Skip to content
Menu
  • Original Short Fiction
Menu

Mr. Robot’s Black Hat Bag of Tricks

Posted on 26 August 2015 by The Tactical Hermit

Note: For all you Mr. Robot fans like myself who were looking forward to tonight’s Season Finale, bad news:

1 Update on 8/26/2015 at 5:01 p.m. ET: The season finale of Mr. Robot was scheduled to air tonight at 10 p.m. ET, but USA Networks announced just before 5 p.m. that it was holding the episode a week because it contains a scene “similar in nature to today’s tragic events in Virginia. Out of respect to the victims, their families and colleagues, and our viewers, we are postponing tonight’s episode. Our thoughts go out to all those affected during this difficult time,” the network said in a statement to The Hollywood Reporter. (Source: Wired)

NUP_168822_0856.jpg

DeepSound

If you’re wondering why someone who’d fry his computer’s memory chip in the microwave would be careless enough to store evidence of people he’s hacked on CD-ROMs disguised as CDs, then Elliot’s one step ahead of you. He usedDeepSound, an audio converter tool, to hide all of the files on everyone he’s hacked—as well as his own old family photos—within WAV and FLAC audio files. And yes, the real files are encrypted and password protected, as we saw in episode 9. DeepSound is a modern example of steganography, the art of concealing information within plain sight.

ProtonMail

If you assumed Elliot would run his own server or be an early adopter of Pond , episode 8’s revelation that he has aProtonMail account may have come as a surprise. ProtonMail is a browser-based email service incorporated in Switzerland created by researchers who met at a CERN research facility. (Yes, that CERN: the one where the World Wide Web was born.)

“One of the benefits of ProtonMail is that it’s end-to-end encryption, and it’s in a way that even the owners of ProtonMail can’t see your content, and there’s no IP logging,” says Michael Bazzell, one of the technical advisers on the show. It even lets you set expiration dates for your emails, after which they’ll self-destruct (provided the recipient hasn’t made a copy of them, that is).

ProtonMail is free, though there’s a wait list for invitations to create an account.  Beta versions of iOS and Android mobile apps were just announced, and it’s possible to jump the queue with a $29 donation. The next batch will be released Thursday.

Raspberry Pi

A Raspberry Pi is that tiny and delightfully inexpensive computer that helps you learn programming and build your own digital toys. Turns out, it can also be used to gain remote access to HVAC systems. On the show, Elliot’s plot was to gain access using the Pi and then raise the temperature in Evil Corp’s storage room where tape backups are stored, thus destroying the records of much of the consumer debt in the world.

Tastic RFID Thief

Fsociety wouldn’t even think of trying to penetrate the most secure facility in the country without a plan for stealing badge information from employees. Luckily, when visiting Steel Mountain, fSociety member Mobley was armed with Bishop Fox’s Tastic RFID Thief, a long-range radio frequency identification (RFID) reader that saves your score on a microSD card as a text file so you can clone the badge later. It’s completely portable and fits neatly into a messenger bag or a briefcase.

RSA SecurID

Two-factor authentication can definitely foil your average fraudster’s plans. Like 25,000 actual organizations worldwide, Allsafe, the cybersecurity firm where Elliot works, uses RSA SecurID. RSA SecurID’s two-factor authentication adds a layer of security to a company’s protected resources by requiring users to not only enter their RSA SecurID pin, but a one-time password generated within the app—which lasts only 60 seconds. This is why Elliot needed a multi-faceted plan to get ahold of Gideon’s phone in episode 8. First he texted him large MMS files to try to drain some of his boss’ battery, then he snagged the phone to enter that temporary authentication code at the end of the password with nary a second to spare. He certainly raised suspicion from Gideon with the clever ruse, but at least he got the job done.

Kali Linux

Kali Linux, BackTrack’s Linux’s successor, is a Debian-based version of Linux that’s specifically built for penetration testing and security auditing and is used in multiple episodes of Mr. Robot. It’s free, open source, and pre-installed with hundreds of pen testing programs, so it’s perfect for cracking Wi-Fi passwords, bypassing anti-virus software, and testing security vulnerabilities on your network. Many of the tools used in Mr. Robot are utilized within Kali. “That’s the benefit of Kali is that all the tools are built in,” says Bazzell. “It’s got a distribution system with everything you  need.”

John the Ripper

John the Ripperis a tool that Elliot used in the second episode of the show to crack Tyrell’s password. Its primary purpose is to detect weak Unix passwords, but it can crack weak passwords with several thousand (or even several million) attempts per second. John the Ripper is available within the Kali Linux platform.

Metasploit and Meterpreter

Episode 6 features Rapid7’s Metasploit Framework. Metasploit is an exploit development and delivery system that allows users to create and execute exploits, typically for penetration testing. It saves hackers time because they don’t have to learn a new tool each time they want to run an exploit. Meterpreter is just one of several hundred payloads that can be used within Metasploit. It resides entirely in memory and writes nothing to disk, but can give an attacker control of their target’s system and parts of the network. It’s often used within Kali Linux on a virtual machine in Windows, or on Windows itself.

Social-Engineer Toolkit

TrustedSec’s Social-Engineer Toolkit is an open-source pen testing framework designed specifically for simulating social engineering attacks, such as phishing, spear phishing, credential harvesting, and more. Elliot used SMS spoofing from within SET, a module that’s unavailable on the newer versions, but Mr. Robot tech adviser Michael Bazzell said that it’s possible for users to add that package back in within the new version.

FlexiSPY

This list would be remiss without the inclusion of a tool used by one of the show’s less sympathetic characters. In the third episode of Mr. Robot, Tyrell Wellick secretly installs mobile monitoring software on a lover’s Android phone. After gaining root privilege by using SuperSU, he installsFlexiSPY, a tool that lets you monitor other people’s device activities with an online portal. FlexiSPY doesn’t recover past data, but can show you anything still stored on their phone’s memory or SIM card, as well as any future. It also hides SuperSU as part of its installation. Sneaky sneaky.

 

Original Source Article: Wired

Leave a Reply

Your email address will not be published. Required fields are marked *

Tactical Hermit Substack

Recent Post

  • Morning Laugh
  • Happy White Father’s Day!
  • The Surveillance State: Hackers are tampering with USB charging stations at Airports
  • Hidden History: How Israel Acquired Nukes
  • In Times Like These You Gotta Laugh To Make it Through…
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme