Hacker News new | past | comments | ask | show | jobs | submit login

> Step one: Identify the target and its flaws. There are always flaws.

> I learned that early in life. My first hack, the local library, a vulnerable FTP server in its AS/400. A far cry from the Android zero days I'm using to own the FBI standard-issue smartphone. The library was a test to see if I could even get into the system. I've since set greater goals.

> For instance, step two: Build malware and prepare an attack. At my fingertips, the zero day is wrapped in code like a Christmas present, then becomes an exploit, the programmatic expression of my will.

> I live for this shit.

--Elliott, on hacking the FBI (Mr. Robot)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: