This post will contain a series of short articles with videos voice over to breifly go over the hacks done by Mr Robot so if you want to get notified about the new hacks, you can subscribe to my YouTube channel.

The DDOS Attack on Evil Corp Servers

In Season 1 episode 1 of Mr. Robot, Elliot received a night call from Angela telling him that Evil corp servers are under DDOS attack. Initially, they thought its just a DDOS attack but Elliot pointed out that there is a malware at the main server.

Elliot suggested that in order to stop the attack, the main server must be taken offline, an alternative backup server should be up and running and the legitimate traffic should be re-routed to the backup server instead. In the meantime, Elliot plans to inspect the main server for signs of malware presence.

Elliot just located the backup server by inspecting the network configurations and then used “ifconfig” along with other network tools to re-configure the DNS so that the backup server acts as the main server until the main server issue is sorted out.

To Elliot’s surprise, he discovered that the malware that triggered the DDOS attack was planted by him in an attempt to take down Evil Corp that’s why he left it and didn’t delete even after resolving the DDOS problem.

Today, DDOS attacks can be mitigated using firewalls, load balancers and CDNs to distribute the heavy load on the server.

Blue Team Cyber Security & SOC Analyst Study Notes

OSCP Study Notes

Elliot Hacks Angela’s Boyfriend: Ollie

in season 1 episode one a Mr Robot Elliott didn’t like Angela’s boyfriend Oli Oli tried to have Elliot get along with him which spurred Elliot hacking Instinct Elliot decided to hack Ollie and find more about him.

Elliot started gathering information about ali by observing Ali’s activity on social media the music, he likes and the post he makes.

At the end of Elliott’s information gathering stage he decided to hack alli’s online accounts. First Elliot prepared a word list of passwords created using a popular tool named crunch Crunch allows you a specify minimum and maximum number of characters as well as a pattern think of a pattern where a password is composed of birthday pet name and cell phone number which altogether constitute a password.

With a word list ready Elliott launched a password dictionary attack using a tool named Hydra against one of alli’s online accounts which ultimately succeeded. Be aware though that most social media platforms use rate limiting and security measures against such attacks so this method may work only against non-secure platforms stay safe.

How Did Mr Robot Hack The FBI Cell Phones? | The Femtocell Hack

In season 2 of Mr. Robot. The FBI is tracking Elliot and his team due to the 59 hacks that severely impacted Evil Corp and the global economy. To gain information on the FBI’s investigation, Elliot needs to eavesdrop on their conversations. He devises a plan where Angela installs a femtocell in the Evil Corp headquarters, on the floor where the FBI is working.

Once connected to Evil Corp’s network, Elliot uses a modified version of the OpenWRT firmware. This setup allows all cell phone calls made by FBI agents in the vicinity to be routed through Elliot’s modified device, enabling him to divert and record the calls remotely.

A femtocell is explained as a small cellular tower designed to improve reception for people with poor cell signal. Phones automatically connect to it as the closest signal source, and the femtocell routes calls through the internet, providing improved service to users.

How Did Mr Robot Hack The Prison? | The Prison Hack

In season 1, episode 6 of Mr. Robot, where Elliot is blackmailed by the drug dealer Vera, who demands that Elliot hack him out of jail. Vera is holding Shayla, Elliot’s love interest, hostage, giving him until midnight to break into the jail’s computer system.

Mr. Robot suggests hacking the prison’s Wi-Fi, but it’s secured with WPA2, which requires time to crack. While scanning for networks with his phone, Elliot detects a Bluetooth keyboard being used by a correctional officer in a nearby car.

Elliot’s plan is to spoof the Bluetooth connection to the officer’s keyboard, tricking the laptop into believing that Elliot’s phone is the keyboard. This would give Elliot control over the cop’s laptop and access to the prison’s network. Once inside, he could upload malware to take control of the prison system.

Elliot uses a tool called BlueSniff to find the MAC address of the cop’s Bluetooth keyboard and then uses other tools, btScanner and Spooftooph, to complete the hack.

How Did Mr Robot Hack Ron’s Coffee Shop WiFi? MITM Explained

In season 1, episode 1 of Mr. Robot, where Elliot hacks the owner of Ron’s Coffee Shop due to suspiciously high Wi-Fi speeds. The hack Elliot performs is called a Man-in-the-Middle (MITM) attack. This type of cyber attack allows the hacker to intercept and monitor network traffic.

Elliot uses tools like Wireshark and Ettercap to accomplish this. These tools enable him to monitor the network activity and find out that Ron, the coffee shop owner, was involved in suspicious activities using the Tor network.

Elliot explains that he was able to view Ron’s activity by controlling the exit node of the Tor network. In cybersecurity, the exit node is where data packets leave the Tor network and reach their destination. If a hacker can track packets up to this point, they can decrypt and see the previously encrypted traffic.

The Steel Mountain Hack Explained | Mr Robot

In season 1, episode 5 of Mr. Robot, where Elliot and the F Society attempt to infiltrate the Steel Mountain facility in upstate New York to destroy Evil Corp’s data tapes. The team uses sophisticated hacking techniques to gain access to the premises, which are heavily guarded.

The first stage of the plan is to find a Steel Mountain employee wearing a key card around their neck. The goal is to copy the employee’s card using a technique called RFID card cloning. Christian Slater’s character bumps into the employee and manages to get the card reader close enough to the employee’s card to capture the necessary data.

Once the data is captured by the card reader, they plan to clone the card and use it to pass through security checkpoints inside the Steel Mountain facility. The best tool for RFID hacking and cloning, as mentioned in the video, is the Proxmark 3, a device available for under $100.

About the Author

Mastermind Study Notes is a group of talented authors and writers who are experienced and well-versed across different fields. The group is led by, Motasem Hamdan, who is a Cybersecurity content creator and YouTuber.

View Articles