That looks like the closest to realistic hacking I’ve seen, until you get to the graphical password box that starts flashing “access granted”. None of my SSH servers have ever done that.
But, credit where credit is due, at least she’s using realistic hacking tools.
Except for that one scene in The Matrix Reloaded where we get to see actual vulnerabilities exploited.
That looks like the closest to realistic hacking I’ve seen, until you get to the graphical password box that starts flashing “access granted”. None of my SSH servers have ever done that.
But, credit where credit is due, at least she’s using realistic hacking tools.
I’m pretty sure we can do this with a bash script. Now I want it.
Be the change you want to see in the world.