In the first episode, we see Elliot launching the e-corp hack and if you look at this screen he’s executing a script written in a python programming language named “fuxSocy.py”
The script seems to encrypt files of the target server which will cause the e-corp to not be able to read or edit them it should be including employees’ and customers’ information.
Again in the first episode, we see a smart home getting hacked smart controller tab that looks like an android tablet most of the time smart home companies choose an android platform for controlling the environment so the technique should be installing a back-door or malicious application which will create a VNC server on the tablet.
VNC is a virtual network computing a desktop sharing system that let users to the remote-control device so if they install a VNC server on the tablet they can connect it through another device like a laptop and control the home.
Darlene using a popular hacking tool named SET (social engineering tool kit) she was using third-party modules and the Fsociety crypto wall option here normally social engineering tool kit does include this option but it is made for this series she enters an IP address and port which she enters and IP Address and port which will be used for the crypto wall program to be controlled from so the program will be listening incoming commands through this IP once the payload is ready she creates autorun file and puts the payload in a USB so when someone plugs the USB the autorun fire the payload start automatically.
The payload encrypts the data on the computers blocks them and pops ups a count down where they are required to pay for receiving the decrypt files just like the latest attack you have heard WannaCry. But one of the problems is how you can infect computers with this USB well we see Mobley is on the building and acting as an IT guy who is trying to solve the problem.
In the Fifth episode Elliot creates a payload which is for FBI issued android phones like a malicious android application now he loads the malware into the femtocell delivery system and femtocell is Elliot’s personal cell tower which injects the malware into phones over wireless or cellular connection and will force he FBI cell phones connect to it so this way they will have access to the devices emails text messages and documents which is inside of the radius of the femtocell and because of Angela is near the building she deploys the femtocell on the FBI Dept in the episode.
In Episode 8 where Mobley and Trenton first meet Trenton tricks, Mobley by making him go to a website for comparing android and iPhone browser speed when Mobley visits the page for claiming android is better than iPhone on browser Trenton injects the custom mp4 file which we can see on her screen the injected video file loads on his phone and this makes Trenton gain root access on the Mobley’s phone over to shops Wi-Fi this is a vulnerability for android phones it is not working on all devices now and fixed on android 5.1 or later this vulnerability is also called the stagefright exploit which is embedded into a website it’s one of the worst android exploits that allow attackers to break into the androids media preview system.
Again in episode 8 Mobley sends a message to Trenton over his phone and sets the time for how many times it will be viewable after it’s opened so the center will not worry about message history or logging this technique is called self-destructive messaging on the scene where Trenton receives the message we can see they’re using Wickr me – secure messenger app on the series which you can download from Google Play Store and Apple App Store.