The hacking tools used in the 
Mr. Robot

The hacking tools used in the Mr. Robot

Kali Linux

Several times we can see the use of the Kali Linux distribution, an operating system originally equipped with tools to penetrate and test system security. If you are interested in the topic of network security, download it and start trying it out. Of course, only for educational purposes. Don't do not hack into other people's computers - it's illegal!

No alt text provided for this image

Wget, Shellshock и John the Ripper

No alt text provided for this image

The program wget is used for HTTP requests - the usual way to download The usual way to download the source of a page or file from the terminal. In this case, it is used to compromise the system through a vulnerability discovered in 2014 - bashdoor (also known as shellshock), or a series of software vulnerabilities discovered in the GNU Bash program. In the screenshot, you can see the commands being sent commands inside the User Agent header, in this case, cat /etc/passwd.

Although the /etc/passwd file was successfully retrieved, without the password hash file /etc/ shadow, the following command in the screenshot, using John the Ripper, simply would not have worked.

Can-Hack

No alt text provided for this image

Can hacking has been known for quite some time, and lone enthusiasts together with security specialists have been passionately researching the possibility of accessing the computers that drive modern cars.

In the screenshot we can see the use of the candump utility, which is used to view messages from the can.

USB from the parking

No alt text provided for this image

In one of the rare instances where a Windows computer appears, we see a security guard insert a flash drive found in a parking lot into his computer and infect his Windows XP with malware. 

The trick of leaving thumb drives in the parking lot is a well-known technique for infiltrating the network of the right organization. In our case the malware was stopped by AVAST antivirus.

Bluetooth Scanner

No alt text provided for this image

Btscanner is used to investigate phones with a wireless connection. The utility tries to extract as much information about the device without having to connect to it. 

It is a part of the Kali Linux distribution and the window title tells you exactly how to use this operating system.

Bluesniff

No alt text provided for this image

This screenshot shows the use of the bluesniff utility, which also serves to Bluetooth-enabled devices. In this case there is a mitm (Man-In-The-Middle) attack with a connection to a wireless keyboard. The next step after that is to launch the Meterpreter shell and then access the desired network.

Metasploit Framework

No alt text provided for this image

Here we already see some lines from the Meterpreter shell. Using the shell gives the hacker full control over the compromised system.

Social Engineer Toolkit (SET)

No alt text provided for this image

The Social Engineering Toolkit is a framework that facilitates the planning of these types of attacks. Phishing emails, fake sites, and wireless access points can all be launched through the system menu. In our case, SMS spoofing is used.

Netscape Navigator

No alt text provided for this image

Windows 95 and Netscape Navigator are mentioned in the show when the main character recalls his first steps on the path of the hacker. In the screenshot you can see the user looking through the HTML source code... And if someone is looking through the source code, he is clearly a dangerous hacker! A humble web browser can indeed be a useful tool for attackers, whether they use web applications or researching LinkedIn for social engineering attacks.

Source

Sonam K.

Digital Marketing Specialist at SkillAcademee |SEO| |SMO| |Advertising| |Promotions|

4 个月

What a fascinating breakdown of the hacking tools featured in Mr. Robot! It’s amazing how the show combines real-world hacking techniques with fictional storytelling. Along with these tools, it’s important to remember the role of the best web browsers in staying secure online. Browsers with strong privacy protections, like Tor or Brave, can help protect against the types of vulnerabilities hackers often exploit in the show. Thanks for this awesome dive into hacking culture—I’ll definitely be rewatching Mr. Robot with a new perspective! https://www.mobileappdaily.com/products/top-hacking-apps?utm_source=web&utm_medium=harsh&utm_campaign=mad

Adeola Adedeji

Trade Finance | AR/AP | GL Reporting | Swift Messaging | Letters of Credit | Investment Banking | Asset Management

2 年

Awesome, But for quite a while now, Sms Vector attack has been discontinued in SET, any alternative you could recommend? Regards

回复
Blake Escritt

Manager at Indy Tech Fix

2 年

Thanks for including a link to the original source.? Russian characters scattered throughout your article make me wonder if you translated the original to Russian and back to English to change the wording.

要查看或添加评论,请登录

Hew Dawson的更多文章

  • Ultimate DeFi & Blockchain Research Base

    Ultimate DeFi & Blockchain Research Base

    Dear friends, I am doing a project - collecting the most extensive knowledge base on blockchain and DeFi. If you have…

  • Ultimate crypto scoring & tracking pack

    Ultimate crypto scoring & tracking pack

    Crypto scoring services └ https://c-hound.ai/ └ https://crystalblockchain.

    1 条评论
  • How to make money work for you with Dracula Protocol

    How to make money work for you with Dracula Protocol

    What is yield farming? I’m sure that you have heard about farming the $UNI token. By providing liquidity to one of the…

  • DRC-DRC & DRC-ETH Staking

    DRC-DRC & DRC-ETH Staking

    There are two new pools: Staking DRC for ETH and staking DRC for DRC. The idea is that they both utilize two main…

  • Timelock & Security in Dracula Protocol

    Timelock & Security in Dracula Protocol

    There have been several questions about Timelock and how we have transferred MasterVampire contract ownership. Let me…

  • What is yield farming?

    What is yield farming?

    I’m sure that you have heard about farming the $UNI token. By providing liquidity to one of the four pools (although…

    1 条评论
  • How to collect mobile numbers for SMS Marketing in a legal way.

    How to collect mobile numbers for SMS Marketing in a legal way.

    Have you ever received a promotional SMS related to a facility near where you are now? I'm sure you have. Now let's…

  • Checking if website has a ban from Google. How to protect and recover?

    Checking if website has a ban from Google. How to protect and recover?

    How to check? Ban in search engines may come for various reasons, mainly because of attempts to manipulate the search…

  • How to find hidden content on YouTube

    How to find hidden content on YouTube

    There isn’t a more famous and well regarded source of video content on the whole Internet than YouTube – this is a…

    1 条评论
  • Ethical Reflections on Political Marketing

    Ethical Reflections on Political Marketing

    I think that now it is no longer possible to say that marketing is just a market research, it is more its organization.…

社区洞察

其他会员也浏览了