![mr robot season 2 download google drive mr robot season 2 download google drive](https://i.pinimg.com/originals/b3/24/d7/b324d7882d5bd4886a83b9922d5fc2eb.jpg)
The proof of concept for a digital lockpick was demonstrated at Black Hat four years ago – and that digital lockpick hardware is now so small that it fits inside a dry erase marker. It was only for a second or two, but I believe we saw Darlene use a hotel key hack. While Angela’s preparing to pwn the FBI, we see Darlene making herself comfortable at a nearby hotel, using a combination of social engineering and digital lock-picking to get in to her room of choice. Even though fsociety might have a greater chance of success with a Femtocell, they could very well hit a home run with a Rubber Ducky attack, too. If the user they target is logged in with admin privileges and Mimikatz grabs their credentials, that could be all the foothold they need to get from that computer to the rest of the network. Either way, all fsociety needs is one success. But if they didn’t, or if the privilege escalation doesn’t succeed, well, best of luck Angela.Ĭlearly using a Femtocell is preferable to the risk and complexity involved here, and it doesn’t look like the Rubber Ducky was needed. I’m presuming fsociety planned for this and included a privilege escalation exploit in their script before launching Mimikatz. Although some home users log in with administrator privilege all the time, fewer and fewer organizations still allow their users to have admin rights full-time, if at all. To dig around in memory as it does, Mimikatz generally needs administrator or system-level privilege. It’s not quite as easy as that, of course. So, Angela can just plug the USB device in, wait a few seconds, yank it out and walk away.
![mr robot season 2 download google drive mr robot season 2 download google drive](https://image.tmdb.org/t/p/original/lNXkxjiVwWKXalBcDCpntXBBfOh.jpg)
The idea is that the Rubber Ducky gets plugged in, Mimikatz runs, grabs the passwords, and hides any trace of its existence all within a few seconds.
Mr robot season 2 download google drive password#
In this case, Mobley’s Rubber Ducky was set up with Mimikatz, an open-source password stealer that can grab a memory dump of password data from a Windows computer. Rubber Ducky can type flawlessly (no mistakes!), with programmably-perfect timing (no password characters in the wrong field!) and super-fast (how does 1000 words per minute sound?), while the hacker sits around looking innocent. The Rubber Ducky looks like a run-of-the-mill USB flash drive, but it’s actually a programmable keyboard device. It may sound like Sesame Street, but Rubber Ducky is a hacker tool. Rubber Ducky, you’re the oneįsociety’s Mobley gives Angela a backup plan in case she’s unable to drop the Femtocell – to plug in a Rubber Ducky to a laptop for a few seconds. Whether or not Angela’s ploy to distract the agent with a lunch date actually worked remains to be seen. Still, with the human element in play, it’s a hard problem to solve. Looking for anomalies in the behavior of employees, such as visiting areas where they normally don’t go or poking around on servers where they shouldn’t be, is one of many ways organizations try to detect insider attacks in progress. The FBI agent’s reaction to Angela being on the wrong floor and spending lots of time in the bathroom, which some might write off as paranoid, was entirely appropriate when trying to mitigate the possibility of an insider attack. The procedures the FBI had in place show that they were taking some precautions. Of course, that level of access means they can often wangle their way around safeguards that would keep an intruder out. An insider threat is someone with privileged access and knowledge who goes rogue or uses their access to cause harm from the inside out. Working as an agent for fsociety while still working as an E-Corp employee makes Angela an insider threat, a particularly insidious problem to stop. (Judging by the preview for next week’s episode, she didn’t fly under the radar.) It seems that she may have slipped away, but her presence and clearly ill-at-ease reactions undoubtedly raised some red flags. The fsociety team quickly works to find out who he is and give Angela an opportunity to escape. Angela gets stopped by an FBI agent who notices she was on a floor where she didn’t belong. There was a bit of setup work she needed to do before physically plugging the device in – we did see the fsociety team do their best to walk Angela through some of the key setup steps, like running commands in OpenWRT.Īlthough the fsociety team seemed prepared enough to deal with difficulties on the technical side, it’s the human element that may have thrown a wrench in the works on this hack. Of course, as we saw this week, dropping the Femtocell itself wasn’t easy to pull off, especially for a newbie hacker-in-training like Angela. The goal of the Femtocell was to force all FBI phones to connect to it, so fsociety would have easy access to the FBI’s network, passwords, and email. WARNING: SPOILERS AHEAD – SCROLL DOWN TO READ ON “Owning the Feds was never going to be easy.”Īs mentioned last week, Angela’s mission was to infiltrate the FBI from the inside by dropping a Femtocell.