Almost Perfect Walk Through Street Hacker

March 27, 2018 | Author: Ben Yu | Category: Zip (File Format), Email, Login, File Transfer Protocol, Computer File


Comments



Description

Put it on this site couse Mouser wants to merge our sites.Street Hacker Virtuweb Interactive Table Of Contents Introduction Terminal Commands Starting Point It Starts Assignment 1 Assignment 2 Assignment 3 The Real Deal (Final Ionix Mission) Prison! Extras(Note Books) Phreak Boxes and Hubs Weapons Cheats More missions Introduction Street Hacker is a very intricate game that is an embodiment of its name(not man y games have fully accomplished this). The basics of the game are rather tough a t first but once you catch onto it you have it. with that out of the way let me pipe a command referrence. Terminal Commands HELP: Displays help documentation. CLS: Clears the console display. CTRL+R Recalls the previously executed command. WRITE_LOG: Writes the console display to a log file. TIMESTAMP: Enables / Disables the console timestamp feature. IPSCAN: Run a ranged IP scan. PSCAN: Port scan a remote system. WHOIS: Online query for server information. .. Navigates to parent folder of current directory. C: Open / Displays a directory or rile. L: Open directory or filepath on local machine. [PATH NAME] Opens a directory or file from current directory. REFRESH: Refreshes the contents of the current directory. OPEN: Open a file in an external viewer for editing. DELETE: Deletes a file or a directory and its contents. DOWNLOAD: Download a remote file or directory. UPLOAD: Upload a file to a remote server. ZIP: Compress a file zip:[FILE PATH] UNZIP: Uncompress a file unzip:[FILE PATH] ENCRYPT: Encrypt a file encrypt:[FILE PATH] DECRYPT: Decrypt a file decrypt:[FILE PATH] CONNECT: Connect to server connect:[IP ADDRESS]:[PORT] RECONNECT: Attempt to reestablish your internet connection. DISCONNECT: Terminate connection to a remote server DIS: Terminate Connection to remote server LOGIN: Login to a LAN login:[NAME]:[PASSWORD] RUN: Execute an exploit script. CLEARROUTES: Empties your Routing List. ROUTE: Adds another routing connection. LAUNCH: Launches a virus at a remote server VIRUSSCAN: Performs a complete virus scan FORCE.GEN: Login credentials brute force generator. FORCE.LIB: Login credentials library generator. A Few Hints First and Foremost, WATCH THE TUTORIAL! It is very helpful in getting comfortabl e with the game itself. There is no tutorial that can tell you exactly where to go or what to do. Most o f the missions are dynamic (meaning the specifics (like ip address and open ports) are generated at random). So dont exp ect this to explain exactly where to go and what to do...that would take the fun out of it all. Try to keep your b ankroll over $400 at all times. You dont want to lose your Solid Software subscription at any point (believe me its happened to me a few times *uggh*) It Starts.... (The Ionix Missions) So its safe to assume you've watched the opening talk scene and the convenient l ittle tutorial Vince offers. once completed you'll receive 3 emails. I'll run you through them in order. [email protected] This email is simple, it details the offer from solid so ftware solutions to get you an account with them for a small fee ($100/week). you need to reply to this email with the string "i want to subs cribe" wait a few minutes and you should receive 2 more from that same person. one is t he software offers which details what programs they have and the other is your login information. This information is always the same. so lets make a macro so SS can be reached easily at anytime. minimize the email client and lets open the explorer. in your root directory(C:\) right click the screen and click new macro. When create it should be new macro##.mcr (## means a random 2 digit numeric code). Right click it and click rename. rename the file s s.mcr and press enter. Now double click the file. This should bring up the file editor(it looks a lot l ike the dos edit client i know but stay with me). In the editor the first 3 lines need to be: connect:20.155.48.10:21 [email protected] (replace this with your email address EG: [email protected] t) c: Click close at the top of the file editor. Now close the file explorer. Now we w ant to tryout the macro we just created so we'll need to open the terminal. Once you have done that type ss.mcr and watc h as it automatically loads up the SS FTP Server. Since we're here lets have a look around. First we'll need to get you some programs to get you on your way so lets go to the c:\pub directory. You'll want to download generator.exe an d library.exe. simply accomplished with the following commands: download:c:\pub\generator.exe download:c:\pub\library.exe Once finished, minimize the terminal and go back to your email client. Vince's e mail is pretty much obvious since it merely tells you that you can activate the help system at any time by pressing F 1. On to more important business, Mordecai's email. 12. This time I want you to replace a security log fil .80..12. Whe n your done make sure you send the file to my e-mail inbox. look for a "File Upload" port.15.16.12.12. connect:30.gen: Once you receive the login credentials you need to login.215 Download the practice. Assignment #1 complete.80. Once found you' ll need to connect to it.03 Payment: $275 Target Server IP: 41. First thing you need to do is a port scan (whoising the ip wo uld be a waste of time because it would merely return the registered server name which will be displayed when you connec t anyway). now you nee d to open the root directory by typing c: in the command line. Once logged in you should see "user (username) logged in". This is a practice server to test your skill.. One containing the mission details (below) and another containing a single file "log s. Lets say its port 21. So you would need to do this: pscan:30. Two of them actually..215 on port 21 WAN Connection Established to (30. Awaiting User Login Name: Uh Oh! We don't have the proper login credentials..doc".215 Once you have the search results.doc" to mordecai you'll receive an email detailing Assignment #2. force.txt".18.80. (save the attachment before you proceed) ______________________________ \ Assignment #2 / //==========================\\ Deadline:4:16 PM 7.doc from the documents directory of the target server.03 Payment: $150 Target Server IP:30.215). Open the terminal.67.80. Assignment #2 Once you have sent "practice. Just hit reply and attach the file. To do this first type the username by itself and then the password. Once you have found it close the terminal and send it to mordecai. End of Briefing.12. look through each directory for the file "practic e.215:21 You should receive the following message: Connecting to: 30. Guess its a good thing we bou ght that Brute Force Generator and library file huh? Type the following command and within a few seconds you should have all the info you need.115 Let's try another assignment.80.Assignment #1 ______________________________ \ Assignment #1 / //==========================\\ Deadline: 8:16 AM 7. 03 Payment: $400 Target Server IP: 75. The filename is logs..e.67. Again lets assume port 21 i s open and try and connect to it (connect:41.txt and it is relativity small.doc File: products. the server may be a bit more challenging t o hack this time. and don't screw this up. Well lookie here! Theres the file we want "logs..txt Get out of the server Disconnect: Assignment #2 complete.bin File: prplan.190 Let's try another assignment. This one may be a bit more d ifficult than the last but nothing a leet hax0r like yourself can't handle right? Well shall we get dow n to business? Check the email from mordecai ______________________________ \ Assignment #3 / //==========================\\ Deadline: 6:16 AM 7.txt" so just do a quick delete and up load: delete:logs. Navigate your way to the root directory (c:) and look through the folders.194.. Thi s is where you want to be.18.80. Alright get to work. Assignment #3 Speeding along aren't we? You'll receive another email from mordecai within a fe w seconds detailing the final practice mission before the real game begins. Don't let his wording fool you. It is behind a firewall so y ou will have to buy a sniffer virus in order to retrieve a login credentials.doc.. You might have to dig for it because it's not out in the open like the practice. about 20kbs. You'll find an "access" folder. This server is much more difficult than the others. The files I want you to delete a re: File: factile48. it will ask you for a user name so run your generator and login. Don't let me down. (I dont need to show you that again so I'll skip that part).15. . I have given you 2 days to complete this assignment! End of Briefing.xls They may not all be clumped together so keep your eyes open once you get inside.115:21) Once connected. End of Briefing. This hack is about as easy as the last one. Find a F ile Upload Port and connect to it.txt upload:c:\logs. This time I want you to delete some miscellaneous files from the last test server. We h ave our information so the first order of business (as always) port scan the IP and get a list of the ports open. Connect. When you receive the login credentials for the LAN you'll need to perform a logi n command: login:username:password Once logged in we need to get to the root directory (c:). once you've gained access to the WAN you'll also need to get login credentials for the LAN.First things first (no I don't mean port scan.03 Payment: $500 Target Server IP: EA Production Server Well this is the moment you have been waiting for. You get to show me your true skill. Once in root we'll nee d to get to the "home" directory (c:\home). (delete:prplan. Delete it then disconnect from the server. Por t Scan. This mission will be . and tha ts the file we are looking for. save the attachment. (c:\home\administration) Once inside you'll notice theres only one file. When you receive mordecai's email you'll notice he left a minor detail out. So run the delete command on "products. It doesn't have to be big just basic.bin" and we move on. As soon as you receive the email from assembly@pcq. Login Generator. Ok open the terminal. The Real Deal (Final Ionix Mission) You must have gotten used to all of this by now. We need to open the PCQ console and design a keysniffer.19.com. The IP Address! We'll have to do search to find it but its very minor. not yet anyway). The LAN is behind a firewall so this is where our keysniffer comes in. You should notice something different. These are used with the launch command: launch:virusname The first things you should do once in the Terminal should be common by now. ______________________________ \ The Real Deal / //==========================\\ Deadline: 11:16 AM 7. This will extract it to the PCQ vault and make it available for launch on remote servers. then run the exe from the expl orer window. When that directory opens you'll notice the first file on our list to delete is at the very bottom. Now the difference is. Lets have a look at the mission details. launch:keysniff *The actual Virus Name will be listed in the top right of the terminal window. you'l l find "factile48. Assignment #3 complete.xls) Back out to c:\home and go into the testing directory.doc" in there. right? Well here comes the fun part. In the top right hand corner of the terminal window is a vi rus list. The administration f older is next on our list. Now that we've designed our worm we'll need to wait for PCQ to send it to us. Guess we'll have to show him what happens when you cross the wrong people.. I am giving you 2 days. Once logged in we need to do a full path navigate to (c:\documents \user\dev). But first you have 4 year s of jail time to look forward to before that happens. Modify the employee_plan.)..net and get some answers that you've been waiting for and also a . Ionix Missions Complete! Prison and Vengeance! It was a setup! Mordecai hired you to do his dirty work and let you take the fal l for all of it.sorry but this is where your g ame ends). Once you boot up your machine you'll receive an email from cnace@daemon. Theres the file we need to edit so lets run the open command. At this point the game will autosave and you come back out to the main menu (for those of you that only downloaded the demo. Piece of cake right? I agree. Connect to a file upload port and start our normal routine (get full login credentials). whois:EA Now we have our search results.taking place on Eastern Analog's EA Production Server. So lets go ahead and port scan the ip registered to EA Production Server (some of the IP addresses are generated by the game randomly so theres a chance yours may be different than mine. This is very important. End of Briefing.. a nd I know I can count on you to get the job done. So now we have a list of open ports. Guess thats enough time to think up what you pla n on doing to him when you get a hold of him right? In Search For Answers Oddly. First thing we need to do is crack open the terminal and do a search on EA (leave out the rest because it will return a lot of search results). open:c:\documents\user\dev\employee_plan.doc find the line: MIS 2113-026 Databases and change it to: MIS 4555-666 IT_Management Crow AH600 Tado AH300 Save the file and disconnect. You meet with Vince and he gives you a notebook and wishes you the best. you get released from prison around 3 years and 8 months early (strange e h?).doc This following original record [MIS 2113-026 Databases Tado AH300] must be edited so that it says [MIS 4555-666 IT_Management Crow AH600] I will contact you if I hear word that Eastern Analog is panicking because of th e alterations you have made.doc. (BUGGER!).. So he wants us to break into the Eastern Analog Production Server and modify emp loyee_plan. This mystery man i s responsible for altering your prison records and also has key information on The Ionix Corporation but refuses to give it to you unless you complete a few tasks for him. Extras NoteBook Stats CON AR = = Connections(1/4 means that the computer only has a modem.. and optical) Average rating(higher the better) CPU VIDEO MEM 32MB HD 5GB # 8lb CON 1/4 COST $504 NAME AR Wizard XF 950 P2 3 *Integrated 8MB Wizard XF 1000 P2 6 *Integrated 8MB Wizard XF 1150 P3 9 *Integrated 16MB Wizard XF 1200 P3 12 *Integrated 16MB Wizard XF 1250 P3 15 *Integrated 32MB Wizard XF 1300 P3 18 *Integrated 32MB ----Warlock LR 2000 P3 21 *3D XCEL 16MB Warlock LR 2500 P3 24 *3D XCEL 16MB Warlock LR 3000 P4 26 *3D XCEL 32MB Warlock LR 3500 P4 30 *3D XCEL 32MB 450MHz 8MB* 500MHz 8MB* 64MB 5GB 8lb 1/4 $515 550MHz 16MB* 64MB 10GB 8lb 1/4 $535 600MHz 16MB* 64MB 10GB 8lb 1/4 $562 650MHz 32MB* 128MB 15GB 7lb 1/4 $597 700MHz 32MB* 128MB 15GB 7lb 1/4 $640 800MHz 16MB* 64MB 15GB 8lb 1/4 $692 900MHz 16MB* 64MB 20GB 8lb 1/4 $751 1.1GHz 32MB* 128MB 30GB 7lb 2/4 $891 .promise to receive the rest of them after you prove yourself.0GHz 32MB* 128MB 25GB 7lb 2/4 $817 1. wireless.. lan. 4/4 means the computer has modem. 913 2.631 1.9GHz 128MB* 512MB 80GB 6lb 3/4 $1.226 2.381 1.3GHz 64MB* 256MB 40GB 7lb 2/4 $1.1GHz 128MB* 768MB 100GB 6lb 3/4 $2.7GHz 64MB* 384MB 60GB 6lb 2/4 $1.0 P4 68 *Nitrous 3D 256MB Celestial CX6.064 1.2GHz 64MB* 256MB 35GB 7lb 2/4 $974 1.1 P4 71 *Nitrous 3D 256MB 1.571 2.4GHz 256MB* 512MB 140GB 6lb 3/4 $2.065 2.5GHz 256MB* 512MB 140GB 6lb 3/4 $2.0GHz 128MB* 768MB 90GB 6lb 3/4 $1.267 1.2GHz 256MB* 1024MB 110GB 5lb 3/4 $2.502 1.3GHz 256MB* 1024MB 120GB 5lb 3/4 $2.755 .4GHz 32MB* 256MB 40GB 7lb 2/4 $1.768 2.394 2.161 1.Warlock LR 4000 P4 32 *3D XCEL 64MB Warlock LR 5000 P4 25* *3D XCEL 64MB ----Vanquish VX 5500 38 *Discharge 6000 32MB Vanquish VX 6000 41 *Discharge 6100 32MB Vanquish VX 6500 44 *Discharge 6200 32MB Vanquish VX 7000 47 *Discharge 7000 64MB Vanquish VX 7500 50 *Discharge 7500 64MB Vanquish VX 8000 53 *Discharge 8000 128MB Vanquish VX 8500 56 *Discharge 8300 128MB Vanquish VX 9000 54 *Discharge 8600 128MB Vanquish VX 9500 62 *Discharge 9000 256MB Vanquish VX 10000 65 *Discharge 9500 256MB ----Celestial CX6.6GHz 32MB* 384MB 50GB 7lb 2/4 $1.8GHz 64MB* 512MB 70GB 6lb 3/4 $1.5GHz 32MB* 256MB 45GB 7lb 2/4 $1. 0GHz 512MB* 1536MB 180GB 5lb 4/4 $3.8GHz 512MB* 1024MB 160GB 5lb 4/4 $3.1GHz 512MB* 1536MB 180GB 5lb 4/4 $4.000 300 3072MB*10240MB 1TB 3lB DISCRIPTION Disables many building security cameras Disables most building security cameras Disables all building security cameras Manipulates traffic signals with a .5 P5 82 *Nitrous 3D 512MB Celestial CX6.1 P5 100 *Nitrous 3D 1024MB Hybrid Fusion NS8 Phreakboxes and Hubs *PHREAKBOXES NAME COST Black Box I $200 Black Box II $400 Black Box III $600 Chrome Box I $600 2.946 2.2GHz 512MB* 1536MB 180GB 5lb 4/4 $4.4 P5 79 *Nitrous 3D 512MB Celestial CX6.7 P5 88 *Nitrous 3D 512MB Celestial CX6.Celestial CX6.7GHz 256MB* 1024MB 160GB 6lb 3/4 $3.6GHz 256MB* 512MB 512MB 6lb 3/4 $2.9GHz 512MB* 1024MB 160GB 5lb 4/4 $3.3GHz 512MB* 2048MB 200GB 5lb 4/4 $4.792 3.5 mile radius of effect INT LOW LOW MED* MED* .353 2.2 P5 74 *Nitrous 3D 256MB Celestial CX6.0 P5 97 *Nitrous 3D 1024MB Celestial CX7.0GHz 200GB 5lb 4/4 4/4 $5.261 3.568 3.3 P4 76 *Nitrous 3D 256MB Celestial CX6.022 3.762 3.5GHz 1024MB*2048MB P8 10.9 P5 94 *Nitrous 3D 512MB Celestial CX7.6 P5 85 *Nitrous 3D 512MB Celestial CX6.146 2.8 P5 91 *Nitrous 3D 512MB Celestial CX6.4GHz 1024MB*2048MB 200GB 5lb 4/4 $4.508 3.024 $1. or MED so I put MED bassed on what I thou ght *PHREAKBOX HUBS NAME AND Phreakbox 3 Port Phreakbox 6 Port Phreakbox 9 Port Weapons CON STR DEX RF # POW* = = = = = = Concealability Strength needed to opperate Dexterity needed to opperate Rate of fire Weight of weapon Power of weapon relative to other weapons (based on 1 through 6.Chrome Box II $800 Chrome Box III $1.5 HI 1.7 2. 1 being lowest power) RF LOW LOW LOW LOW HI LOW HI COST CLIP # HI 1.7 1.000 Blotto Box $400 Dayglo Box $1.7 $150 1.000 Dark Box $600 Clear Box $600 Static Box $400 Manipulates traffic signals with a 1 mile radius of effect Manipulates traffic signals with a 2 mile radius of effect Shorts out all phone lines in area Causes a power grid failure in that area Disables all building elevators Causes all automatic security doors to lock Activates building fire alarm systems HI HI LOW HI MED* MED* LOW *Not sure if the wording meant HI.7 $330 POW $250 $200 $160 $280 6 $470 7 NUMBER OF PORTS Hub Hub Hub # $200 $400 $600 COST 3 6 9 *Pistols NAME CON STR DEX Browning Hi-Power HI 2 Glock 17 HI 1 Colt HI 1 Colt M1911A1 HI 2 S&W M10 HI LOW Colt Delta Elite HI 2 Sig Sauer P220 HI LOW 13 17 6 7 4 8 6 6 4 4 6 1 6 2 .LOW.5 1.7 HI HI HI 2. S M-16 4 Steyr AUG 4 AK-47 5 *Machine Guns NAME CON Browning* 6 M-60 Machine Gun 6 STR DEX LOW MED LOW RF HI HI HI COST CLIP # LOW 0.8 0.7 6 6 7 $170 $450 4 4 6 15 9 2 3 2 4 6 *Submachine Guns NAME CON STR DEX Thompson M1928 SMG LOW 2 IMI Uzi SMG HI 1 H&K MP5 SMG MED 1 IMI Mini-Uzi HI 1 Ingram MAC-10 SMG HI 2 *Shotguns NAME CON STR DEX Benelli M1 Super 90 LOW 4 Winchester* LOW 4 RF HI HI HI HI HI COST CLIP # LOW 1.5 LOW 2.300 200 14 14 *Browning Automatic Rifle Cheats These must be typed directly into the terminal window (exactly as shown in the c ode column) ----------------------------------------------Code effect ----------------------------------------------down with the demo Finish the demo pronto internet fraud rules Steal 5000 from a random user com open Connect to the internet swordfish Get all login credentials i don't pay for software Get all Solid Software Products .0 1.150 120 $1.0 1.0 LOW LOW LOW LOW 1.7 HI LOW $420 $500 $370 2.5 1.5 1.5 2.5 POW $800 $730 7 7 9 9 *Winchester 1300 Marine (same stats as Benelli yet cheaper) *Assualt Rifles NAME CON U.0 1.Colt King Cobra HI S&W M29 LOW H&K USP HI Beretta m92 1 Desert Eagle 3 LOW LOW LOW HI MED HI LOW HI LOW LOW 2.6 LOW 0.5 POW $1.8 POW $920 $900 $950 30 30 30 11 11 11 STR DEX LOW LOW RF HI HI COST CLIP # LOW 0.8 LOW LOW 0.0 POW $520 $700 $550 $650 $750 30 32 30 20 20 9 9 9 9 9 RF HI HI COST CLIP # LOW 2. they a ren't installers. delete the installers from you r disk. First of all. theres a few things you're gonna nee d to know. Once you have done that install all the programs (dont double click on generator or library. Now go to the financial explorer program and withdrawel all but $500. All the programs you had are gone. You' need to download a copy of the latest version of EVERYTHING including PCQ (believe me you'll need i t). The button beside the sh utdown button is for . You'll need to resubscribe to Solid Software. I have done my best to try and 'ce nsor' the content. Once all the installable programs have been installed. but proceed at your own risk! Table Of Contents Prove Your Worth 1 Prove Your Worth 2 Prove Your Worth 3 Prove Your Worth 4 Prove Your Worth 5 Long Awaited Answers Mercenary For Hire Recon and Feedback Script Kiddies Risky Business Prove Your Worth 1 Before we get into the missions themselves.overclock evil sunlight seconds) who needs sleep seconds) decipher timed out rush hour administrator guest Get the Hybrid Fusion Fast forward to night time Fast forward to daytime (May take a few (May take a few Decrypt and Unzip everything on your computer Terminate all admin's traces Reset the streets with new dealers Computer login is no longer required Computer login is required !!Warning!! The following section contains some spoilers. ) Now we need to do one more thing before we can get started(well actua lly 2). W hen you get inside the building you'll see a new menu (Figure 1. Port Scan the first i p address. Find a building you can hack from (UBS Tower is the one i use in chicago). Now go into your financial explorer and deposit however much money you had left over from what yo u spent on the streets. So we'll have to check the other server. Once in the second server (assuming the first one was running the Macross OS) th is one should be running Fedora. Once you have the company name he wants you to hit."hitting the streets" click that. open the terminal and whois the company whois:company name Example = whois:United Vidia Because you'll be hacking the same company over the next few missions (4 I belie ve) make a note in the "my docs" program with the whois info. Now you need to click the hit the streets button again but this time go downtown. First thing we want to look in is the documents folder.net Prove Your Worth 1 Complete! Prove Your Worth 2 Uh oh! The company traced your activities back to cnace's company and managed to . If you tried the terminal already you'll notice you can no longer connect to the internet from home so you'll have to infiltrate buildings to do your hacks.scp unzip:c:\downloads\alphacode.2). So we go to "documents" (if the server has one) and we notice that theres only one folder there "applications" and we know thats not what we need. a hub and any phreak boxes you can afford. download:c:\home\research\coding\alphacode. So now we need to find the alphacode. Go back home and boot up your computer. I w ont yank your chain anymore. Which means you'll need to go to (c:\home\research\coding). Open the PCQ Interface and recreate your keysniffer w orm.scp disconnect: decrypt:c:\downloads\alphacode. Theres your file. thats why you downloaded the scripts from SS (you did download them right?). I'm going to assume you alr eady gained access to the machine. (helpful hint: Find a buil ding with minimal security. If you dont find a file upload port dont worry. Ok so now you have 2 ip addresses for the company nace wants you to hack and what we do next should be set in stone by now. Activate any phreakboxes you have a nd then click the laptop icon to connect. Now you'll want to go into your email and read cnace's mission specifics. (Hint: "Webservers" almost always have port 21 (FTP) open). So if there is no file upload port we'll need to run a script to hack t he machine. Once you receive your new virus save it and extract it (you know the drill). You'll want to buy a gun.scp Now email the file to cnace@daemon. Once you find a building to use click "Infiltrate". G o into the documents directory and look for the hackcntct directory. This part should be second nature. That should contain the agents IP address. Once you've logged in we'll need to check their documents folder for a folder called "classidied". delete:c:\documents\user\reports\rivalinfo. Nace wants you to destroy his ri val company's server. you know how to get them. Delete missionlist. Login. you should see: . So we need to design a virus to get their ip address. If the virus is successful. So you go back to your email and receive an email from your contact. So the first thing we'll need to do is create a Heart_Burn virus to get the job done. So we found an ope n port and connected to it. Prove Your Worth 3 Complete! Prove Your Worth 4 This mission will be a piece of cake if you've followed the other steps.dat from there and upload t he one you saved from nace's email. So go back to your notes file and get the IP. Connect. C onnect. So go into your notepad file a nd find the IP Address for the server he gives you and port scan it. We need to scour both of bla cksteels servers and find what file they took.doc" and that is the file you need. (c:\programs\pcq\vault\callback. same as always right? WRONG! Once logged in you need to start launching your distractions and when the y are all active. Infiltrate a building and port scan the ip address. So what do we do now? (as if it's not obvious). So we login to each server and search for a file. You'll need to hit the streets and find an agent from the company and accept a job from them.steal an important document from him. The ema il will give you the file you need to replace and the exact server to replace it on. For the purposes of this tu torial I will assume you named it "callback" Open PCQ and create a basic IP CallBack trojan. Well ther e it is. Login. (you ma y also want to create a few viruses to distract the operator while you run the other virus. In the event that you need login credentials.lst and disconnect. You may have to travel to another city to find them. Then that makes it obvious what we need to do.doc (for Fedora OS) Prove Your Worth 2 Complete Prove Your Worth 3 This one will be a bit tricky. Look in the do cuments folder for "reports" inside that folder will be "rivalinfo.trj). Port Scan. launch your heart_burn virus. Prove Your Worth 4 Complete! Prove Your Worth 5 Oh yea! Here comes the pleasure of a real hack. The compan y's name will be in the funder block on the mission selection screen. Navigate to the root directory. Once you've extracted it to pcq you'll need to attach it to an email. So nace gives us the s erver he wants taken down and its up to us to get it done. download mission_synopsis. Within a fe w seconds you'll receive an email from "Anonymous".decrypt it and send it to cnace.).doc (if running on Macross OS) delete:c:\home\reports\rivalinfo. Vince offers you a position on his team. Mercenary For Hire (Money never was this easy) We'll need to get an active connection to the internet so go ahead and infiltrat e a building. we're looking for some sort of securityservers file. When you've sent the file to vince go back to the terminal window a nd type: open:c:\downloads\*SecurityFile*.** World Banc Missions Completed! Recon and Feedback As he promised. Someones killed him! Bugger. now I need to get the schematics for a high-tech device. Once completed you'll have an extra $2000. Now we need to decrypt the file and send it to Vince. The email leaves you still lookin g for answers with you only knowing that nace met someone affiliated with Ionix and the rest of the email wa s corrupted with a virus (vtoli. Thats assuming you remember h ow to take down a server. It's nace's secretary. connect to it. So Ok. Once completed.Hmm that seems suspicious for some reason). Once is your mission details and the other is a file you'll need lets have a look and what he wants us to do: Start with server #5 and go just after 9AM to inform you emails from Vince subjected to complete this mission. He wants you to take down the security servers (Hope you have your viruses ready).Remote Host Server Has Gone Offline Connection Terminated Prove Your Worth 5 Complete! Long Awaited Answers (. disconnect. Make a notepad c opy of the server IP addresses and save it.wrm . So he wants you to do some intelligence gathering on the "World Banc" corporation. This will prepare you for your next mission. A few seconds later you receive 2 "Reconnaissance". Within a few minutes you get a reply from vince detailing the next phase of the mission.Save the bin file. Open up the terminal and do a whois on World Banc. Those wheels in your head a re no doubt turning now as you begin to realize something fishy is going on and you'll stop at nothing to figur e out what it is. I am going to insert an infiltration team to remove these schemati . maybe this will give you a chance to do some "Footpr inting" of your own.. They are locked awa y inside the Versynergy Corp Headquarters. Once an IP address is found we'll need to port sca n it. login.Or Not!) So you killed a little time waiting for morning and you finally receive nace's e mail. What shall we do now? M oments later we get an apologetic letter from Vince (strangely he knew about it fast). Now. This will open the file for editing within the terminal window. Use your keysniffer if neccesary.) Spoiler**You'll need to do this in ascending order. Vince contacts you the next morning he is typing up the briefing for his next mission. on through server #1.. (Launch each distraction and then launch your Heart_Burn virus) (note* Make sure you are logged into the LAN before killing the server. and navigate to root. But wait. Surely as he said. Lets get started. (delete the old one and upload the new one.xls and then open it. So he wants you to blow a substation. destroy surveillance camera feeds.) and now we need to change the password for joe anthony.170 and our window of attack is less than 1 day so think quickly. What I need for you to do is to send me the Maps of each fl oor.* By the time you do this I should have the team prepped and ready to go.mpg" with the one Vince gave us. Mission Checklist: 1) 2) 3) 4) Delete camera feeds Upload a new patrols file Change password for Joe Anthony Get maps for each floor Piece of cake.*. So he wants us to hack into the Versynergy Corporate Computer and make some chan ges. just after 9 (seems to be a pattern here) Vince sends you an email subjected "Feedback" detailing the next s tep of his plan. From root we need to go to the electrical .23. Once in root. Once that is complete we'll need to go find the scematics folder. Lets have a look at it: The team is mobilizing and I need you to create a distraction.*. Do the normal stuff and gain access to the root directory. This will keep officers and othe r security officials busy for quite some time. The IP of the substation is 237. once open we need to find joe anthony's record and change the password to 44444 and then save the file. and to re-route security patrols with the new file I provide. I'll leave the rest up to you. When you finish downloading them. In addition. With the Rec onnaissance complete Vince will reply explaining that he will have further instructions the next morning. start looking for those files. The best way I th ink this can be achieved is by blowing up the downtown electrical sub-station. change Joe Anthony's security pin to 44444 so we will have effortless entry.cs but first I need you to do some reconnaissance. and we will move after the sub-station blows.*** Now we need to replace "patrols. I am sure there are configuration files that can aid you. delete:***. First things first. We need to do our basic rou tine and gain access to the machine. This can be quite tricky (if you think abo ut it too hard.67. and down load all five schematics files. The Versynergy Server' s IP address is *. In the E column of the d irectory tree we can see that its set at Level 4 encryption so we'll need to decrypt the file first decrypt:c:\***\access_protocols.) so lets keep it simple. disconnect and send vince all 5 files. So first we need to delete the camera feed. and change it to this: [OUTGOING FEED] ROUTE TO [INCOMING FEED] . he emails you and tells you that some script kiddies hav e taken over his FTP server. Once decrypted. Since we know where we need to go we can jus t hop in. save the file. Here we have several files we could use to blow this substation. You may want to purchase a faster machine because it gets rather hairy from here on in. In this folder are 2 very obvious files First we need to remove the script kiddies access credentials so we would need t o open the Login file and delete their record. Once finished save the file. However. Spoiler**Find the Feedout Configuration File. (chump change is better than non at all right?) He gives you his server IP and login cr edentials (nice change of pace). In the email he asks if we would look over the log and see if they did anything sus picious. and get out. So open your explorer and check out the Access Log file. open it through your explorer. Now that we have our root access we need to find the information Mr. What we want to do is create an Overload Circuit by routing the outgoing electrical feed into the incoming elect rical feed. Should be easy. Nace was trying to send us. Disregard that for now. BOOM! ** Feedback is a Success! Script Kiddies (Gotta Hate Them!) So you've completed the feedback mission and made Vince a very happy man. connect. root. Nace. Most of them are config files and the other is a technical document. you find a very supsicious entry . so we can skip the normal process. Send Vince a copy of the access log and wait for his reply. we need to start our normal rou tine. He would do it himself but chance has it that he must go to a business deal and wou ld rather you did it. port scan. Also download any new software from SS before proc eeding.system configuration directory. He tel ls you he shouldn't need you for anything else. make the changes. Risky Business (Very Risky) Well now that we have an IP address we can scan. Navigate to the appropriate folder. He sen ds you some money and tells you to keep in touch.Email). Are my eyes playing tricks on me?! In the file. The content is as follows: . So now we have some work to do. Open the terminal and use the connect command and connect to Vinsons FTP server Once inside we need to change his access settings (remove the script kiddies pri viledges) and save a copy of his access logs. and you'll see that theres an encrypted email file fr om Mr. Download it and disconnect. So we need to navigate to the appropriate folder. login. Now we need to download the access lo g and send it to vince. navigate to c:\downloads and the run cipher on the email message (decrypt:c:\dow nloads\***. .d akdie. Ah.fieijfgkdkd . Ah. You'd be pissed. Ah. if this game was in real life. Doing a 'whois' on tha t particular IP address only confirms our suspicions.Spoiler** [The Truth You're Looking For] Contents -------------------------> You have well proven yourself. It implies a company name.com level9 82-34-70-173. for yourself! You hate me. Only one folder here regarding Route Histroy (Hint!) Lets have a look. As I promised I will > give you the truth you re looking for about Mordecai. Hmm an online *** de crypt. Ah.R0Z$ level3 pool-141-150-15-fI&qd.verid. .dial.gill. Open your explorer and open that writing file. (you may need a script for this so make sure you have the latest ones.. So thats obviously a system log meaning its likely buried in one of the system folders. you should look for in this History file. You'll just have to find this file for yourself! ** At this point. you'll just have to find the rest of this file. Ah. Well this is interesting: . disconnect.) From root we need to find the r outing list to get to the Ionix main server. lets check this out.com level3 210. don't you? *HINT* If you get stuck on this mission for too long. > I believe it all started 3 years ago when I met #(DKAH.41 level6 62-147-43-251. From root we need to look for anything incriminating on *** so we'll need to check his documents. Ah. ** We have an IP address no doubt that that's our next stop. Apparently > there is nothing you can't do and I am truly > grateful for your services.paroxism. o k? We have the IP address. It only shows up once.ubr02.netN level1 Ottawa-HSE-ppp255969..c.cable. the rest is obvious. let's just say.east. Wow.nocost. Inside yo u'll find an interesting log file download a copy and disconnect. read the above paragraph.comg level4 nantes-1-62-147-43-25 level0 193..76.net Again.nocost. This file contains a list of IP Addresses but on ly one of them should concern us: Spoiler** level0 64-40-53-115. How convenient is this? We have an IP Address that links directly to *** and now we can find out what he is up to.ca level0 64-40-53-11p92Hharge.deepblue.110.117.124. Gain root. Gain access to root on the Routing server. download. a writings folder.154 level0 64-40-53-115. You'll see a IP text file. but *** has bought out anDKjiae. The FBI started to catch on to our activities. but I can't let you just read through the entire game.xx. But the nice thing is theres still time to d eal with it.lfkdagha.xxx . We have a means to stop the strike. You'll s ee 2 files and you need to download them both. and We have a IP ad dress file that contains the following: Spoiler** macro initiated US DEFENSE:xx.xxx.Spoiler** Entry #1 I decided that if I'm going to get into working with *** I better keep track of what's going on with my own organization. So the only useful bit of info in here is the email address and codeword. After a few minutes. thus this Diary. though! End Game (Safety or BOOM?) (Note: You cant shutdown until you have finished this part. Out on the streets go to the "Tech Express" (the notebook shop).kl*(#@)*(^$# You guessed it! Sorry. So navigate to the plans folder. Once downloaded you need to disconnect from the server and decrypt the files. Seems a bit risky but they're paying me a hell of a lot. we need to abort the process use the codeword. If for some reason. ** So we have our codeword. You'll see your contact.) From root you need to access the Ionix Plans Information. is the only dealer available and boy does he have a deal for you! You'll just ha ve to figure that out on your own. and an Inititave file. The first thing you want to do is deduct $1000 from your account and hit the str eets (you'll understand why in just a second). you should get an in teresting reply. we've completed # *** assignments. Entry #2 *** has given their first assignment to my organization. Entry #3 Well. On ce decrypted: open the file to see the following: Spoiler** Our great plans have been put into work. Send the contact an email with any subject as long as the email body contains the code word. Sorry! ** Son of a! It was a setup all along. The rest is obvious. and sending it to me. and well. H ack these 5 servers. dont you?** After that.xx.xxx FRENCH DEFENSE:xx. Spoiler**You hate me. Couldn't have done it without them! Special Thanks to: IceHeart for making this walkthrough from the ground up.xx.xxx.xxx. where you can input the 'codeword'. Virtuweb Interactive Staff (of course...xxx.xxx. freedom. input it! I'd walk you through it.) Ice Hearts' Credits Thanks.xx.UK DEFENSE:xx. but it's just too easy..xxx ** So now we have the IP Addresses of the 5 defense servers. you'll figure it out!. you have just saved the world! Enjoy the nice little ending and have fun with your new found fame.tk") CyberBli$$ for the item stats And to my friend Josh for turning me onto this game Oh lets not forget Folgers coffee. and hardware.xx. they made this awesome game) Mouser for his nudger system (Streethacker.xxx GERMAN DEFENSE:xx. find the configuration file.xxx RUSSIAN DEFENSE:xx. :) (Note* it will take a little while for the ending to start so grab something to drink while you wait. N ice Job! .
Copyright © 2024 DOKUMEN.SITE Inc.