From 808d6fae09c5a4d6df66b526ca74a518c8a425cb Mon Sep 17 00:00:00 2001 From: random_dude Date: Mon, 20 May 2024 15:44:59 -0400 Subject: [PATCH] popular --- 00001/popular.md | 13 +++++++++++++ 1 file changed, 13 insertions(+) create mode 100644 00001/popular.md diff --git a/00001/popular.md b/00001/popular.md new file mode 100644 index 0000000..66eb2ef --- /dev/null +++ b/00001/popular.md @@ -0,0 +1,13 @@ +In popular culture + +In The Matrix Reloaded, Trinity is seen using Nmap to access a power plant's computer system,[44] allowing Neo to "physically" break into a building. The appearance of Nmap in the film was widely discussed on Internet forums and hailed as an unusually realistic example of hacking.[45] + +Nmap and NmapFE were used in The Listening, a 2006 movie about a former NSA officer who defects and mounts a clandestine counter-listening station high in the Italian alps. + +Nmap source code can be seen in the movie Battle Royale, as well as brief views of the command line version of Nmap executing in Live Free or Die Hard and Bourne Ultimatum.[44] In 2013, Nmap continued to make appearances in movies including popular sci-fi movie Elysium. + +The film Dredd, a film adaptation of the famous Judge Dredd comics, was released in 2012 and also contains multiple Nmap scenes.[44] Nmap is used for network reconnaissance and exploitation of the slum tower network. It is even seen briefly in the movie's trailer. + +The command Nmap is widely used in the video game Hacknet, allowing to probe the network ports of a target system to hack it. + +In Snowden, Nmap is used in the aptitude test scene about 14 minutes into the movie.