I’m aware of the NCIS scenes, what else you guys got?

  • slazer2au
    link
    English
    6515 hours ago

    Hacking.

    There is no way that you keyboard danced for 12 seconds and completed a nmap scan, identified an unpatched target with a remote code execution bug, delivered the payload, pivoted to an account with the permissions you needed, and found the server running the internal application you are looking for.

    • @[email protected]
      link
      fedilink
      25 hours ago

      To be fair, that’s your personal thing, because you have knowledge about this topic. In movies and TV a crap ton of stuff is abbreviated to not bore the audience to death. Some shows portrait a certain domain more or less realistically but still take dramatic license with other things. After all, we watch this stuff to escape from reality.

    • @[email protected]
      link
      fedilink
      English
      3
      edit-2
      5 hours ago

      exactly. running an nmap scan alone involves minutes on end of just sitting there, waiting for nmap to do its thing, and hoping that the network administrator doesn’t notice your computer running the most obvious port scan of all time, barge into your borrowed cubicle, and say “what the hell are you doing”

      • slazer2au
        link
        English
        510 hours ago

        Ah legacy systems.

        All the young kids use ::1