{"id":7673,"date":"2015-08-26T19:12:42","date_gmt":"2015-08-27T00:12:42","guid":{"rendered":"http:\/\/hcstx.org\/?p=7673"},"modified":"2015-08-26T19:12:42","modified_gmt":"2015-08-27T00:12:42","slug":"mr-robots-black-hat-bag-of-tricks","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2015\/08\/26\/mr-robots-black-hat-bag-of-tricks\/","title":{"rendered":"Mr. Robot&#8217;s Black Hat Bag of Tricks"},"content":{"rendered":"<h3>Note: For all you Mr. Robot fans like myself who were looking forward to tonight&#8217;s Season Finale, bad news:<\/h3>\n<p><sup>1<\/sup> Update on 8\/26\/2015 at 5:01 p.m. ET: <em>The season finale of Mr. Robot was scheduled to air tonight at 10 p.m. ET, but USA Networks announced just before 5 p.m. that it was holding the episode a week because it contains a scene \u201csimilar in nature to today\u2019s <a href=\"http:\/\/www.wired.com\/2015\/08\/virginia-shooting-instant-sharing\/\">tragic events in Virginia<\/a>. Out of respect to the victims, their families and colleagues, and our viewers, we are postponing tonight\u2019s episode. Our thoughts go out to all those affected during this difficult time,\u201d the network said in a statement to The Hollywood Reporter. (Source: <strong><a href=\"http:\/\/www.wired.com\/2015\/08\/peek-inside-mr-robots-toolbox\/?mbid=nl_82615\">Wired<\/a><\/strong>)<\/em><\/p>\n<p><a href=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/08\/robot_mediagallery_exploits_ecorp-582x327.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-7674\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/08\/robot_mediagallery_exploits_ecorp-582x327.jpg\" alt=\"NUP_168822_0856.jpg\" width=\"582\" height=\"327\" \/><\/a><\/p>\n<h3><\/h3>\n<h3>DeepSound<\/h3>\n<p>If you\u2019re wondering why someone who\u2019d fry his computer\u2019s memory chip in the microwave would be careless enough to store evidence of people he\u2019s hacked on CD-ROMs disguised as CDs, then Elliot\u2019s one step ahead of you. He used<a href=\"http:\/\/jpinsoft.net\/DeepSound\/\"><span class=\"s2\">DeepSound<\/span><\/a>, an audio converter tool, to hide all of the files on everyone he\u2019s hacked\u2014as well as his own old family photos\u2014within WAV and FLAC audio files. And yes, the real files are encrypted and password protected, as we saw in episode 9. DeepSound is a modern example of steganography, the art of concealing information within plain sight.<\/p>\n<h3>ProtonMail<\/h3>\n<p>If you assumed Elliot would run his own server or be an early adopter of <a href=\"https:\/\/pond.imperialviolet.org\/\">Pond<\/a> , episode 8\u2019s revelation that he has a<a href=\"https:\/\/protonmail.ch\/\"><span class=\"s2\">ProtonMail<\/span><\/a> account may have come as a surprise. ProtonMail is a browser-based email service incorporated in Switzerland created by researchers who met at a CERN research facility. (Yes, <i>that<\/i> CERN: the one where the World Wide Web was born.)<\/p>\n<p>\u201cOne of the benefits of ProtonMail is that it\u2019s end-to-end encryption, and it\u2019s in a way that even the owners of ProtonMail can\u2019t see your content, and there\u2019s no IP logging,\u201d says Michael Bazzell, one of the technical advisers on the show. It even lets you set expiration dates for your emails, after which they\u2019ll self-destruct (provided the recipient hasn\u2019t made a copy of them, that is).<\/p>\n<p>ProtonMail is free, though there\u2019s a wait list for invitations to create an account. \u00a0Beta versions of iOS and Android mobile apps were just announced, and it\u2019s possible to jump the queue with a $29 donation. The next batch will be released Thursday.<\/p>\n<h3>Raspberry Pi<\/h3>\n<p>A<a href=\"https:\/\/www.raspberrypi.org\/\"> Raspberry Pi<\/a> is that tiny and delightfully inexpensive computer that helps you learn programming and build your own digital toys. Turns out, it can also be used to gain remote access to HVAC systems. On the show, Elliot\u2019s plot was to gain access using the Pi and then raise the temperature in Evil Corp\u2019s storage room where tape backups are stored, <span class=\"s4\">thus <\/span>destroying the records of much of the consumer debt in the world.<\/p>\n<h3>Tastic RFID Thief<\/h3>\n<p>Fsociety wouldn\u2019t even think of trying to penetrate the most secure facility in the country without a plan for stealing badge information from employees. Luckily, when visiting Steel Mountain, fSociety member Mobley was armed with Bishop Fox\u2019s<a href=\"http:\/\/www.bishopfox.com\/resources\/tools\/rfid-hacking\/attack-tools\/\"> Tastic RFID Thief<\/a>, a long-range radio frequency identification (RFID) reader that saves your score on a microSD card as a text file so you can clone the badge later. It\u2019s completely portable and fits neatly into a messenger bag or a briefcase.<\/p>\n<h3>RSA SecurID<\/h3>\n<p>Two-factor authentication can definitely foil your average fraudster\u2019s plans. Like 25,000 actual organizations worldwide, Allsafe, the cybersecurity firm where Elliot works, uses<a href=\"http:\/\/www.emc.com\/security\/rsa-securid\/index.htm\"> <span class=\"s2\">RSA SecurID<\/span><\/a>. RSA SecurID\u2019s two-factor authentication adds a layer of security to a company\u2019s protected resources by requiring users to not only enter their RSA SecurID pin, but a one-time password generated within the app\u2014which lasts only 60 seconds.\u00a0This is why Elliot needed a multi-faceted plan to get ahold of Gideon\u2019s phone in episode 8. First he texted him large MMS files to try to drain some of his boss\u2019 battery, then he snagged the phone to enter that temporary authentication code at the end of the password with nary a second to spare. He certainly raised suspicion from Gideon with the clever ruse, but at least he got the job done.<\/p>\n<h3>Kali Linux<\/h3>\n<p><a href=\"https:\/\/www.kali.org\/\">Kali Linux<\/a>, BackTrack\u2019s Linux\u2019s successor, is a Debian-based version of Linux that\u2019s specifically built for penetration testing and security auditing and is used in multiple episodes of <em>Mr. Robot<\/em>. It\u2019s free, open source, and pre-installed with hundreds of pen testing programs, so it\u2019s perfect for cracking Wi-Fi passwords, bypassing anti-virus software, and testing security vulnerabilities on your network. Many of the tools used in <i>Mr. Robot<\/i> are utilized within Kali. \u201cThat\u2019s the benefit of Kali is that all the tools are built in,\u201d says Bazzell. \u201cIt\u2019s got a distribution system with everything you \u00a0need.\u201d<\/p>\n<h3>John the Ripper<\/h3>\n<p><a href=\"http:\/\/www.openwall.com\/john\/\">John the Ripper<\/a>is a tool that Elliot used in the second episode of the show to crack Tyrell\u2019s password. Its primary purpose is to detect weak Unix passwords, but it can crack weak passwords with several thousand (or even several million) attempts per second. John the Ripper is available within the Kali Linux platform.<\/p>\n<h3>Metasploit and Meterpreter<\/h3>\n<p>Episode 6 features Rapid7\u2019s <a href=\"http:\/\/www.rapid7.com\/products\/metasploit\/index.jsp\">Metasploit Framework<\/a>. Metasploit is an exploit development and delivery system that allows users to create and execute exploits, typically for penetration testing. It saves hackers time because they don\u2019t have to learn a new tool each time they want to run an exploit. <a href=\"https:\/\/www.offensive-security.com\/metasploit-unleashed\/about-meterpreter\/\"><span class=\"s2\">Meterpreter<\/span> <\/a>is just one of several hundred payloads that can be used within Metasploit. It resides entirely in memory and writes nothing to disk, but can give an attacker control of their target\u2019s system and parts of the network. It\u2019s often used within Kali Linux on a virtual machine in Windows, or on Windows itself.<\/p>\n<h3>Social-Engineer Toolkit<\/h3>\n<p>TrustedSec\u2019s <a href=\"https:\/\/www.trustedsec.com\/social-engineer-toolkit\/\">Social-Engineer Toolkit<\/a> is an open-source pen testing framework designed specifically for simulating social engineering attacks, such as phishing, spear phishing, credential harvesting, and more. Elliot used SMS spoofing from within SET, a module that\u2019s unavailable on the newer versions, but Mr. Robot tech adviser Michael Bazzell said that it\u2019s possible for users to add that package back in within the new version.<\/p>\n<h3>FlexiSPY<\/h3>\n<p>This list would be remiss without the inclusion of a tool used by one of the show\u2019s less sympathetic characters. In the third episode of <em>Mr. Robot<\/em>, Tyrell Wellick secretly installs mobile monitoring software on a lover\u2019s Android phone. After gaining root privilege by using SuperSU, he installs<a href=\"http:\/\/www.flexispy.com\/\">FlexiSPY<\/a>, a tool that lets you monitor other people\u2019s device activities with an online portal. FlexiSPY doesn\u2019t recover past data, but can show you anything still stored on their phone\u2019s memory or SIM card, as well as any future. It also hides <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=eu.chainfire.supersu&amp;hl=en\">SuperSU<\/a> as part of its installation. Sneaky sneaky.<\/p>\n<p>&nbsp;<\/p>\n<p>Original Source Article: <strong><a href=\"http:\/\/www.wired.com\/2015\/08\/peek-inside-mr-robots-toolbox\/?mbid=nl_82615\">Wired<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Note: For all you Mr. Robot fans like myself who were looking forward to tonight&#8217;s Season Finale, bad news: 1 Update on 8\/26\/2015 at 5:01 p.m. ET: The season finale of Mr. Robot was scheduled to air tonight at 10 p.m. ET, but USA Networks announced just before 5 p.m. that it was holding the&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[1317,883,1814,65],"tags":[1584,2025,2026,2027,2028,2029],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/7673"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=7673"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/7673\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=7673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=7673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=7673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}