The hacking tools used in the Mr. Robot
Kali Linux
Several times we can see the use of the Kali Linux distribution, an operating system originally equipped with tools to penetrate and test system security. If you are interested in the topic of network security, download it and start trying it out. Of course, only for educational purposes. Don't do not hack into other people's computers - it's illegal!
Wget, Shellshock и John the Ripper
The program wget is used for HTTP requests - the usual way to download The usual way to download the source of a page or file from the terminal. In this case, it is used to compromise the system through a vulnerability discovered in 2014 - bashdoor (also known as shellshock), or a series of software vulnerabilities discovered in the GNU Bash program. In the screenshot, you can see the commands being sent commands inside the User Agent header, in this case, cat /etc/passwd.
Although the /etc/passwd file was successfully retrieved, without the password hash file /etc/ shadow, the following command in the screenshot, using John the Ripper, simply would not have worked.
Can-Hack
Can hacking has been known for quite some time, and lone enthusiasts together with security specialists have been passionately researching the possibility of accessing the computers that drive modern cars.
In the screenshot we can see the use of the candump utility, which is used to view messages from the can.
USB from the parking
In one of the rare instances where a Windows computer appears, we see a security guard insert a flash drive found in a parking lot into his computer and infect his Windows XP with malware.
The trick of leaving thumb drives in the parking lot is a well-known technique for infiltrating the network of the right organization. In our case the malware was stopped by AVAST antivirus.
Bluetooth Scanner
Btscanner is used to investigate phones with a wireless connection. The utility tries to extract as much information about the device without having to connect to it.
It is a part of the Kali Linux distribution and the window title tells you exactly how to use this operating system.
Bluesniff
This screenshot shows the use of the bluesniff utility, which also serves to Bluetooth-enabled devices. In this case there is a mitm (Man-In-The-Middle) attack with a connection to a wireless keyboard. The next step after that is to launch the Meterpreter shell and then access the desired network.
Metasploit Framework
Here we already see some lines from the Meterpreter shell. Using the shell gives the hacker full control over the compromised system.
Social Engineer Toolkit (SET)
The Social Engineering Toolkit is a framework that facilitates the planning of these types of attacks. Phishing emails, fake sites, and wireless access points can all be launched through the system menu. In our case, SMS spoofing is used.
Netscape Navigator
Windows 95 and Netscape Navigator are mentioned in the show when the main character recalls his first steps on the path of the hacker. In the screenshot you can see the user looking through the HTML source code... And if someone is looking through the source code, he is clearly a dangerous hacker! A humble web browser can indeed be a useful tool for attackers, whether they use web applications or researching LinkedIn for social engineering attacks.
Digital Marketing Specialist at SkillAcademee |SEO| |SMO| |Advertising| |Promotions|
4 个月What a fascinating breakdown of the hacking tools featured in Mr. Robot! It’s amazing how the show combines real-world hacking techniques with fictional storytelling. Along with these tools, it’s important to remember the role of the best web browsers in staying secure online. Browsers with strong privacy protections, like Tor or Brave, can help protect against the types of vulnerabilities hackers often exploit in the show. Thanks for this awesome dive into hacking culture—I’ll definitely be rewatching Mr. Robot with a new perspective! https://www.mobileappdaily.com/products/top-hacking-apps?utm_source=web&utm_medium=harsh&utm_campaign=mad
Trade Finance | AR/AP | GL Reporting | Swift Messaging | Letters of Credit | Investment Banking | Asset Management
2 年Awesome, But for quite a while now, Sms Vector attack has been discontinued in SET, any alternative you could recommend? Regards
Manager at Indy Tech Fix
2 年Thanks for including a link to the original source.? Russian characters scattered throughout your article make me wonder if you translated the original to Russian and back to English to change the wording.