Tools Used In Mr.Robot

Exploring The Hacking Tools In Mr. Robot

Mr. Robot is an American drama thriller television series created by Sam Esmail for USA Network.
It stars Rami Malek as Elliot Alderson,
a cybersecurity engineer and hacker with social anxiety disorder
and clinical depression.
Elliot is recruited by an insurrectionary anarchist known as "Mr. Robot", played by Christian Slater, to join a group of hacktivists called "fsociety".[8] The group aims to destroy all debt records by encrypting the financial data of E Corp,
the largest conglomerate in the world.
The pilot premiered via online and video on demand services on May 27,2015.
The series stars an ensemble cast featuring Rami Malek, Carly Chaikin, Portia Doubleday, Martin Wallström, Christian Slater, Michael Cristofer, Stephanie Corneliussen, Grace Gummer, BD Wong, Bobby Cannavale, Ashlie Atkinson, and Elliot Villar. The first season debuted on USA Network on June 24, 2015, while the second season premiered on July 13, 2016, and the third season premiered on October 11, 2017. The fourth and
final season premiered on October 6, 2019,
and concluded on December 22, 2019.
Mr. Robot has received critical acclaim,
.particularly for the performances of Malek and Slater,
its story and visual presentation,
and Mac Quayle's musical score.
Esmail has received praise for his direction of the series,
having directed three episodes in the first season before serving as the sole director for the remainder of the show.
The show received numerous accolades,
including two Golden Globe Awards,
three Primetime Emmy Awards,
and a Peabody Award.


1- Kali Linux

Kali Linux is a Debian-derived Linux distribution designed for digital forensics
and penetration testing.
It is maintained and funded by Offensive Security.
Kali Linux has around 600 penetration-testing programs (tools),
including Armitage (a graphical cyber attack management tool),
Nmap (a port scanner),
Wireshark (a packet analyzer),
metasploit (penetration testing framework),
John the Ripper (a password cracker), sqlmap (automatic SQL injection and database takeover tool), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP web application security scanners, etc...
It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack,
their previous information security testing Linux distribution based on Knoppix.
The name was inspired by the Hindu goddess Kali.
Kali Linux is based on the Debian Testing branch.
Most packages Kali uses are imported from the Debian repositories.
Kali Linux's popularity grew when it was featured in multiple episodes of the TV series Mr. Robot.
Tools highlighted in the show and provided by Kali Linux include Bluesniff,
Bluetooth Scanner (btscanner),
John the Ripper,
Metasploit Framework,
Nmap,
Shellshock, and Wget. The tagline of Kali Linux and BackTrack is "the quieter you become,
the more you are able to hear",
which is displayed on some backgrounds.


2- USB Rubber Ducky

USB rubber ducky looks like any other USB flash drive,
but when you insert the rubber ducky,
the computer perceives a keyboard,
and it allows that “keyboard” to enter a host of preset keystrokes.
Theoretically,
this tool is for penetration testing. Security experts can use rubber duckies to test the resiliency of their computers systems.
But hackers can also use the rubber ducky for keystroke injection attacks,
and there are all kinds of tips and instructions online to help them.
To protect your bank from this threat


3- Bluetooth Scanner - btscanner

btscanner is used here to probe the targets phones for Bluetooth capabilities.
The tool attempts to scan and collect as much information as possible from a Bluetooth device without having to connect to it.
The btscanner program is included in the Kali Linux distribution and
we can see from the title bar of the window that it is the operating system being used here.


4- Metasploit Framework - Meterpreter

The Metasploit Project is a computer security project that provides information about security vulnerabilities and
aids in penetration testing and IDS signature development.
It is owned by Boston,
Massachusetts-based security company Rapid7.
Its best-known sub-project is the open-source Metasploit Framework,
a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database,
shellcode archive and related research.

The Metasploit Project includes anti-forensic and evasion tools,
some of which are built into the Metasploit Framework.
Metasploit is pre-installed in the Kali Linux operating system.


5- Social Engineer Toolkit - SET

The Social Engineer Toolkit or SET is a framework
that makes setting up social engineering attacks easier.
One of the most commonly used tools regarding social engineering attacks against the human element is the social engineering toolkit
is an open-source tool containing options for attack vectors to make a believable attack quickly,
it was designed for testing purposes only.
The most famous social engineering attacks are online.
The attacker may clone a legitimate website and
trick the victim to visit the link and enter his credentials.
The attacker will harvest his credentials and
then may redirect him to the original website so he didn’t suspect that anything weird has happened.


6- DeepSound

It is a tool that provides you with the ability to save files and
data in the form of music clips,
even in the case of intruding on you and your data,
all that the intruder can find is a collection of music clips,
no more,
but behind those clips,
there are sensitive files of your own that have been hidden in a smart way
You cannot see the files behind those clips without using the DeepSound tool.
"Elliott" used the tool in the first part,
Episode Eight,
to hide a group of files on a floppy disk,
then put the floppy disk within a group of other musical discs as well as a kind of camouflage.


7- HDShreder

This tool Is Used to delete a hard disk from its parent disk and
delete everything inside it
so that no data can be recovered from a hard disk at all.
if you want to delete all data and information on a specific hard disk without the ability to recover it.
This tool was used in the first part, the tenth episode, in order to delete all information and data after the penetration of Evil Corp, and to delete all traces of the hack of the Fsociety.


8- TOR

All members of the fSociety team, use Tor Browser,
which is a specialized browser that encrypts your connection on many layers,
and also allows you to access Onion sites,
TOR Is The Definition Of "The Onion Router"
which are often highly encrypted and protected,
in practice we find many
People use Tor Browser to access the hidden Deep Web world,
and it can also be used as a kind of VPN in order to open blocked websites in your country or cover your connection
to any website without being tracked or spied by any outside companies.


9- John The Ripper

John the Ripper is a free password cracking software tool.
Originally developed for the Unix operating system,
it can run on fifteen different platforms (eleven of which are architecture-specific versions of
Unix, DOS, Win32, BeOS, and OpenVMS).
It is among the most frequently used password testing and breaking programs
as it combines a number of password crackers into one package,
autodetects password hash types,
and includes a customizable cracker.
It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix versions (based on DES, MD5, or Blowfish),
Kerberos AFS,
and Windows NT/2000/XP/2003 LM hash.
Additional modules have extended its ability to include MD4-based password hashes and passwords stored in LDAP,
MySQL,
and others.


10- FlexiSPY

Premium spy tool that supports a group of mobile systems such as Android,
iOS and others,
also supports BlackBerry devices,
this tool allows you,
after installing it in the victim's phone,
to see and monitor all the events that the victim reaches on his phone, whatever it is. Used By Tyrell Werek,
in the Mr Robot series in the third episode of the first part,
installed it on his friend’s phone,
on his BlackBerry phone, to see and spy on him and get to know the new chief technology officer
of Evil Corp.