CINXE.COM

Movies Featuring the Nmap Security Scanner

<!DOCTYPE html> <html lang="en"> <head> <TITLE>Movies Featuring the Nmap Security Scanner</TITLE> <META name="description" content="The Nmap Security Scanner appears in many major motion pictures and smaller films. This gallery provides screen shots and details for each movie."> <link rel="canonical" href="https://nmap.org/movies/"> <link rel="preconnect" href="https://www.youtube.com"> <link rel="stylesheet" href="/shared/css/mm.css"> <meta name="viewport" content="width=device-width,initial-scale=1"> <meta name="theme-color" content="#2A0D45"> <link rel="preload" as="image" href="/images/sitelogo.png" imagesizes="168px" imagesrcset="/images/sitelogo.png, /images/sitelogo-2x.png 2x"> <link rel="preload" as="image" href="/shared/images/nst-icons.svg"> <link rel="stylesheet" href="/shared/css/nst.css?v=2"> <script async src="/shared/js/nst.js?v=2"></script> <link rel="stylesheet" href="/shared/css/nst-foot.css?v=2" media="print" onload="this.media='all'"> <link rel="stylesheet" href="/site.css"> <!--Google Analytics Code--> <link rel="preload" href="https://www.google-analytics.com/analytics.js" as="script"> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-11009417-1', 'auto'); ga('send', 'pageview'); </script> <!--END Google Analytics Code--> <META NAME="ROBOTS" CONTENT="NOARCHIVE"> <link rel="shortcut icon" href="/shared/images/tiny-eyeicon.png" type="image/png"> </head> <body><div id="nst-wrapper"> <div id="menu"> <div class="blur"> <header id="nst-head"> <a id="menu-open" href="#menu" aria-label="Open menu"> <img width="44" height="44" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#menu"> </a> <a id="menu-close" href="#" aria-label="Close menu"> <img width="44" height="44" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#close"> </a> <a id="nst-logo" href="/" aria-label="Home page"> <img alt="Home page logo" srcset="/images/sitelogo.png, /images/sitelogo-2x.png 2x" src="/images/sitelogo.png" onerror="this.onerror=null;this.srcset=this.src" height=90 width=168></a> <nav id="nst-gnav"> <a class="nlink" href="https://nmap.org/">Nmap.org</a> <a class="nlink" href="https://npcap.com/">Npcap.com</a> <a class="nlink" href="https://seclists.org/">Seclists.org</a> <a class="nlink" href="https://sectools.org">Sectools.org</a> <a class="nlink" href="https://insecure.org/">Insecure.org</a> </nav> <form class="nst-search" id="nst-head-search" action="/search/"> <input class="nst-search-q" name="q" type="search" placeholder="Site Search"> <button class="nst-search-button" title="Search"> <img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search"> </button> </form> </header> </div> </div> <main id="nst-content"> <nav id="nst-sitenav"> <a class="nlink" href="/download.html">Download</a> <a class="nlink" href="/book/man.html">Reference Guide</a> <a class="nlink" href="/book/">Book</a> <a class="nlink" href="/docs.html">Docs</a> <a class="nlink" href="/zenmap/">Zenmap GUI</a> <a class="nlink" href="/movies/">In the Movies</a> </nav> <h1 id="intro" class="purpleheader">Nmap In The Movies</h1> <P>For reasons unknown, Hollywood has decided that Nmap is <i>the</i> tool to show whenever hacking scenes are needed. At least it is a lot more realistic than silly 3D animation approach used in many previous movies (e.g. "hacking the Gibson" on Hackers, or the much worse portrayals on Swordfish). We always like to see Nmap in the movies, so we have catalogued known instances here. <P>If you catch Nmap in another flick, please <a href="mailto:fyodor@nmap.org">mail Fyodor</a>. <P>Update (April 21, 2020): I (Fyodor) am way behind on adding new movies. Sorry about that! <P>Movie script writers, artists, and digital asset managers are also welcome to <a href="mailto:fyodor@nmap.org">email Fyodor</a> for advice. We've been pleased to help out to make a number of movies slightly more realistic and entertaining by improving the hacking scenes. <P>This page only covers movies, we have a separate page coving <a href="/nmap_inthenews.html">news articles, reviews, books, and popular culture references</a>. <h2 id="matrix" class="purpleheader">Matrix Reloaded</h2> <P>While Nmap had been used in some previous obscure movies, it was <a href="http://www.amazon.com/dp/B0000AXE8I?tag=secbks-20">The Matrix Reloaded</a> (<a href="http://en.wikipedia.org/wiki/The_Matrix_Reloaded">Wikipedia</a>, <A HREF="http://www.imdb.com/title/tt0234215/">IMDB</a>, <a href="http://www.amazon.com/dp/B0000AXE8I?tag=secbks-20">Amazon</a>) which really turned Nmap into a movie star! <P>We have all seen many movies like <A HREF="http://www.imdb.com/title/tt0113243/">Hackers</A> which pass off ridiculous 3D animated eye-candy scenes as hacking. So Fyodor <A HREF="http://seclists.org/nmap-hackers/2003/Apr-Jun/0010.html">was shocked</A> to find that Trinity does it properly in <A HREF="http://www.amazon.com/dp/B0000AXE8I?tag=secbks-20">The Matrix Reloaded</A>. Needing to hack the city power grid, she whips out <A HREF="http://nmap.org/">Nmap</A> version <A HREF="http://seclists.org/nmap-hackers/2001/Apr-Jun/0005.html">2.54BETA25</A>, uses it to find a vulnerable SSH server, and then proceeds to exploit it using the <A HREF="http://packetstormsecurity.org/advisories/bindview/adv_ssh1crc.txt">SSH1 CRC32</A> exploit from 2001. Shame on the city for being vulnerable (<A HREF="http://insecure.org/stf/neiljk.html">timing notes</A>). <P>A video of the exploit is <a href="//www.youtube.com/watch?v=0PxTAn4g20U">available on YouTube</a> or as <a href="matrix/matrix-nmap.mp4">matrix-nmap.mp4</a>. Click on the following thumbnails for higher resolution or view <A HREF="matrix/">more pictures here</A>. <div class="screens"> <a href="matrix/trinity-hacking-hd-crop-960x728.jpg"> <img width=302 height=250 src="matrix/trinity-hacking-hd-cropscale-302x250.jpg" alt="Trinity looks intently at the Nmap output on her screen"></a> <a href="matrix/trinity-nmapscreen-hd-crop-1200x728.jpg"> <img width=418 height=250 src="matrix/trinity-nmapscreen-hd-cropscale-418x250.jpg" alt="Screen shows Nmap 2.54BETA25 with port 22 open"></a> </div> <p><b>Updates:</b> <UL> <LI>News articles about the Matrix cameo: <A HREF="http://news.bbc.co.uk/1/hi/technology/3039329.stm">BBC</A>, <A HREF="http://slashdot.org/article.pl?sid=03/05/18/1416213&amp;mode=nested&amp;threshold=4&amp;commentsort=3">Slashdot</A>, <A HREF="http://www.securityfocus.com/news/4831">SecurityFocus</A>, <A HREF="http://silicon.com/roundup/500021-500018/1/4333.html">Silicon.Com</A> <LI><A HREF="http://www.jwz.org">JWZ</A> has added this cracking scene as an <A HREF="http://www.jwz.org/xscreensaver/">XScreenSaver</A> 4.10 Easter Egg - run 'xmatrix -small -crack'. <LI>Several people have submitted matrix-themed banners to the <A HREF="/nmap/nmap_propaganda.html">propaganda gallery</a>. Feel free to use any of these to link to Insecure.org - we appreciate it! <LI>The UK's Scotland Yard Computer Crime Unit and the British Computer Society have put out a <A HREF="http://web.archive.org/web/20051230150409/http://www.bcs.org/BCS/News/PressReleases/2003/May/PressReleases2003MayMatrixTricksWarning.htm">joint warning</a> that "Viewers of the new box office blockbuster 'Matrix Reloaded' should not be tempted to emulate the realistic depiction of computer hacking." Kids - don't try this at home! </UL> <h2 id="oceans8" class="purpleheader">Ocean's 8</h2> <P><a href="http://www.amazon.com/dp/B07BXB4SF5?tag=secbks-20">Ocean's 8</a> (<a href="https://en.wikipedia.org/wiki/Ocean%27s_8">Wikipedia</a>, <a href="https://www.imdb.com/title/tt5164214/">IMDB</a>, <a href="http://www.amazon.com/dp/B07BXB4SF5?tag=secbks-20">Amazon</a>) is a 2018 comedy heist film starring Sandra Bullock, Rihanna, Cate Blanchett, and Anne Hathaway that continues the series started by <a href="https://en.wikipedia.org/wiki/Ocean%27s_Eleven">Ocean's Eleven</a> in 2001. Rihanna plays the film's main hacker, Nine Ball. She uses Nmap in many scenes to compromise people and companies responsible for guarding the $150 million diamond necklace they want to steal. Nmap is normally shown in the background as context to her hacks rather than taking the leading role. <P>In this screen (<a href="oceans8/screens/oceans8-samy-video-nmap-scene-1920x804.jpg">full version</a>), Nmap is shown in the two screens on the right while they are 3D-scanning their target necklace on the left: <div class="screens"><a href="oceans8/screens/oceans8-samy-video-nmap-scene-1920x804.jpg"> <img loading="lazy" src="oceans8/screens/oceans8-samy-video-nmap-scene-th-512x400.jpg" srcset="oceans8/screens/oceans8-samy-video-nmap-scene-th-256x200.jpg 256w, oceans8/screens/oceans8-samy-video-nmap-scene-th-512x400.jpg 512w" sizes="(max-width: 400px) 256px, 512px" width=512 height=400 alt="Nmap output on Nine Ball's screen"></a> </div> <P>And here is the whole gang gathered together to (presumably) analyze their Nmap results (image is from <a href="https://www.mercurynews.com/2018/06/10/oceans-8-opens-with-franchise-best-41-5m-to-top-weekend/">The Mercury News</a>): <div class="screens"><a href="oceans8/screens/oceans8-promo-group-hacking-2048x1365.jpg"> <img loading="lazy" src="oceans8/screens/oceans8-promo-group-hacking-512w.jpg" srcset="oceans8/screens/oceans8-promo-group-hacking-256w.jpg 256w, oceans8/screens/oceans8-promo-group-hacking-512w.jpg 512w" sizes="(max-width: 400px) 256px, 512px" width=512 height=341 alt="Promotional image from Ocean's 8. Five women stare intently at side-by-side computer monitors."></a> </div> <p>Even the movie trailer has a glimpse of Nmap at 1:50: <div class="vid"><iframe width="640" height="360" src="https://www.youtube.com/embed/n5LoVcVsiSQ" title="YouTube video player" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></div> <p>For more details on the Ocean's 8 hacking scenes themselves, see <a href="https://www.youtube.com/watch?v=vycRkEk1384">security researcher Samy Kamkar's analysis</a>. <P>Congratulations to Alejandro Hernandez for being first to discover and report the Nmap scenes! <h2 id="snowden" class="purpleheader">Snowden</h2> <P>Oliver Stone's 2016 <a href="http://www.amazon.com/dp/B01LTHO65M?tag=secbks-20">Snowden</a> film (<a href="https://en.wikipedia.org/wiki/Snowden_(film)">Wikipedia</a>, <a href="http://www.imdb.com/title/tt3774114/">IMDB</a>, <a href="http://www.amazon.com/dp/B01LTHO65M?tag=secbks-20">Amazon</a>) dramatizes Edward Snowden's massive leak of classified documents revealing NSA widespread surveillance of U.S. citizens. In one early scene, Snowden is given a network security challenge at a CIA training class which is expected to take 5 to 8 hours. But with the help <a href="https://nmap.org/">Nmap</a> and a custom <a href="https://nmap.org/nsedoc/">Nmap NSE</a> script named ptest.nse, Snowden stuns the professor by completing everything in 38 minutes! Nmap's distinct tabular output is visible on other students' screens too, though we may have to wait for the 4K resolution film release to read the exact text. Here are a couple screen shots from the Nmap scenes: <div class="screens"> <a href="snowden/screenshots/snowden-film-nmap-screenshot.jpg"><img loading="lazy" src="snowden/screenshots/snowden-film-nmap-screenshot-crop-400x166.jpg" alt="Snowden's computer screen shows him running 'nmap -p1433 --script=ptest.nse' and 'sudo nmap -sP 10.14.0.0/24'" width=400 height=166></a> <a href="snowden/screenshots/trailer-nmap-screenshot.jpg"><img loading="lazy" src="snowden/screenshots/trailer-nmap-screenshot-crop-400x166.jpg" alt="Snowden's screen in the background shows Nmap output" width=400 height=166></a> </div> <p>And here is the whole trailer (with Nmap glimpse at 34 seconds in): <div class="vid"><iframe width="640" height="360" src="https://www.youtube.com/embed/QlSAiI3xMh4" title="YouTube video player" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></div> <P>Congratulations to Prabesh Thapa from Nepal for being first to discover and report the Nmap scenes! <h2 id="dredd" class="purpleheader">Dredd</h2> <P><a href="http://www.amazon.com/dp/B005LAII80?tag=secbks-20">Dredd</a> (<a href="http://en.wikipedia.org/wiki/Dredd">Wikipedia</a>, <a href="http://www.imdb.com/title/tt1343727/">IMDB</a>, <a href="http://www.amazon.com/dp/B005LAII80?tag=secbks-20">Amazon</a>), a film adaptation of the famous <a href="http://en.wikipedia.org/wiki/Judge_Dredd">Judge Dredd comics</a>, was released in 2012 and contains multiple Nmap scenes. <P>In the vast, post-apocalyptic metropolis of Mega City One, the only law is provided by the Judges of the Hall of Justice&mdash;cops with the power of judge, jury and executioner. Most feared among these law-keepers is the ruthless and implacable Judge Dredd (<a href="http://www.imdb.com/name/nm0881631/">Karl Urban</a>). He and Cadet Judge Cassandra Anderson (<a href="http://www.imdb.com/name/nm1880888/">Olivia Thirlby</a>) infiltrate a notorious high-rise slum tower controlled by former prostitute-turned-drug-lord Ma-Ma (<a href="http://www.imdb.com/name/nm0372176/">Lena Headey</a>). For network reconnaissance and exploitation of the slum tower network, they turn to Nmap! The <a href="//youtu.be/PifvRiHVSCY">three minute movie trailer</a> briefly shows an Nmap <a href="http://nmap.org/book/vscan.html">version scan</a> against TCP port 22 (<a href="http://en.wikipedia.org/wiki/Secure_Shell">SSH</a>): <div class="screens"> <a href="dredd/dredd-nmap-trailer-screenshot-1589x805.jpg"><img loading="lazy" src="dredd/dredd-nmap-trailer-screenshot-400x200.jpg" alt="Clan Techie views a large computer screen with Nmap output in one window." width=400 height=200></a> <a href="dredd/dredd-nmap-movie-screenshot-1280x536.jpg"><img loading="lazy" src="dredd/dredd-nmap-movie-screenshot-crop-400x200.jpg" alt="Close-up of Nmap output showing version detection of OpenSSH" width=400 height=200></a> </div> <P>Congratulations to Aleksei Usov for being first to discover and report the Nmap scenes! <h2 id="elysium" class="purpleheader">Elysium</h2> <P>The 2013 science-fiction film <a href="http://www.amazon.com/dp/B008JFUN6E?tag=secbks-20">Elysium</a> (<a href="http://en.wikipedia.org/wiki/Elysium_(film)">Wikipedia</a>, <a href="http://www.imdb.com/title/tt1535108/">IMDB</a>, <a href="http://www.amazon.com/dp/B008JFUN6E?tag=secbks-20">Amazon</a>) stars <a href="http://en.wikipedia.org/wiki/Matt_Damon">Matt Damon</a> and <a href="http://en.wikipedia.org/wiki/Jodie_Foster">Jodie Foster</a>. It takes us to the year 2154 when an overpopulated Earth teems with poverty, crime, and destruction while the rich live on a luxurious space station. Nmap version 13 (I guess this really is the future!) is used to port scan Matt Damon's augmented brain before transferring the data he carries in an attempt to hack the space station. <p>Nmap action: <div class="screens"><a href="elysium/elysium-nmap-screenshot-720x400.jpg"><img loading="lazy" src="elysium/elysium-nmap-screenshot-530x240.jpg" alt="Close-up of computer screen with Nmap output showing 443/udp open" width=530 height=240></a> </div> <p>Trailer: <div class="vid"><iframe width="560" height="315" src="https://www.youtube.com/embed/oIBtePb-dGY" title="YouTube video player" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></div> <P>Congratulations to Tavis Ormandy and Andr茅 Luna for discovering the Nmap scenes first. <h2 id="fantastic4" class="purpleheader">Fantastic Four</h2> <P><a href="http://www.amazon.com/dp/B013JPCA1Y?tag=secbks-20">Fantastic Four</a> (<a href="https://en.wikipedia.org/wiki/Fantastic_Four_(2015_film)">Wikipedia</a>, <a href="http://www.imdb.com/title/tt1502712/">IMDB</a>, <a href="http://www.amazon.com/dp/B013JPCA1Y?tag=secbks-20">Amazon</a>) is a 2015 big-budget superhero film based on the Marvel Comics team of the same name. In the film, Sue Storm (played by <a href="http://www.imdb.com/name/nm0544718/">Kate Mara</a>) uses her Nmap skills to track down a companion. Her computer flashes "IPSCAN", then "TRACEROUTE", "PORTSCAN", and finally "NMAP". Screen shots (click the 2nd one to see the wider shot): <div class="screens"> <a href="fantastic4/fantastic-four-kate-mara-hacking-720x298.jpg"><img loading="lazy" src="fantastic4/fantastic-four-kate-mara-hacking-400x160.jpg" alt="Sue Storm focuses intently on her Nmap command line" width=400 height=160></a> <a href="fantastic4/fantastic-four-nmap-scene-720x288.jpg"><img loading="lazy" src="fantastic4/fantastic-four-nmap-zoom-273.160.jpg" alt="Futuristic computer screen reads 'NMAP' across the top." width=400 height=160></a> </div> <p>Trailer: <div class="vid"><iframe width="560" height="360" src="https://www.youtube.com/embed/Qc6EYDZovPQ" title="YouTube video player" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></div> <P>Congratulations to grmlber for being the first to notice and report it! <h2 id="whoami" class="purpleheader">Who Am I&mdash;No System Is Safe</h2> <P><a href="http://www.amazon.com/dp/B00NW8C1GS?tag=secbks-20">Who Am I&mdash;No System is Safe</a> (<a href="https://en.wikipedia.org/wiki/Who_Am_I_%E2%80%93_No_System_Is_Safe">Wikipedia</a>, <a href="http://www.imdb.com/title/tt3042408/">IMDB</a>, <a href="http://www.amazon.com/dp/B00NW8C1GS?tag=secbks-20">Amazon</a>) is a 2014 German cyber-thriller about dueling hacker groups (patterned after Anonymous) vying to commit the most audacious system compromises and pranks. During an initiation scene 13:40 into the movie, the protagonist Benjamin proves his skills by compromising the local power company and causing a brief blackout. He does so by running an <a href="http://nmap.org/book/nse.html">Nmap Scripting Engine (NSE)</a> script that he has presumably written. The script is named iec-backdoor.nse, referencing the <a href="https://en.wikipedia.org/wiki/International_Electrotechnical_Commission">International Electrotechnical Commission (IEC)</a> standards which control utility power grid equipment. This bit of realism is a nice touch! Screen shots: <div class="screens"> <a href="whoami/whoami-nmap-groupscene-1365x565.jpg"><img loading="lazy" src="whoami/whoami-nmap-groupscene-400x166.jpg" alt="Benjamin hacks with Nmap" width=400 height=166></a> <a href="whoami/whoami-nmap-commandscreen-1365x565.jpg"><img loading="lazy" src="whoami/whoami-nmap-commandscreen-400x166.jpg" alt="Computer screen shows 'nmap -p6777 --script=iec-backdoor.nse'" width=400 height=166></a> </div> <p>Trailer: <div class="vid"><iframe width="640" height="360" src="https://www.youtube.com/embed/5vnjheCqRIs" title="YouTube video player" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></div> <P>Congratulations to Edko for being the first to notice and report it, and Thomas Zuber for sending the first screenshot! <h2 id="bourne" class="purpleheader">Bourne Ultimatum</h2> <P>In <a href="http://www.amazon.com/dp/B000VWYJ86?tag=secbks-20">The Bourne Ultimatum</a> (<a href="http://en.wikipedia.org/wiki/The_Bourne_Ultimatum_(film)">Wikipedia</a>, <a href="http://imdb.com/title/tt0440963/">IMDB</a>, <a href="http://www.amazon.com/dp/B000VWYJ86?tag=secbks-20">Amazon</a>), the CIA needs to hack the mail server of a newspaper (<a href="http://www.guardian.co.uk/">The Guardian UK</a>) to read the email of a reporter they assassinated. So they turn to <a href="http://nmap.org/">Nmap</a> and its new official GUI <a href="http://nmap.org/zenmap/">Zenmap</a> to hack the mail server! Nmap reports that the mail server is running SSH 3.9p1, Posfix smtpd, and a name server (presumably bind). They also make substantial use of <a href="http://en.wikipedia.org/wiki/Bash">Bash, the Bourne-again shell</a>. Congratulations to Roger Chui for being the first to spot this. He also sent a <a href="/nmap/misc/bourne-transcript.html">scene transcript</a> and the following HD screen shots (click for full resolution): <div class="screens"> <a href="bourne/bourne-nmap-1.jpg"><img loading="lazy" width=400 height=250 src="bourne/bourne-nmap-crop-400x250.jpg" alt="UMIT (now Zenmap) screen shown behind several Bash terminals"></a> <a href="bourne/bourne-nmap-2.jpg"><img loading="lazy" width=400 height=250 src="bourne/bourne-nmap-2-cropscale-400x250.jpg" alt="The Zenmap screen is shown on a projector behind the characters."></a> </div> <h2 id="diehard4" class="purpleheader">Die Hard 4</h2> <P>Yippee Ki-Yay! <a href="http://www.amazon.com/dp/B000VNMMR0?tag=secbks-20">In Die Hard 4: Live Free or Die Hard</a> (<a href="http://en.wikipedia.org/wiki/Die_hard_4">Wikipedia</a>, <a href="http://www.imdb.com/title/tt0337978/">IMDB</a>, <a href="http://www.amazon.com/dp/B000VNMMR0?tag=secbks-20">Amazon</a>), Detective John McClane (Bruce Willis) is dispatched to retrieve hacker Matthew Farrell (Justin Long) because the FBI suspects him of breaching their computer systems. Later, Justin is enlisted to help thwart terrorist mastermind Thomas Gabrial's attempts at total World destruction. In this Scene, Farrell demonstrates his Nmap skills: <div class="screens"> <img loading="lazy" width=320 height=415 src="diehard4/nmap-diehard4-1080p-crop-320x415.jpg" alt="Close-up of Nmap being used to scan insecure.org, scanme.nmap.org, and sectools.org with the -A option"> <a href="diehard4/nmap-diehard4-1080p-1920x801.jpg"><img loading="lazy" width=662 height=415 src="diehard4/nmap-diehard4-1080p-cropscale-662x415.jpg" alt="Farrell's screen shows Nmap and a chat with 'WAR10CK'"></a> </div> <p>Thanks to Andrew Hake for catching the cameo and sending <a href="diehard4/">these</a> HD screen shots.The scene occurs about 8 minutes into the movie. <h2 id="gwtdt" class="purpleheader">The Girl with the Dragon Tattoo</h2> <P><a href="http://www.amazon.com/dp/B003FBNJ4U?tag=secbks-20">The Girl with the Dragon Tattoo</a> (Swedish: M盲n som hatar kvinnor) is a 2009 Swedish thriller film (<a href="http://en.wikipedia.org/wiki/The_Girl_with_the_Dragon_Tattoo_%28film%29">Wikipedia</a>, <a href="http://www.imdb.com/title/tt1132620/">IMDB</a>, <a href="http://www.amazon.com/dp/B003FBNJ4U?tag=secbks-20">Amazon</a>) based on the <a href="http://www.amazon.com/dp/0307454541?tag=secbks-20">Internationally bestselling novel</a> by Stieg Larsson. It follows Lisbeth, a troubled young hacker suffering from Asperger syndrome and a history of abuse by authority figures, as she works with a journalist trying to solve a 40-year old murder mystery. It was the third-highest grossing non-English film of 2009. <P>The Nmap scene lasts only moments and occurs about 6 minutes in. Note that this is the original film (<a href="http://www.amazon.com/dp/B003FBNJ4U?tag=secbks-20">English subtitled version available on Amazon</a>). A big-budget Hollywood remake was released in 2011 (<a href="http://www.imdb.com/title/tt1568346/">IMDB</a>, <a href="http://en.wikipedia.org/wiki/The_Girl_with_the_Dragon_Tattoo_%282011_film%29">Wikipedia</a>, <a href="http://www.amazon.com/dp/B003Y5H5HY?tag=secbks-20">Amazon</a>), though they may have ruined it by cutting the Nmap scene! <div class="screens"> <a href="gwtdt/lisbeth-phone-1545x652.jpg"><img loading="lazy" src="gwtdt/lisbeth-phone-crop-218x164.jpg" alt="Lisbeth makes a call." width=218 height=164></a> <a href="gwtdt/gwtdt-nmap-screen.jpg"><img loading="lazy" src="gwtdt/gwtdt-nmap-crop-353x164.jpg" alt="Nmap scan progress indications scroll across the screen." width=353 height=164></a> </div> <P>Trailer for the 2010 US/UK subtitled release: <div class="vid"><iframe width="640" height="360" src="https://www.youtube.com/embed/rIrjgFphVIc" title="YouTube video player" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></div> <h2 id="gijoe" class="purpleheader">G.I. Joe: Retaliation</h2> <P>Nmap is used to launch nuclear weapons in the 2013 action film <a href="http://www.amazon.com/dp/B00C28J2VQ?tag=secbks-20">G.I. Joe: Retaliation</a> (<a href="http://en.wikipedia.org/wiki/G.I._Joe:_Retaliation">Wikipedia</a>, <a href="http://www.imdb.com/title/tt1583421/">IMDB</a>, <a href="http://www.amazon.com/dp/B00C28J2VQ?tag=secbks-20">Amazon</a>). While their syntax is a little screwy, they seem to scan a missile silo with Nmap, ssh to each located ICBM, su to root and then execute commands to arm and launch it. Here are screen shots followed by the movie trailer: <div class="screens"> <a href="gijoe/gijoe-retaliation-nmap-screenshot1-1920x800.jpg"><img loading="lazy" src="gijoe/gijoe-retaliation-nmap-screenshot1-600x325.jpg" alt="Computer screen reads 'NMAP RUN COMPLETED'" width=600 height=325></a> <a href="gijoe/gijoe-retaliation-nmap-screenshot2-1920x800.jpg"><img loading="lazy" src="gijoe/gijoe-retaliation-nmap-screenshot2-600x277.jpg" alt="Wider shot shows the same screen with images of missiles behind it." width=600 height=277></a> </div> <div class="vid"><iframe width="640" height="360" src="https://www.youtube.com/embed/7Wj1qyxaQMc" title="YouTube video player" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></div> <P>Thanks to Dillon Korman for catching the scene and sending screenshots! <h2 id="listening" class="purpleheader">The Listening</h2> <P>Nmap and NmapFE were used in <a href="http://www.amazon.com/dp/B000VLOKT0?tag=secbks-20">The Listening</a> (<a href="http://en.wikipedia.org/wiki/The_Listening_(film)">Wikipedia</a>, <a href="http://www.imdb.com/title/tt0427461/">IMDB</a>, <a href="http://www.amazon.com/dp/B000VLOKT0?tag=secbks-20">Amazon</a>), a 2006 movie about a former NSA officer who defects and mounts a clandestine counter-listening station high in the Italian alps. Thanks to Addy Yeow Chin Heng for the <a href="listening/">screenshots</a>. <div class="screens"> <a href="listening/2.jpg"><img loading="lazy" src="listening/2-400w.jpg" alt="NmapFE screen shows 213.156.54.80 targeted with SYN Stealth Scan" width=400 height=170></a> <a href="listening/7.jpg"><img loading="lazy" src="listening/7-400w.jpg" alt="Nmap scan output shows ports 25 and 80 open" width=400 height=170></a> </div> <h2 id="justiceleague" class="purpleheader">Justice League: Doom</h2> <P>Nmap is used in the opening credits of <a href="http://www.amazon.com/dp/B005SH63KG?tag=secbks-20">Justice League: Doom</a> (<a href="http://en.wikipedia.org/wiki/Justice_League:_Doom">Wikipedia</a>, <a href="http://www.imdb.com/title/tt2027128/">IMDB</a>, <a href="http://www.amazon.com/dp/B005SH63KG?tag=secbks-20">Amazon</a>). This 2012 animated superhero film features Batman, Superman, Wonder Woman, and Green Lantern battling a team of supervillains. Thanks to Spencer Davenport for catching this and sending <A HREF="justiceleague/">screenshots</a>. It is interesting that in most cases (but not all), they changed the Nmap URL (http://nmap.org) in the Nmap output to http://we.inc (Wayne Enterprises). Also, they ran the command in August 2011 using a version of Nmap (4.20) from 2006. I realize that Batman has a lot of important and heroic work to do, but surely he can spare 5 minutes to download and install the <a href="http://nmap.org/download.html">latest version of Nmap</a>! <div class="screens"> <a href="http://www.amazon.com/dp/b005sh63kg?tag=secbks-20"><img loading="lazy" src="justiceleague/justice-league-doom-cover-187x267.jpg" alt="Cover art for Justice League: Doom" width=187 height=267></a> <a href="justiceleague/justice-league-doom-nmap-screen1.jpg"><img loading="lazy" src="justiceleague/justice-league-doom-nmap-screen1-thumb-650x267.jpg" alt="Batman runs Nmap on the Wayne Enterprise Mainframe." width=650 height=267></a> </div> <h2 id="abduction" class="purpleheader">Abduction</h2> <P><a href="http://www.amazon.com/dp/B00682LS96?tag=secbks-20">Abduction</a> (<a href="http://en.wikipedia.org/wiki/Abduction_%282011_film%29">Wikipedia</a>, <a href="http://www.imdb.com/title/tt1600195/">IMDB</a>, <a href="http://www.amazon.com/dp/B00682LS96?tag=secbks-20">Amazon</a>) is a 2011 thriller about a teenager (Taylor Lautner from the Twilight series) who sets out to uncover the truth about his life after finding his baby photo on a missing persons website. In the process he is chased by, among other villians, an Nmap-using Serbian hacker henchman. If you notice something familiar about the background Nmap scans in the screenshots below, it's because the film makers directly cribbed some of them from <a href="#matrix">The Matrix Reloaded</a>. <div class="screens"> <a href="abduction/Abduction-Nmap-1920x800.jpg"><img loading="lazy" src="abduction/Abduction-Nmap-Thumbnail-400x200.jpg" alt="Nmap screenshot from The Matrix Reloaded seen over the shoulder of a hacker" width=400 height=200></a> <a href="abduction/Abduction-Nmap-Screen-1920x800.jpg"><img loading="lazy" src="abduction/Abduction-Nmap-Screen-Thumbnail-400x200.jpg" alt="Nmap output scrolls past a security video feed." width=400 height=200></a> </div> <h2 id="extracted" class="purpleheader">Extracted</h2> <P>The 2012 science fiction thriller <a href="http://www.amazon.com/dp/B00DPH7QPM?tag=secbks-20">Extracted</a> (<a href="http://www.imdb.com/title/tt1757746/">IMDB</a>, <a href="http://www.amazon.com/dp/B00DPH7QPM?tag=secbks-20">Amazon</a>) portrays a scientist who invents a technique to watch people's memories, but finds trouble when entering the mind of a heroin addict suspected of murder. Nmap is used as part of the system for entering someone's mind (maybe that is an NSE script). Screen shot (click for the whole thing): <div class="screens"><a href="extracted/extracted-nmap-clip.jpg"><img loading="lazy" src="extracted/extracted-nmap-clip-crop-400x200.jpg" alt="Output of 'nmap 127.0.0.1' on a background window." width=400 height=200></a> </div> <p>A trailer is also <a href="http://www.imdb.com/video/imdb/vi3430983449/">available here</a>. Thanks to Sander Ferdinand for discovering and reporting the Nmap scene. <h2 id="13game" class="purpleheader">13: Game of Death</h2> <P>Nmap was used in the acclaimed Thai thriller <a href="http://www.amazon.com/dp/B00118T61O?tag=secbks-20">13: Game of Death</a> (<a href="http://en.wikipedia.org/wiki/13_Beloved">Wikipedia</a>, <a href="http://www.imdb.com/title/tt0883995/">IMDB</a>, <a href="http://www.amazon.com/dp/B00118T61O?tag=secbks-20">Amazon</a>), also known as "13 Beloved" and "13 game sayawng". This movie follows the story of a man given the chance to complete 13 challenges to win $100,000,000. Successive challenges become increasingly intense, dangerous, illegal, degrading, and grotesque. What would you do for $100 million? Eventually one of his sysadmin friends gets worried about him and she demonstrates Nmap hacking skills by breaking into the twisted game's website (<a href="misc/13game-summary.html">longer summary</a>). <p>We have received an <a href="13game/13gameofdeath-nmap.avi">AVI video (5MB)</a> of the scene, and also <a href="13game/">numerous screenshots</a>. <div class="screens"> <a href="13game/hacker-girl.jpg"><img loading="lazy" width=341 height=250 src="13game/hacker-girl-cropscale-341x250.jpg" alt="Tong uses Nmap to hack the 13 game."></a> <a href="13game/nmapscreen-1.jpg"><img loading="lazy" width=465 height=250 src="13game/nmapscreen-1-cropscale-465x250.jpg" alt="Windows version of Nmap used to scan TCP and UDP ports."></a> </div> <p>Thanks to Tazman for first notifying me of the scene, and to Laga Mahesa and Ithilgore for sending screenshots. <h2 id="battleroyale" class="purpleheader">Battle Royale</h2> <p><a href="http://www.amazon.com/dp/B000F4LPJ6?tag=secbks-20">Battle Royale</a> (<a href="http://en.wikipedia.org/wiki/Battle_Royale_%28film%29">Wikipedia</a>, <a href="http://www.imdb.com/title/tt0266308/">IMDB</a>, <a href="http://www.amazon.com/dp/B000F4LPJ6?tag=secbks-20">Amazon</a>), also known as Batoru Rowaiaru, is a bizarre and controversial Japanese movie about a class of 9th graders sent by the government to an abandoned island to be fitted with explosive collars and forced to kill each as part of a twisted survival game. One of the students is a hacker, and can be seen referencing Nmap source code in these clips: <div class="screens"><img loading="lazy" src="matrix/Battle-Royale-Nmap-1-344x214.jpg" alt="Shinji Mimura types green-on-black text with a laptop." width=344 height=214> <img loading="lazy" src="matrix/Battle-Royale-Nmap-2-344x214.jpg" alt="Close-up of Nmap source code and comments" width=344 height=214> </div> <h2 id="brokensaints" class="purpleheader">Broken Saints</h2> <P><a href="http://www.amazon.com/dp/B000FKO3RQ?tag=secbks-20">Broken Saints</a> (<a href="http://en.wikipedia.org/wiki/Broken_Saints">Wikipedia</a>, <a href="http://www.imdb.com/title/tt0451002/">IMDB</a>, <a href="http://www.amazon.com/dp/B000FKO3RQ?tag=secbks-20">Amazon</a>) is an award-winning animated film series (<a href="http://en.wikipedia.org/wiki/Motion_comic">motion comic</a>) produced in 24 chapters first published online between 2001 and 2003. It was then improved for the <a href="http://www.amazon.com/dp/B000FKO3RQ?tag=secbks-20">2006 DVD release</a> distributed by 20th Century Fox. It is a complex, 12-hour tale of four strangers from "the quiet corners of the globe" connected by a vision they all receive of coming evil. <P>One of those four strangers, Raimi, is a young security software developer who uses Nmap to compromise systems and uncover corporate treachery at his estranged employer. The Nmap Scene is in Chapter 2, <i>Cryptic</i>, and can be <a href="//www.youtube.com/user/brokensaint#p/u/26/bY1xbDm-tyE">viewed free on Youtube</a>. You don't really need to watch Chapter 1 first, but it is <a href="//www.youtube.com/user/brokensaint#p/u/28/JxE9EODS588">available here</a>. The Nmap cameo was first discovered by David Alexander. Screenshots: <div class="screens"> <a href="brokensaints/brokensaints-screen2.jpg"><img loading="lazy" width=400 height=246 src="brokensaints/brokensaints-screen2-sm.jpg" alt="Raimi sits in front of 7 computer screens."></a> <a href="brokensaints/brokensaints-screen-nmap.jpg"><img loading="lazy" width=400 height=246 src="brokensaints/brokensaints-screen-nmap-sm.jpg" alt="Output of 'nmap -O -sS biocom'"></a> <a href="brokensaints/brokensaints-screen1.jpg"><img loading="lazy" width=400 height=246 src="brokensaints/brokensaints-screen1-sm.jpg" alt="Side view of Raimi and his screens."></a> </div> <h2 id="khottabych" class="purpleheader">Khottabych</h2> <P>Nmap (and then telnet) are used by a teenage hacker (Gena) to deface Microsoft.Com in the 2006 Russian film Khottabych (<a href="http://en.wikipedia.org/wiki/Khottabych">Wikipedia</a>, <a href="http://www.imdb.com/title/tt0466043/">IMDB</a>). Microsoft and the US authorities are understandably upset by the attack, so they send the attractive female hacker Annie to flush him out. The movie also features an epic battle between powerful genies (the kind which come in a bottle) fighting for dominion over Earth. Thanks to Paul Shatov for notifying us and sending the <a href="khottabych/all/">screenshots</a>! I bought <a href="http://www.amazon.com/dp/B000OIR8A8?tag=secbks-20">this DVD from Amazon</a>, but it is region 5 and offers no English dubbing or subtitles. I had to use <a href="khottabych/khottabych.srt">this subtitle file</a>. Wikipedia claims that a region 1 English DVD was released. <div class="screens"> <a href="khottabych/gena-hacking-720x368.jpg"><img loading="lazy" width=360 height=184 src="khottabych/gena-hacking-360x184.jpg" alt="Gena sits alone and hacks."></a> <a href="khottabych/annie-720x368.jpg"><img loading="lazy" width=360 height=184 src="khottabych/annie-360x184.jpg" alt="Annie probably has the Nmap man page memorized."></a> <a href="khottabych/nmap-ms-hack-720x368.jpg"><img loading="lazy" width=360 height=184 src="khottabych/nmap-ms-hack-360x184.jpg" alt="Nmap 4.03 output with several typos"></a> <a href="khottabych/telnet-ms-hack-720x368.jpg"><img loading="lazy" width=360 height=184 src="khottabych/telnet-ms-hack-360x184.jpg" alt="Telnet login as root to microsoft.com"></a> </div> <h2 id="haxxxor" class="purpleheader">HaXXXor: No Longer Floppy</h2> <p>With the risque "HaXXXor" series of low-budget films, Nmap makes the leap from Science fiction to soft-core pornography. &ldquo;HaXXXor Volume 1: No Longer Floppy&rdquo; includes a lengthy Nmap training scene by model E-Lita. Here are some photos from early in the scene while she is still clothed: <div class="screens"> <a href="haxxxor/ss/Elita-Stare.jpg"><img loading="lazy" width=200 height=150 src="haxxxor/ss/thumbs/thumb_Elita-Stare.jpg" alt="E-Lita puts her boots up on a stereo."></a> <a href="haxxxor/ss/Elita-mpg-url.jpg"><img loading="lazy" width=225 height=150 src="haxxxor/ss/thumbs/thumb_Elita-mpg-url.jpg" alt="On-screen text reads 'www.insecure.org/nmap'"></a> <a href="haxxxor/ss/Elita-mpg-compile.jpg"><img loading="lazy" width=225 height=150 src="haxxxor/ss/thumbs/thumb_Elita-mpg-compile.jpg" alt="On-screen text reads 'configure; make; make install'"></a> </div> <h2 id="bloodymonday" class="purpleheader">Bloody Monday</h2> <P>In the Japanese drama series <a href="http://wiki.d-addicts.com/Bloody_Monday">Bloody Monday</a>, a hacker named Falcon must use his computer skills to unravel a mysterious project &ldquo;Bloody Monday&rdquo; and prevent a biological terrorist attack from devastating Tokyo. Nmap is used in multiple episodes, starting with Season One, Episode One. You can also find Nmap used about 20 seconds into <a href="http://www.wat.tv/video/b4b-28co1_2jvup_.html">this clip</a> (Season 2, Episode 4). Other security tools <a href="bloodymonday/bm-sadmind.jpg">portrayed realistically</a> include Netcat, Rainbow Crack, and an Sadmind exploit. Thanks to Shirase Akira for reporting this first. <div class="screens"> <a href="bloodymonday/bm-cover.jpg"><img loading="lazy" width=214 height=300 src="bloodymonday/bm-cover-214x300.jpg" alt="Cover art for Bloody Monday"></a> <a href="bloodymonday/bm-screen-nmap-dskw.jpg"><img loading="lazy" width=533 height=300 src="bloodymonday/bm-screen-nmap-dskw-533x300.jpg" alt="Nmap 4.62 shows ports 21, 25, and 80 open."></a> </div> </main><!-- content --> <footer id="nst-foot"> <form class="nst-search" id="nst-foot-search" action="/search/"> <input class="nst-search-q" name="q" type="search" placeholder="Site Search"> <button class="nst-search-button" title="Search"> <img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search"> </button> </form> <div class="flexlists"> <div class="fl-unit"> <h2><a class="nlink" href="https://nmap.org/">Nmap Security Scanner</a></h2> <ul> <li><a class="nlink" href="https://nmap.org/book/man.html">Ref Guide</a> <li><a class="nlink" href="https://nmap.org/book/install.html">Install Guide</a> <li><a class="nlink" href="https://nmap.org/docs.html">Docs</a> <li><a class="nlink" href="https://nmap.org/download.html">Download</a> <li><a class="nlink" href="https://nmap.org/oem/">Nmap OEM</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://npcap.com/">Npcap packet capture</a></h2> <ul> <li><a class="nlink" href="https://npcap.com/guide/">User's Guide</a> <li><a class="nlink" href="https://npcap.com/guide/npcap-devguide.html#npcap-api">API docs</a> <li><a class="nlink" href="https://npcap.com/#download">Download</a> <li><a class="nlink" href="https://npcap.com/oem/">Npcap OEM</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://seclists.org/">Security Lists</a></h2> <ul> <li><a class="nlink" href="https://seclists.org/nmap-announce/">Nmap Announce</a> <li><a class="nlink" href="https://seclists.org/nmap-dev/">Nmap Dev</a> <li><a class="nlink" href="https://seclists.org/fulldisclosure/">Full Disclosure</a> <li><a class="nlink" href="https://seclists.org/oss-sec/">Open Source Security</a> <li><a class="nlink" href="https://seclists.org/dataloss/">BreachExchange</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://sectools.org">Security Tools</a></h2> <ul> <li><a class="nlink" href="https://sectools.org/tag/vuln-scanners/">Vuln scanners</a> <li><a class="nlink" href="https://sectools.org/tag/pass-audit/">Password audit</a> <li><a class="nlink" href="https://sectools.org/tag/web-scanners/">Web scanners</a> <li><a class="nlink" href="https://sectools.org/tag/wireless/">Wireless</a> <li><a class="nlink" href="https://sectools.org/tag/sploits/">Exploitation</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://insecure.org/">About</a></h2> <ul> <li><a class="nlink" href="https://insecure.org/fyodor/">About/Contact</a> <li><a class="nlink" href="https://insecure.org/privacy.html">Privacy</a> <li><a class="nlink" href="https://insecure.org/advertising.html">Advertising</a> <li><a class="nlink" href="https://nmap.org/npsl/">Nmap Public Source License</a> </ul> </div> <div class="fl-unit social-links"> <a class="nlink" href="https://twitter.com/nmap" title="Visit us on Twitter"> <img width="32" height="32" src="/shared/images/nst-icons.svg#twitter" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://facebook.com/nmap" title="Visit us on Facebook"> <img width="32" height="32" src="/shared/images/nst-icons.svg#facebook" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://github.com/nmap/" title="Visit us on Github"> <img width="32" height="32" src="/shared/images/nst-icons.svg#github" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://reddit.com/r/nmap/" title="Discuss Nmap on Reddit"> <img width="32" height="32" src="/shared/images/nst-icons.svg#reddit" alt="" aria-hidden="true"> </a> </div> </div> </footer> </div><!-- wrapper --> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10