Welcome back, my rookie hackers!
In Season 1 Episode 6 Elliot is being blackmailed by the ruthless and unrelenting drug
dealer, Vera, to hack him out of jail. He is holding Elliot’s new love interest, Shayla,
hostage and has given Elliot until midnight to hack the jail’s computer system in order to
release him
------
--
Where is the American drama called Mr. Robot Hacking? All the scenarios were there, and yes, hacking is a scenario, not a science. It is just scenarios. But if it was, for example, why do we say on Udemy that there are a lot of educational videos, and they are not expensive? Why? Because they are not scenarios. They only teach you the tools, but scenarios are one of two things. The first thing is that you make scenarios from your mind. You must first be educated in ethical hacking. Number two, if you are educated in ethical hacking, you must learn the scenarios. And in order to learn the scenarios, you must learn from a teacher who understands ethical hacking well, not hacking Facebook accounts, as this does not exist. And this foreign or American drama had scenarios, and they were not the people who were in the drama who were educated, but there were people helping the people who were in this drama. So, if they gave them a lot of scenarios, such as hacking, they stopped an attack. Also, the most common thing was hacking the prison in order to take all the information or to delete the files that are in the system or computers. And as we see in this simple video, as we see A USB stick, but it's a little different. If this one alone, it can't even hack a small child. Why is this USB stick, or let's say the flash drive, so expensive? If you're in America, it's $100, and this one alone can't hack computers or even a small child. Why isn't there protection or encryption in it? It's also necessary that you put codes inside it. These codes are harmful codes, as is usually the case for hacking. These harmful codes must have encryption. What is this encryption so that the antivirus program doesn't see this harmful code or this virus? In general, Fayrouz says, but viruses are something else, and let's not talk about this here. We see that they are harmful codes. Well, these harmful codes are to take control of this computer. This way, you can extract information or files for people of this age. And so, they are sitting in this prison and they don't care about any paperwork. So, basically, this is a case for those who put them in this prison. They were doing this for this person. Walk or he won't be in prison, they were crying to get him out of prison. We see this video. Of course, you must put the video or watch this video that is here as well. This woman put a lot of this USB or flash drive. Why? Well, it doesn't have malicious codes. It only has something a little different in its way or way, meaning it's different from any USB or flash drive. What is this other thing? Well, when you put this flash drive in the computer, it will work in less than half a second. The malicious codes that are in this will work. Usually, there is encryption with the malicious codes so that the antivirus program does not see this. So, the hacking is 100% successful. But of course, what happened is that this woman did not put good encryption. She did not put any encryption at all. She just put the malicious codes alone. As we also see in this video, which is from this representation, your antivirus program can see that there is a virus here. If the person happens to stop the entire computer, then this is not a success. So, this is something He takes information or shows this person who is basically in prison, meaning he will not take the files and he will not delete them. Okay, why? Well, since if the person who is educated and these are the scenarios for this person in the play, he will be 100% successful, so there will be a big problem with this play. So, he only gives malicious codes without encryption. Well, many people come and say, well, the antivirus program is what will stop the hacks or viruses, and this is 100% wrong. Now, we will put information regarding this and also in the play, but how do we do the encryption? We apologize very much for this. We also cannot teach you this except something else. So, you will find a link here, and this link is educational videos that you can buy and learn 100% ethically. You will learn all of these hacks, real scenarios, and also the certificate at the end. But we put this. We cannot put this great knowledge for free, and no one can learn or hold or take this knowledge and operate in an unethical way. We don't want this, but anyway, at the end of this talk, you will find a video. You will find that it is working here. Basically, what is this? Well, this is also codes that we ran on a computer, and the antivirus program was also working. This program is very wonderful and very good, but it did not see these harmful codes. Why? Because we put encryption so that the antivirus program does not see these harmful codes, or sometimes we say bypassed antivirus. So, we will put everything here. Well, it would be better if you come and learn ethics, and you will have this knowledge, and not only this, but ethical hacks, and ethical hacks that you learn will give you 100% real protection from your mind, not a program. Now, the important thing is that you continue here, and you will find more and more information here. We have no relation to Udemy or these things. Well, we are talking about 100% real knowledge
-----
Elliot tries to explain to Vera that such a hack can’t be done in a matter of hours, but
rather days or weeks to find a security vulnerability that he can exploit. Vera, being the
vicious and feeble-minded killer that he is, will not relent to give Elliot more time. As a
result, Elliot has to attempt some less-than-optimal techniques to try to hack Vera out of
jail to save the lovely Shayla (as you remember, Shayla is also his morphine supplier).
Malicious Flash Drive
1/6
In his first attempt to hack the jail, Elliot has Darlene, his friend and nemesis from
f/society, “accidentally” drop infected flash drives outside the jail. The strategy here is that
if someone inside the jail’s network picks one up and inserts it into their computer system,
which will then inject malware and give Elliot a connection on the outside
-
As expected, a dimwitted corrections officer does pick one up and inserts it into his
computer. Elliot is able to get a SSH connection to it, but before he is able to do anything,
the AV software detects it and disconnects Elliot. Elliot then chides Darlene as a “script
kiddie” for using a well-known malware from Rapid9 (a reference to Metasploit’s
developer, Rapid7) rather than develop a new exploit, and Darlene defends herself saying
“I only had one hour.” (She could have possibly re-encoded it with
shellter and it might
have gone past the AV software undetected.)
Some have questioned whether this approach could work. Before the disabling of the
automatic autorun feature on modern operating systems, you could have an .exe file on
the flash drive that would automatically execute. On a modern OS, autorun is disabled by
default.
We might assume that this machine had the autorun feature enabled or, more likely,
Darlene had installed the malware on a flash drive that has been reprogrammed to
emulate a USB keyboard. When the flash drive is installed on the system, the operating
system then recognizes the flash drive as a USB keyboard, giving it access with the rights
of the logged in user and then injects its malicious code into the operating system. So,
this approach may have worked had Darlene re-encoded the malware with We cannot put Siamese software or tools for encryption. As you can learn this in a way that is not good. If you want to learn ethical protection or ethical hacking, you can send a message here
faresmasry05@protonmail.com
-
-
And if you can see now this is a real program and we put inside it and these atomic codes we will hack this computer and also in it these harmful codes that we put in this original program or it is injection code bypass antivirus meaning two in one and thus the hacking is 100% correct but we do not put information or even we used this how and everything because this is only for people who love to learn or want normal information and maybe both can send me a message about this on the email that is here also maybe if it is important you can learn ethical hacking and you protection there is everything👇
--
Mr. Robot Hacks: How Elliot Hacked the Prison
byMITM
-
0