I’m aware of the NCIS scenes, what else you guys got?

  • slazer2au@lemmy.world
    link
    fedilink
    English
    arrow-up
    74
    ·
    4 months ago

    Hacking.

    There is no way that you keyboard danced for 12 seconds and completed a nmap scan, identified an unpatched target with a remote code execution bug, delivered the payload, pivoted to an account with the permissions you needed, and found the server running the internal application you are looking for.

    • AVincentInSpace@pawb.social
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      4 months ago

      exactly. running an nmap scan alone involves minutes on end of just sitting there, waiting for nmap to do its thing, and hoping that the network administrator doesn’t notice your computer running the most obvious port scan of all time, barge into your borrowed cubicle, and say “what the hell are you doing”

    • state_electrician@discuss.tchncs.de
      link
      fedilink
      arrow-up
      4
      ·
      4 months ago

      To be fair, that’s your personal thing, because you have knowledge about this topic. In movies and TV a crap ton of stuff is abbreviated to not bore the audience to death. Some shows portrait a certain domain more or less realistically but still take dramatic license with other things. After all, we watch this stuff to escape from reality.