> Step one: Identify the target and its flaws. There are always flaws.
> I learned that early in life. My first hack, the local library, a vulnerable FTP server in its AS/400. A far cry from the Android zero days I'm using to own the FBI standard-issue smartphone. The library was a test to see if I could even get into the system. I've since set greater goals.
> For instance, step two: Build malware and prepare an attack. At my fingertips, the zero day is wrapped in code like a Christmas present, then becomes an exploit, the programmatic expression of my will.
> I learned that early in life. My first hack, the local library, a vulnerable FTP server in its AS/400. A far cry from the Android zero days I'm using to own the FBI standard-issue smartphone. The library was a test to see if I could even get into the system. I've since set greater goals.
> For instance, step two: Build malware and prepare an attack. At my fingertips, the zero day is wrapped in code like a Christmas present, then becomes an exploit, the programmatic expression of my will.
> I live for this shit.
--Elliott, on hacking the FBI (Mr. Robot)