{"id":2340,"date":"2016-10-02T16:25:26","date_gmt":"2016-10-02T08:25:26","guid":{"rendered":"https:\/\/gergely.imreh.net\/blog\/?p=2340"},"modified":"2016-10-20T05:20:07","modified_gmt":"2016-10-19T21:20:07","slug":"hacking-and-mr-robot","status":"publish","type":"post","link":"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/","title":{"rendered":"I&#8217;ve learned this about hacking, inspired by Mr. Robot"},"content":{"rendered":"<p>The second season of <a href=\"http:\/\/www.imdb.com\/title\/tt4158110\/\">Mr. Robot<\/a>\u00a0has just finished last week. While it&#8217;s one of the most amazing thing I&#8217;ve ever seen, it is also held as the TV show with the closest depiction how computer hacking works for real (see for example <a href=\"https:\/\/www.quora.com\/Mr-Robot-TV-series-Is-Mr-Robot-a-good-representation-of-real-life-hacking-and-hacking-culture-Is-the-depiction-of-hacker-societies-realistic\">Quora<\/a>\u00a0or <a href=\"https:\/\/www.reddit.com\/r\/MrRobot\/comments\/3s48f4\/no_spoilershow_technically_accurate_is_this_show\/\">Reddit<\/a>). Looks like \u00a0it inspired a lot of people to &#8220;try out&#8221; the tools the characters use on the show (adding to the popularity of <a href=\"https:\/\/www.kali.org\/news\/kali-linux-20162-release\/\">Kali Linux<\/a>, or the\u00a0<a href=\"https:\/\/twitter.com\/mywickr\/status\/768898376993640448\">Wickr<\/a>\u00a0chat app\u00a0for example), which does feel a natural way to relate to your favorite characters, in a geek way.<\/p>\n<p>I couldn&#8217;t resist either, and tried to dig a bit deeper, learning some geek (ie. not professional) lessons about how hacking works, party from the events in the show directly, partly by following for a few steps what were done in the show, and deconstructing the results.\u00a0Here&#8217;s what I&#8217;ve collected so far:<\/p>\n<p><strong>Social engineering<\/strong>\u00a0is likely a big part, a crucial enabler of most &#8220;successful&#8221; hacks. The show works with characters\u00a0so it might be\u00a0biased towards human actions, but it makes sense that <a href=\"https:\/\/en.wikipedia.org\/wiki\/Social_engineering_(security)\">social engineering<\/a>\u00a0can open door where the &#8220;bits&#8221; are closed. All the shows main hacks I remember included social engineering (not going to spoil here anything). This also made me a lot more aware in life, for example when talking with my bank online, or trying to get official things done in a way that it involves trust. Very much seems to me, that social engineering vulnerabilities and &#8220;opportunities&#8221; are really abound, and that makes me a lot more careful. For example, when calling to the bank, my verification data is three pieces of information that is available online or relatively easy, and I think of how I&#8217;ve seen such situation abused (in fiction, mind you), then I get a little jumpy. Not sure how other countries are like, but it feels like so many weak points in Taiwan, that she is just protected by the language barrier from western hackers\/scammers &#8211; but sure that doesn&#8217;t deter another hostile nation. So yeah, my lessons is trying to improve on things, be mindful of trust-based situations encountered, while do be more confident to get things done better (in a non-malicious way of course), as confidence is one of the key ingredients of social engineering as well.<\/p>\n<p><!--more--><\/p>\n<p>Watching some <a href=\"https:\/\/www.blackhat.com\/\">BlackHat<\/a>\u00a0videos, and reading online, some people say they can <a href=\"https:\/\/www.youtube.com\/watch?v=m1lhGqNCZlA&amp;feature=youtu.be&amp;t=2m23s\">hack anything they want<\/a>. I&#8217;m pretty confident, that doesn&#8217;t mean that exactly, but that the people with knowhow will find some\u00a0way to figure things out in the end. In my (probably simplistic) view, though, it&#8217;s often the case that <strong>things that people think can be hacked easily are actually hard, while things they think cannot be hacked is actually quite doable<\/strong>. This comes down to the fact that professionals and outsiders (in any field) have a different view of difficulty and ease.<\/p>\n<p>Most <strong>hacking takes a lot of time<\/strong>. It came up on the show was well, the &#8220;naive&#8221; character waiting for thing to happen right way, while the professional knows that some things doesn&#8217;t work that way. Case to point, for testing purposes, I tried out a tool to recover the wifi network password from a WEP-enabled access point I had around: yeah, &#8220;progress is made&#8221; almost immediately, and then still going on 2 hours later, and\u00a06 hours later, \u00a0and finally got a &#8220;result&#8221; the next morning. Worked, but boy does it need patience. I&#8217;d think the same applies for all kind of surveillance, and many &#8220;tricks&#8221; from social engineering, so definitely appreciate, that patience is a big virtue.<\/p>\n<p>Many hacks have <strong>hardware components<\/strong>, and they are more accessible now than ever. It can be as simple as a Pringles <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cantenna\">cantenna<\/a>. Or intermediate such as a single board computer (think <a href=\"https:\/\/www.raspberrypi.org\/\">Raspberry Pi<\/a>, and similar) or microcontroller (think <a href=\"http:\/\/arduino.cc\/\">Arduino<\/a>, and similar) interfacing with some sort of target hardware. Or something even more complex such as an entire board-sensors-analytics-response package to carry out something larger (such as <a href=\"https:\/\/resin.io\/blog\/stich-gsm-anomaly-detection\/\">a bundle like<\/a> this for counter-surveillance). Every level is now more accessible to people, as hardware is cheaper than ever before, knowledge of tools is more open, and both software and hardware is capable of doing a lot more. So I guess one advice is, be wary of unknown hardware you come across!<\/p>\n<p><a href=\"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/robot_mediagallery_deamons_rasberrypi-min.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-2352\" src=\"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/robot_mediagallery_deamons_rasberrypi-min-1024x576.jpg\" alt=\"Raspberry Pi\" width=\"604\" height=\"340\" srcset=\"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/robot_mediagallery_deamons_rasberrypi-min-1024x576.jpg 1024w, https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/robot_mediagallery_deamons_rasberrypi-min-500x281.jpg 500w, https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/robot_mediagallery_deamons_rasberrypi-min-768x432.jpg 768w, https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/robot_mediagallery_deamons_rasberrypi-min.jpg 1920w\" sizes=\"auto, (max-width: 604px) 100vw, 604px\" \/><\/a><\/p>\n<p><strong>Encryption<\/strong> is everywhere, and it&#8217;s now easier to use than ever. Would highly recommend to use it to get a much better peace of mind, something that works even for people too who are not really threatened. Full disk encryption (<a href=\"https:\/\/wiki.archlinux.org\/index.php\/Dm-crypt\">dm-crypt<\/a>), local encrypted storage to keep your &#8220;valuables&#8221; (<a href=\"https:\/\/veracrypt.codeplex.com\/\">veracrypt<\/a>), smartphone full disk\/SD card encryption. All should help to counter possible data loss, something that&#8217;s becoming a problem more and more. Of course, forgetting your password will make you lose access to the data (happened to me), so caution is advised, but it&#8217;s worth it.<\/p>\n<p>Most <strong>hacks need specialists<\/strong>. To successfully own a system, most of the time one has to know it inside out (the rest of the time it&#8217;s just luck), so people have to choose what knowledge they specialize in. No hacker knows all the tricks, and most hacks need a combo of tricks to work (low hanging fruit doesn&#8217;t stay for long in the wild to be exploited).\u00a0There are also just so many tools, that one&#8217;s unlikely to\u00a0be an expert in all. Kali Linux&#8217;s for example organizes tools it ships with into 12 categories, and each has \u00a0about a dozen different software within. Many of those tools are themselves a collection of different pieces, so the variety is even larger. It needs a team of specialists coming together to cover all the bases. That&#8217;s how it worked out in Mr. Robot too, team, specialization, and lots and lots of co-ordination. This is of course also somewhat of a weak spot: more people involved means more chance for things to go wrong, as well as the better you are at\u00a0something, the more likely you are calling attention to yourself.<\/p>\n<p><a href=\"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/kali-2-0-desktop-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2350\" src=\"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/kali-2-0-desktop-5.jpg\" alt=\"kali-2-0-desktop-5\" width=\"810\" height=\"603\" srcset=\"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/kali-2-0-desktop-5.jpg 810w, https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/kali-2-0-desktop-5-500x372.jpg 500w, https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/kali-2-0-desktop-5-768x572.jpg 768w\" sizes=\"auto, (max-width: 810px) 100vw, 810px\" \/><\/a><\/p>\n<p>Connected to the previous note, there are a lot of tools indeed, most of them looks something &#8220;shiney&#8221;\/tempting with its promise of knowledge or power. And still <strong>you don&#8217;t need most tools, but can find some that works for your non-hack interests<\/strong>. One example was playing with <a href=\"https:\/\/www.paterva.com\/web7\/buy\/maltego-clients\/casefile.php\">Maltego CaseFile<\/a>, which is also included in Kali Linux, and tickles my long-standing interest in &#8220;how should we organize knowledge&#8221;? I&#8217;ll be using it for complex &#8220;network&#8221;-type knowledge mapping in the future for sure. And, no real spoiler here, the FPI is using something similar to map the connections within fsociety. ;) Other example would be how people argue about the choices of text editors within the show. The smart (imho) answer is, that it does not matter, let tools be tools, and chose the best one for the task &#8211; just as much in other parts of life besides hacking too.<\/p>\n<p>Likely <strong>everyone is wiretapped<\/strong>, but most of us don&#8217;t have anything that&#8217;s worth to overhear (at least that&#8217;s what people think). Bring social engineering into the picture, and the situation changes, &#8220;worthless&#8221; info can be now very valuable in a different context, someone carrying out a confidence trick either on you, or using your info. There are many tools to decrease exposure, but that&#8217;s a lot of work, and the payoff is still not as much for most people. (Especially when sharing so much voluntarily, both about ourselves, and about our conversations, in public). It needs building a habit, and I&#8217;d guess it&#8217;s never too early. Plenty of the story in Mr. Robot was also about how to overhear things, or deploying\u00a0countermeasures against that.<\/p>\n<p>Knowing that everyone is wiretapped or targeted some way, it&#8217;s really <strong>worth being paranoid about misdirection<\/strong>. Be mindful if something is off, when your information can leak, when strange things happen around you. I call it &#8220;cross-checking&#8221; myself, see if things make sense. In Mr. Robot the more knowledgeable characters often look at a situation and ask: &#8220;what does this mean, is there anything off here?&#8221; Doesn&#8217;t need much time or effort, but needs consistency. Also worth knowing when such a misdirection\/threat is coming, for example knowing <a href=\"https:\/\/haveibeenpwned.com\/\">whether you&#8217;ve been pwned<\/a>.<\/p>\n<p><strong>Lot of hacking causes disturbance<\/strong>, and that&#8217;s a weak point, something that might can be noticed by consistent cross checking. This needs to be taken into account when someone&#8217;s hacking (not to trigger the people&#8217;s or the system&#8217;s &#8220;alarm bells&#8221;), but also something to protect you against hacking, seeing the early signs of an attack. For example, I was also trying out recovering the password of a WPA encrypted wifi access point at home. The technique relies on disconnecting a connected client with fake data, and then listening how it tries to reconnect. From overhearing that connection the attacker can infer little pieces of the secret shared between the access point and the device, eventually recovering the password (if I understand it correctly). When I tried this between my smartphone and wifi router, it took a long time, and the phone&#8217;s internet connection was pretty unusable, the disconnection\/reconnection was very visible. If you are hacking, you don&#8217;t want to be visible. On the other side, \u00a0seeing something unusual can tip you off whether you are being targeted.<\/p>\n<p><a href=\"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/hacks-mr-robot-hack-bluetooth.w1456.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-2349\" src=\"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/hacks-mr-robot-hack-bluetooth.w1456-1024x562.jpg\" alt=\"WPA\" width=\"604\" height=\"331\" srcset=\"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/hacks-mr-robot-hack-bluetooth.w1456-1024x562.jpg 1024w, https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/hacks-mr-robot-hack-bluetooth.w1456-500x274.jpg 500w, https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/hacks-mr-robot-hack-bluetooth.w1456-768x421.jpg 768w, https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/hacks-mr-robot-hack-bluetooth.w1456.jpg 1456w\" sizes=\"auto, (max-width: 604px) 100vw, 604px\" \/><\/a><\/p>\n<p>So <strong>big part of life can now be done over computers<\/strong>, creating a lot of opportunities for better living, but also opportunities for adversaries to target you from afar. That&#8217;s what creates cyber warfare, when the battleground is within the computers (the copper, the fibers, the chips), wherever they are around the world (or even in space, thanks to satellites:). Lots of things that were impossible before are possible now, and people&#8217;s thinking often doesn&#8217;t take that into account yet.<\/p>\n<p>And finally, if you are hacking,\u00a0<strong>you will always leave a trace<\/strong>. No matter what do you do, whether it&#8217;s locally or in the distance, it will leave a trace, and for most people, that won&#8217;t end well (so don&#8217;t be stupid!). For the actual professionals, I guess the trick is to have a trace that is benign, misleading, or falsified. If I remember my games of <a href=\"https:\/\/www.introversion.co.uk\/uplink\/\">Uplink<\/a>\u00a0correctly, often the lack of trace is a larger giveaway, than having something misleading. In Mr. Robot, the characters (the hackers) are mostly in two camps, I think: some of them think they are doing a good job erasing their traces but they aren&#8217;t, others know they cannot hide everything so they mitigate the adverse effect of the traces left behind.<\/p>\n<p>Well, that&#8217;s what I&#8217;ve picked up so far, and I&#8217;m sure professionals would pull their hair out seeing the ramblings of a sort-of wannabe hacker (not really, just a curious geek). So don&#8217;t mind me (though feel free to correct me) if I&#8217;m wrong about anything above! And definitely looking forward to the next season of Mr. Robot. :)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The second season of Mr. Robot\u00a0has just finished last week. While it&#8217;s one of the most amazing thing I&#8217;ve ever seen, it is also held as the TV show with the closest depiction how computer hacking works for real (see for example Quora\u00a0or Reddit). Looks like \u00a0it inspired a lot of people to &#8220;try out&#8221; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2348,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,75],"tags":[198],"class_list":["post-2340","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comp","category-thinking","tag-mr-robot"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>I&#039;ve learned this about hacking, inspired by Mr. Robot - ClickedyClick<\/title>\n<meta name=\"description\" content=\"Even if you are just a curious geek, there are a lot of lessons about computers &amp; our modern way of living if you look close enough, and try things to learn.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"I&#039;ve learned this about hacking, inspired by Mr. Robot - ClickedyClick\" \/>\n<meta property=\"og:description\" content=\"Even if you are just a curious geek, there are a lot of lessons about computers &amp; our modern way of living if you look close enough, and try things to learn.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/\" \/>\n<meta property=\"og:site_name\" content=\"ClickedyClick\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gergely.imreh\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/gergely.imreh\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-02T08:25:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-19T21:20:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/MrRobot-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1855\" \/>\n\t<meta property=\"og:image:height\" content=\"1051\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gergely Imreh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@imrehg\" \/>\n<meta name=\"twitter:site\" content=\"@imrehg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gergely Imreh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/2016\\\/10\\\/hacking-and-mr-robot\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/2016\\\/10\\\/hacking-and-mr-robot\\\/\"},\"author\":{\"name\":\"Gergely Imreh\",\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/#\\\/schema\\\/person\\\/42391e2ae52c8ed76b37be509a5707b0\"},\"headline\":\"I&#8217;ve learned this about hacking, inspired by Mr. Robot\",\"datePublished\":\"2016-10-02T08:25:26+00:00\",\"dateModified\":\"2016-10-19T21:20:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/2016\\\/10\\\/hacking-and-mr-robot\\\/\"},\"wordCount\":1872,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/#\\\/schema\\\/person\\\/42391e2ae52c8ed76b37be509a5707b0\"},\"image\":{\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/2016\\\/10\\\/hacking-and-mr-robot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/MrRobot-min.jpg\",\"keywords\":[\"Mr. Robot\"],\"articleSection\":[\"Computers\",\"Thinking\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/2016\\\/10\\\/hacking-and-mr-robot\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/2016\\\/10\\\/hacking-and-mr-robot\\\/\",\"url\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/2016\\\/10\\\/hacking-and-mr-robot\\\/\",\"name\":\"I've learned this about hacking, inspired by Mr. Robot - ClickedyClick\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/2016\\\/10\\\/hacking-and-mr-robot\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/2016\\\/10\\\/hacking-and-mr-robot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/MrRobot-min.jpg\",\"datePublished\":\"2016-10-02T08:25:26+00:00\",\"dateModified\":\"2016-10-19T21:20:07+00:00\",\"description\":\"Even if you are just a curious geek, there are a lot of lessons about computers & our modern way of living if you look close enough, and try things to learn.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/2016\\\/10\\\/hacking-and-mr-robot\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/2016\\\/10\\\/hacking-and-mr-robot\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/2016\\\/10\\\/hacking-and-mr-robot\\\/#primaryimage\",\"url\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/MrRobot-min.jpg\",\"contentUrl\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/MrRobot-min.jpg\",\"width\":1855,\"height\":1051},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/2016\\\/10\\\/hacking-and-mr-robot\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"I&#8217;ve learned this about hacking, inspired by Mr. Robot\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/\",\"name\":\"ClickedyClick\",\"description\":\"Life in real, complex and digital.\",\"publisher\":{\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/#\\\/schema\\\/person\\\/42391e2ae52c8ed76b37be509a5707b0\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/#\\\/schema\\\/person\\\/42391e2ae52c8ed76b37be509a5707b0\",\"name\":\"Gergely Imreh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d5be311c5d616a3f4c7dfbc6b736ec817d2508b8c420ec29edb950d33fb4946?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d5be311c5d616a3f4c7dfbc6b736ec817d2508b8c420ec29edb950d33fb4946?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d5be311c5d616a3f4c7dfbc6b736ec817d2508b8c420ec29edb950d33fb4946?s=96&d=retro&r=g\",\"caption\":\"Gergely Imreh\"},\"logo\":{\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d5be311c5d616a3f4c7dfbc6b736ec817d2508b8c420ec29edb950d33fb4946?s=96&d=retro&r=g\"},\"description\":\"Physicist, hacker. Enjoys avant-guarde literature probably a bit too much. Open source advocate and contributor, both for software and hardware. Follow these posts on the Fediverse by @gergely@gergely.imreh.net\",\"sameAs\":[\"https:\\\/\\\/gergely.imreh.net\\\/\",\"https:\\\/\\\/www.facebook.com\\\/gergely.imreh\",\"https:\\\/\\\/www.instagram.com\\\/imrehg\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/gergelyimreh\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@GergelyImreh\"],\"url\":\"https:\\\/\\\/gergely.imreh.net\\\/blog\\\/author\\\/gergely\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"I've learned this about hacking, inspired by Mr. Robot - ClickedyClick","description":"Even if you are just a curious geek, there are a lot of lessons about computers & our modern way of living if you look close enough, and try things to learn.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/","og_locale":"en_GB","og_type":"article","og_title":"I've learned this about hacking, inspired by Mr. Robot - ClickedyClick","og_description":"Even if you are just a curious geek, there are a lot of lessons about computers & our modern way of living if you look close enough, and try things to learn.","og_url":"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/","og_site_name":"ClickedyClick","article_publisher":"https:\/\/www.facebook.com\/gergely.imreh","article_author":"https:\/\/www.facebook.com\/gergely.imreh","article_published_time":"2016-10-02T08:25:26+00:00","article_modified_time":"2016-10-19T21:20:07+00:00","og_image":[{"width":1855,"height":1051,"url":"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/MrRobot-min.jpg","type":"image\/jpeg"}],"author":"Gergely Imreh","twitter_card":"summary_large_image","twitter_creator":"@imrehg","twitter_site":"@imrehg","twitter_misc":{"Written by":"Gergely Imreh","Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/#article","isPartOf":{"@id":"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/"},"author":{"name":"Gergely Imreh","@id":"https:\/\/gergely.imreh.net\/blog\/#\/schema\/person\/42391e2ae52c8ed76b37be509a5707b0"},"headline":"I&#8217;ve learned this about hacking, inspired by Mr. Robot","datePublished":"2016-10-02T08:25:26+00:00","dateModified":"2016-10-19T21:20:07+00:00","mainEntityOfPage":{"@id":"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/"},"wordCount":1872,"commentCount":1,"publisher":{"@id":"https:\/\/gergely.imreh.net\/blog\/#\/schema\/person\/42391e2ae52c8ed76b37be509a5707b0"},"image":{"@id":"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/#primaryimage"},"thumbnailUrl":"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/MrRobot-min.jpg","keywords":["Mr. Robot"],"articleSection":["Computers","Thinking"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/","url":"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/","name":"I've learned this about hacking, inspired by Mr. Robot - ClickedyClick","isPartOf":{"@id":"https:\/\/gergely.imreh.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/#primaryimage"},"image":{"@id":"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/#primaryimage"},"thumbnailUrl":"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/MrRobot-min.jpg","datePublished":"2016-10-02T08:25:26+00:00","dateModified":"2016-10-19T21:20:07+00:00","description":"Even if you are just a curious geek, there are a lot of lessons about computers & our modern way of living if you look close enough, and try things to learn.","breadcrumb":{"@id":"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/#primaryimage","url":"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/MrRobot-min.jpg","contentUrl":"https:\/\/gergely.imreh.net\/blog\/wp-content\/uploads\/2016\/10\/MrRobot-min.jpg","width":1855,"height":1051},{"@type":"BreadcrumbList","@id":"https:\/\/gergely.imreh.net\/blog\/2016\/10\/hacking-and-mr-robot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gergely.imreh.net\/blog\/"},{"@type":"ListItem","position":2,"name":"I&#8217;ve learned this about hacking, inspired by Mr. Robot"}]},{"@type":"WebSite","@id":"https:\/\/gergely.imreh.net\/blog\/#website","url":"https:\/\/gergely.imreh.net\/blog\/","name":"ClickedyClick","description":"Life in real, complex and digital.","publisher":{"@id":"https:\/\/gergely.imreh.net\/blog\/#\/schema\/person\/42391e2ae52c8ed76b37be509a5707b0"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gergely.imreh.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/gergely.imreh.net\/blog\/#\/schema\/person\/42391e2ae52c8ed76b37be509a5707b0","name":"Gergely Imreh","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/1d5be311c5d616a3f4c7dfbc6b736ec817d2508b8c420ec29edb950d33fb4946?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1d5be311c5d616a3f4c7dfbc6b736ec817d2508b8c420ec29edb950d33fb4946?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d5be311c5d616a3f4c7dfbc6b736ec817d2508b8c420ec29edb950d33fb4946?s=96&d=retro&r=g","caption":"Gergely Imreh"},"logo":{"@id":"https:\/\/secure.gravatar.com\/avatar\/1d5be311c5d616a3f4c7dfbc6b736ec817d2508b8c420ec29edb950d33fb4946?s=96&d=retro&r=g"},"description":"Physicist, hacker. Enjoys avant-guarde literature probably a bit too much. Open source advocate and contributor, both for software and hardware. Follow these posts on the Fediverse by @gergely@gergely.imreh.net","sameAs":["https:\/\/gergely.imreh.net\/","https:\/\/www.facebook.com\/gergely.imreh","https:\/\/www.instagram.com\/imrehg\/","https:\/\/www.linkedin.com\/in\/gergelyimreh\/","https:\/\/www.youtube.com\/@GergelyImreh"],"url":"https:\/\/gergely.imreh.net\/blog\/author\/gergely\/"}]}},"_links":{"self":[{"href":"https:\/\/gergely.imreh.net\/blog\/wp-json\/wp\/v2\/posts\/2340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gergely.imreh.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gergely.imreh.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gergely.imreh.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gergely.imreh.net\/blog\/wp-json\/wp\/v2\/comments?post=2340"}],"version-history":[{"count":9,"href":"https:\/\/gergely.imreh.net\/blog\/wp-json\/wp\/v2\/posts\/2340\/revisions"}],"predecessor-version":[{"id":2357,"href":"https:\/\/gergely.imreh.net\/blog\/wp-json\/wp\/v2\/posts\/2340\/revisions\/2357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gergely.imreh.net\/blog\/wp-json\/wp\/v2\/media\/2348"}],"wp:attachment":[{"href":"https:\/\/gergely.imreh.net\/blog\/wp-json\/wp\/v2\/media?parent=2340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gergely.imreh.net\/blog\/wp-json\/wp\/v2\/categories?post=2340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gergely.imreh.net\/blog\/wp-json\/wp\/v2\/tags?post=2340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}