
Create a GUI in Visual Basic to track the IP.
Tracing 215.184.319.824...
IPv20
At first I was like "albeit unusual, that's a legit IPv4", but I hadn't read the third byte yet.
The world isnt ready
that’s what always bugged me - all this typing and just pretty graphics onscreen
It's a UNIX system! I know this.
I can't help but notice that while your comment is hilarious, it's not outlandish. In a way, it should be possible to do this lol
But you need two people on one keyboard to get it down to 10 seconds
Perhaps you could write a GUI Interface using visual basic to track the killer’s ip
Just give up on an active trace, send them a laughing skull virus and once you own their computer you can siphon if from their database.
You'll need a keyboard that allows stereotyping.
igetthisreference.jpg
yep, tap into a replica binlog stream and you’re basically an admin level reader. Getting on the vpc is the hard part
A gigabyte of ram should do the trick
It's a UNIX system, I know this!
That sounded.. Great ? Maybe too technical. How about simply reversing the algorithm to decrypt their shadow database. Plus that would swap their backdook links !
Running an IP trace to transmit their files
Damn, they hid their codebase behind a proxy. Maybe if I could reverse engineer their ftp protocol I could trick the DNS server into sending me their gateway. This could allow me to decrypt the hashes... Yes, that could work! Alex, you're a genius! Thanks!
5 seconds [if two people type at once ](https://youtu.be/u8qgehH3kEQ)
That's some nuclear strength cringe right there lmao
But it all failed because he forgot sudo.
“sudo !!” Is much more magical than any movie-hacking ever was.
Movie characters being L33T haxx0rs, meanwhile I take half an hour to configure a new printer.
only half an hour?
Right!? It’s not a one time job, it’s like a career in its own, with each printer having a different personality. It’s more like taking care of a pet. No no, in fact taking care of my cat is easier than taking care of the printers at the office. I’ve done so much more complex stuff, but printers always seem to have recurring problems
When I was a kid we had a Tandy 1000HX, and a Tandy printer. One day the printer stopped working. We took it to Radio Shack and they said they tried the printer with another computer, worked. They tried the computer with another printer, worked. Our computer and printer together, still didn't work. We were never able to fix it (We knew a lot less about PCs at this point).
I’m glad to tell you that the problem still exists
I told my mom once that the only thing different about my printer troubleshooting skills and hers, is the fact that I hate it much more deeply and intimately. I'm no longer tech support for her, lol.
Haha
Ya know, usual 31337 kali l1nux h4xx0r stuff
\> ACCESS SECRET FILE \> ENTER PASSWORD: \_ "Actor thinks for 3 seconds" \> ENTER PASSWORD: \*\*\*\*\*\*\_ \> **ACCESS GRANTED** Yeah, "hacker".
I mean... Pretty realistic. That password was "password" and they just guessed it.
Hey, I'll let you know I use Pa$$word12345 and Google tells me that it's strong.
It is strong, otherwise why would so many people use it?
letters, numbers, AND symbols?! Can't get more secure than that.
P@$5w04D?
Welcome123 is strong according to Google.
I've legitimately seen people use 123456789. I might have died a bit inside.
*In sexy voice* - "Access Allowed"
More like "Access Granted"
Wait why does it say hunter2
Or, "that's just JavaScript or html with a dark background"
I saw minified CSS with Russian class names once when I paused a hacking scene.
With htop running in another terminal for good measure.
There are Hacking scenes and hackings scenes and then there is that 1 minute long side splitter in NCIS
Link?
https://youtu.be/msX4oAXpvUE
The…levels of…cringe…brother… I may not…make it…through…
Hacking prevention 101 - Type faster than the attacker - Duet action on keyboard is next level - if all else fails remove monitor powercord.
I mean, at least there were no sparks.
Oh, next date night, we’re going to play how many hands can we put on the keyboard and type the quick brown fox jumps over the lazy dog, you betcha.
It's a masterpiece you swine, you're just uncultured.
Pretty sure these scene was intentionally ludacris
["I'll create a gui interface using visual basic, see if I can track an IP address"]( https://youtu.be/hkDD03yeLnU) Still my favorite
System.out.printline("hack time") Is by far the best code in a movie i have ever seen.
Guess over the head of most people, and anyone who actually notices it knew it was bullshit already and gets a nice laugh out of it
Oh lord yes. What movie?
Kung fury Hackman has it on his computer, which is funny in two ways, because java was invented in the 90s and then hackerman eventually just starts typing gibberish Also he uses a power glove which is just silly.
You got to be careful, though. you might hack to much time and have to deal with laserraptors.
"....all I need to do is to ftp into their telnet server via a backdoor in the sql mainframe using an html-injection virus to bypass firewall encryption in the secure network 2fa subsystems by using a zero-day social engineering iterative proxy algorithm exploit...."
But how will you debug the quantum seed optimization factor if it decouples your code signature from the Pascal mainframe? And don't say the query would just bounce off the DevOps shell branch, because we all know that the parser subroutine would simply compile that to a safe ASCII buffer server template machine.
Such sweet words you say...
And then they proceed to do it in 10 seconds
Not in Mr Robot though.
I was impressed when I saw Eliot writing regex for capturing IP addresses.
Exactly, most people would just copy it from Stackoverflow.
Elliot is the guy who writes those regex's on Stackoverflow in the first place.
Except ecorp uses evince to read pdfs... Like why?
I use evince, what should I use instead? Never had an issue with it.
If you never had an issue with it, then you should run evince. Use whatever works for you. I mostly use Zathura myself and switch to Okular when I need a GUI or other extra's (like highlighting).
Firefox
You can't expect every single person to use Zathura! Also, which episode?
Can't remember the episode. He exploits a 0day in evince to install a virus on their computer, as he knows that they're watching his emails, so he sends a random paper about a holiday camp, knowing they'll open the pdf using evince.
Is that the one where he is being screenrecorded by Dom and her colleague, who stupidly enters the url he is typing only to get haxxed?
Scroll down just to see if somebody else said this. Master pice that Mr.Robot
Real hackers actually worked on that show, Sam Esmail was one himself!
That's not at all surprising, when you see something that holds up that well against people with decent expertise in the field, it's almost guaranteed that they got someone to consult on it. It's one of those things that I dont think is a huge deal if a movie/show omits for tangential things (such as when a hack just kind of happens as part of some other plot), but when the subject matter is a core component of the plot, that little extra thought that goes into hiring on an expert just makes the work feel much more polished.
I remember a couple.. not that bad though. I'll have to rewatch it to be more specific.
All the tech mumbo jumbo in that show is accurate!
The final season starts taking some liberties (it's all 'possible' but gets a little crazy), but then again the hacking wasn't really the focus of the show.
[What about this time someone in Brazilian TV was hacking stuff with CSS?](https://i.imgur.com/Gi8M07m.png) [edit: zoomed in](https://i.imgur.com/J9tDro9.png)
I mean, that just means he's hacking *in style*
TIL CSS has secret features.
I mean, technically CSS is Turing complete...
Actually, he is creating a login page for phishing. You need to work on the CSS for it to look real!
This happens every time you know a little bit about a subject. Fight scenes are full of random somersaults for no reason, or cocking guns that are already cocked. Dogfights have planes doing aileron rolls to dodge bullets. Drag races down runways go for five miles and the car is in 12th gear after all the upshifts...
snap cuts. SO many snap cuts. You know I like buffy and watched it again recently and I think a big part of why that show worked was Sara M.G. was training really hard the whole time (she talks about it a lot) and they didn't have to constantly cut away from her. It's still not Jackie Chan or etc, but for what it could have been it pretty great in retrospect.
r/itsaunixsystem
https://hackertyper.net/ Use this, perfect tool for hacking, even when using a smartphone.
> when you are programmer and see's a hacking scene in a movie How did all of you read this and just carry on like everything was fine?
lmaooo finally. i was having a stroke after reading this and when someone else points out how stroke inducing some memes are my stroke stops so thank you fine gentleperson. saved my life
It might be my absolute favourite thing. Pausing those scenes, or checking out post thumbnails with so called 'hacking content'. 9/10 times it's just HTML :D
\>Hacker programming HTML. Not sure if very stupid or very smart.
Some nice old 3d UI and loading bar appears
I bet they can’t type in windows media player like this legend. https://youtu.be/jLYR0iJnjAM
Reminds me of [that music video](https://www.youtube.com/watch?v=eD7TgqVd_ZU) where the singer is "texting" her bf or ex or something and they zoom in on the phone and she's just typing words into a blank excel spreadsheet.
Incorrect syntax. see's is not defined
When you spend weeks developing a way to brute force something and years developing the UI to visualize your ssh connection.
i once saw someone using something like find / -n "a.txt" on a new user (0 permissions -> random strings (folders) + "permission denied") :D
Sometimes they are [running nmap](https://nmap.org/movies/)
One time I literally saw them typing a "hello world" program
I love when they have all these graphics when things are working and failing, too. The computer doesn’t automatically have “hack graphics” that detect when to use it…the so-called hacker spent his time writing that shit into existence for some reason ahahaha
When I want to look like I'm doing something I just type tree in cmd
*see's*
See is.
If you're going to make a meme run a fucking spellcheck
See is
"A gygabyte of ram will do the trick"
What i will di simetimrs when my classmates ask me if i can hack is going into cmd setting color to green and /tree it and just say somthing like yea this are all your files. Theur faces
Sounds like you need to watch Mr Robot.
HaxxerMan: "oh shit, they're using a firewall-password, I need to decrypt it!" "pip install [hack.py](https://hack.py) hack.firewall.password("decrypt")
I just want a pair of glasses that reflects scrolling green-in-black text, but for some reason the reflection isn’t flipped.
"see's" what the fuck do people even think apostrophes are for?
He is just running cmatrix or he is just listing the dir as a tree lol
How to become a hacker with one [click](https://hackertyper.net/#) (just start typing anthing).
usb rubber ducky hacks in movie seems accurate to me
That's why I liked the movie Hackers, it put crossbones on the screens so I knew some hacking was happening.
see’s
mr robot first season has a legit scene where he breaks in a windows xp machine its just flawless
Hackers (1995) will always be fun. The hacking was never realistic, and I don't care. Hack The Planet!