top of page
  • Writer's pictureotw

Mr. Robot Hacks, Part 8: How Darlene Hacks the Car in Season 4

Updated: Dec 30, 2022

Welcome back, my Mr Robot fans!

As many of you already know, Mr.Robot is my favorite TV show and if it were a movie, it would be the BEST hacker movie ever. Not only do I love it for the writing, directing and acting (the star, Rami Malek, won an Academy Award in 2019), but because it depicts hacking accurately. When Elliot Alderson or Darlene or any of the other characters on the show are seen doing a hack, the depiction is usually accurate (the show employs several hacker consultants to ensure the accuracy of their hacks).

In Season 4, Darlene is seen attempting to hack into a car as seen below. Of course--she was interrupted before succeeding-- but we can still analyze what she was doing and how she expected to hack the car before she was so rudely interrupted.

Step #1: Unlock the Car Door

Darlene was not using any sophisticated technology to unlock the car door such a hacking the alarm system or the keyless entry system to get inside the car. Instead--as you can see below--she simply used a specially-crafted wire with a hook to pull up the door lock.

Step #2: Connecting to the Car's Network

Nearly every vehicle has a diagnostic port under the dash known as the ODB-II port. This port was designed to provide your mechanic access to the vehicle computer system and download its diagnostic codes. This port can also provide anyone with physical access to the vehicle, complete access to the car's network.

All you need to access this network is simple and inexpensive device (<$15) that can be ordered from any electronics or automobile parts retailer or Amazon.

Once this connector is plugged into the ODB-II connector, you can use the can-utils to connect to the network. These Linux utilities enable you to sniff and reverse engineer communication on the car's network, among many things

Here you can see Darlene using the cansniffer from the can-utils while plugged into the car's network via the ODB-II port.

Once she is inside the network and viewing all the traffic, the next step is to identify traffic that communicates a particular task such as; start the vehicle, open the doors, etc. Once that packet or packets has been identified (or if she had done her research ahead of time), they can be reverse-engineered into the car's network using a tool as such cansend of the can-utils.


Once the attacker has gained physical access to the vehicle, nearly anything can be done with physical access to the CAN network inside the vehicle. These steps include;

1. Connect to the ODB-II connector

2. Install the can-utils to your Linux system

3. Identify the key packets for particular function

4. Reverse Engineer the packet(s) and send them onto the network with cansend.

Automobile or car hacking is one of the leading edges of the hacking universe and Hackers-Arise is one of the best places to study it.

For more on Automobile Hacking, check out the Automobile Hacking section here.

5,024 views1 comment

1 Comment

Jan 03, 2023

Do you suspect your spouse of cheating, are you being overly paranoid or seeing signs of infidelity…Then he sure is cheating: I was in that exact same position when I met Henry through my best friend James who helped me hack into my boyfriend’s phone, it was like a miracle when he helped me clone my boyfriend’s phone and I got first-hand information from his phone. Now I get all his incoming and outgoing text messages, emails, call logs, web browsing history, photos and videos, instant messengers(facebook, whatsapp, bbm, IG etc) , GPS locations, phone taps to get live transmissions on all phone conversations. if you need help contact his gmail on ,, and you can also , whatsap…

bottom of page