{"id":3000,"date":"2025-03-19T11:24:33","date_gmt":"2025-03-19T11:24:33","guid":{"rendered":"https:\/\/www.stage.intnews.it\/?p=3000"},"modified":"2025-03-26T14:32:22","modified_gmt":"2025-03-26T14:32:22","slug":"mr-robot-a-cyber-review","status":"publish","type":"post","link":"https:\/\/www.stage.intnews.it\/en\/mr-robot-a-cyber-review\/","title":{"rendered":"MR. ROBOT: a cyber review"},"content":{"rendered":"\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The first season of Mr. Robot , dating back to 2015, has won over cybersecurity enthusiasts and the general public thanks to a compelling narration and interpretation by Rami Malek, later consecrated by the roles of Freddy Mercury in Bohemian Rhapsody and the villain of No Time to Die.<br>The series brings on screen Elliot Alderson, tormented ethical hacker, who is recruited by the mysterious Mr. Robot to dismantle the corruption of a massive multinational with murky interests, E Corp.<\/p>\n\n\n\n<p>What has made the series iconic besides the cut of direction, is the realism of the hacking techniques employed: from the use of Raspberry Pi for Man-In-The-Middle attacks, to SQL injection, to social engineering to obtain privileged information and access.<br>It is important to point out that many of these techniques, while still effective in principle, have evolved since the beginning.<br>An interesting idea is to think about how the update speed between defenses and threats is the protagonist of the hidden technological world.<br>&nbsp;For example, firewalls and IDS\/IPS systems are now more advanced in detecting intrusions, while protections against infected USBs have been strengthened with much more accurate control and prevention means and policies.<\/p>\n\n\n\n<p>Today, the world of hacking has expanded its reach: attacks on supply chains of large and medium-sized enterprises have become the new frontier, as has the use of AI to sophisticated phishing and social engineering campaigns.<br>Mr. Robot has anticipated many of these evolutions, making it a cult, at least in the first season, for anyone who wants to understand the roots of modern cyber-crime.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>HACKING TECHNIQUES ARE A HIGHLIGHT<\/strong><\/p>\n\n\n\n<p>( Each episode emulates a popular file format type in the title )<\/p>\n\n\n\n<p><strong>Ep. 1 &#8211; eps1.0_hellofriend.mov<br><\/strong>Elliot uses a MITM (Man-In-The-Middle) attack via a Raspberry Pi hidden in a coffee shop to monitor a criminal\u2019s traffic. It then uses a backdoor to access a server and locate a vulnerability that an unknown hacker was already exploiting<\/p>\n\n\n\n<p><strong>Ep. 2 &#8211; eps1.1_ones-and-zer0es.mpeg<br><\/strong>An exploit is used to disable the physical security of a company<br>Elliot also uses social engineering techniques to get information from an employee and gain access to systems.<\/p>\n\n\n\n<p><strong>Ep. 4 &#8211; eps1.3_da3m0ns.mp4<br><\/strong>Elliot uses malware on a USB stick to infect a target\u2019s system<\/p>\n\n\n\n<p><strong>Ep. 7 &#8211; eps1.6_v1ew-s0urce.flv<br><\/strong>Elliot hacked a corrupt employee on the payroll of a Chinese hacker group by exploiting an SQL injection on a website.<\/p>\n\n\n\n<p><strong>Ep. 10 &#8211; eps1.9_zer0-day.avi<br><\/strong>Rootkits and ransomware are used to erase E Corp\u2019s data.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><\/ol>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>GLOSSARIO BONUS: <\/strong><\/p>\n\n\n\n<p><strong>Social engineering<\/strong>: A technique that uses psychological manipulation to obtain sensitive information, such as credentials or access, by deceiving people instead of directly attacking computer systems.<br><br><strong>Raspberry Pi for MITM and sabotage<\/strong>: Using a small Raspberry Pi computer to carry out Man-In-The-Middle (MITM) attacks, intercepting and altering network communications, or manipulating devices and infrastructure.<br><br><strong>SQL Injection<\/strong>: Technique that exploits vulnerabilities in databases by inserting malicious SQL code into the input fields of a web application to obtain sensitive data or manipulate stored information.<br><\/p>\n\n\n\n<p><strong>USB drop attack<\/strong>: An attack method in which infected USB drives are left in public places, hoping that someone will connect them to a computer, thus allowing malware to run and unauthorized access to systems.<br><br><strong>Exploit on server to get root privileges<\/strong>: Use of vulnerabilities in systems to execute malicious code with administrative (root) privileges, gaining full control of the compromised server.<\/p>\n\n\n\n<p><br><strong>Ransomware<\/strong>: Malicious software ( Malware ) that encrypts files on a system and requires a ransom to provide the decryption key. Modern ransomware attacks often combine system blocking and data theft with the threat of posting stolen material on the dark web (double extortion).<\/p>\n\n\n\n<p><br><strong>Backdoor<\/strong>: Hidden access left intentionally or found in a system, which allows an attacker to bypass security mechanisms to re-enter the system without authorization.<br><\/p>\n\n\n\n<p class=\"has-text-align-right has-small-font-size\">Article in collaboration with Lorenzo Raimondo, Managing Director of Observere\u00a0<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first season of Mr. Robot , dating back to 2015, has won over cybersecurity enthusiasts and the general public thanks to a compelling narration and interpretation by Rami Malek,&#8230;<\/p>\n","protected":false},"author":6,"featured_media":2879,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[132,79],"tags":[],"class_list":{"0":"post-3000","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersecurity-en","8":"category-sections"},"acf":[],"_links":{"self":[{"href":"https:\/\/www.stage.intnews.it\/en\/wp-json\/wp\/v2\/posts\/3000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stage.intnews.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stage.intnews.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stage.intnews.it\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stage.intnews.it\/en\/wp-json\/wp\/v2\/comments?post=3000"}],"version-history":[{"count":1,"href":"https:\/\/www.stage.intnews.it\/en\/wp-json\/wp\/v2\/posts\/3000\/revisions"}],"predecessor-version":[{"id":3001,"href":"https:\/\/www.stage.intnews.it\/en\/wp-json\/wp\/v2\/posts\/3000\/revisions\/3001"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stage.intnews.it\/en\/wp-json\/wp\/v2\/media\/2879"}],"wp:attachment":[{"href":"https:\/\/www.stage.intnews.it\/en\/wp-json\/wp\/v2\/media?parent=3000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stage.intnews.it\/en\/wp-json\/wp\/v2\/categories?post=3000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stage.intnews.it\/en\/wp-json\/wp\/v2\/tags?post=3000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}