silencer_pl Posted November 19, 2016 Share Posted November 19, 2016 Bored with your old life style, want to try something new? Something exciting and dangerous? Ever envied those computer guys in movies. Well step right here. Now with Uplink organization you can be a hacker yourself, all you need is your wits as we provide the tools you will need https://i.imgur.com/SoCX10O.jpg This was requested to me a while ago, and I think now is the time for me to look and see what is all about. My experience with Uplink is just past the tutorial test, so let's see if I have this something something to be a hacker.Uplink is jut like that: Be a hacker, hack systems, steal data, get paid, steal even more, ruin someones life, get paid even more, don't get caught, be the number 1 agent. It is year 2010, the computer stuff improved so much, we have computers that run @ 60GHz and that's very basic, there are no more bytes only quads amount of data. Anyway let's get introduced to Uplink itself. First of all we just need to register, all and simple, choose username, password. Secondly we need to pick up from where in the world our Gateway will be placed. Yes Gateway is the machine we will be connecting from home and this machine will be our workforce of hacking. There are only few options so let's be a little cliche and choose Moscow, since there is no China option, and everyone knows the most hacking activity comes from Russia and China. https://i.imgur.com/5uEvsaW.jpg After that's done, the organization prepares the Gateway and we are in business. But first they suggest we get the tutorial. It's 3 parter and it's advisable to do so. https://i.imgur.com/8pq1x5E.jpg The tutorial first introduces to 4 primary windows: 1. Your gateway information2. Memory banks3. Agent status4. Your bank account. The gateway information is pretty much basic, since we are new, nothing special to see there. Memory banks are our storage device. Our agent ranking is of course not that impressive and our bank account is just laughable. https://i.imgur.com/KHryXuD.jpg Our communication with missions assigners will be mostly through standard E-mail like for example this welcome E-mail from Uplink. https://i.imgur.com/jZwgBV6.jpg So that's about the first part of tutorial, very basic stuff, and even the things I didn't tell you, it's rather self explanatory from what you can see. Ok now let's move to the second part of the tutorial, where we will learn more about our profession. Our first task to get start is from Uplink Corporation itself. They would like us, to hack their test server, steal a file and upload back to them without being detected. https://i.imgur.com/luHp8XV.jpg Ok, sounds simple, but how to do it? First thing, tutorial says to connect to the test machine using the quick dial up link in the main screen. Upon connecting test machine greets us with welcome instructions and a very important hint. NEVER CONNECT TO TARGET COMPUTER DIRECTLY FROM YOUR GATEWAY! But since this is just tutorial test no bad things will happen for now. Carrying on, we have to stop at the login screen. Well bummer what now. We don't have access and searching for password manually will take ages. https://i.imgur.com/E11KBHF.jpg We need some password breaker. The tutorial guides to a software market Internal Services System. So logging out from the Test machine and log in to ISS. Since we are registered agent of Uplink, we can use our Uplink credentials to log in. In fact the game is friendly enough that has a username and password displayed to use. In the software upgrade menu we are presented with a list of softwares that we could buy and install on our gateway. The tutorial wants us to buy password breaker. It also hints that Dictionary Hacker would be faster so I don't know why it wants to use password breaker. From logical point, the early hacks would be good with dictionary hacks, because less inteligent admins would type passwords like some flower names or dog names, while better passwords like Z0mb13i$0uRm@s73r would never be hacked by dictionary hack. So password breaker would have to be used in more advanced security.But oh well, maybe I'm being dumb. Anyway with the password breaker installed, the tutorial once again asks to to login to test server and try out our new toy. Remembering the hint it will probably fail. https://i.imgur.com/5p2GTDu.jpg So now we will learn how to do it the right way, but first we need some first step of security ourselves. As present in our failed hack attempt, any suspicious activity will be traced by target system (it's called active trace by the way). We need to buy a trace tracker, so we should know when to disconnect before being traced. Being traced may result in either being fined or spent time in jail. In later stages Feds could also try to capture our gateway machine and we will have to start from nothing. Trace tracker comes with 4 kinds of versions, the higher the version the better the estimate it provides. Right now tutorial says we should be v2 (what's the point of v1 then?). With this upgrade we will now do a proper hack.To do so, we open map and select waypoints that will bounce our connection. This will then increase the tracing time, giving us the edge to hack without being detected. https://i.imgur.com/QWDQLZc.jpg Having connection path set, we now connect to test machine and repeat the steps. The password breaker is running and we are being slowly traced. Also it is time to mention that every running software reduces CPU power available. So 2 running softwares will both have 50% of CPU, while 3 will have only 33%. So mind that do not have idle software prepared just in case. There is an option to modify CPU power allotment but I'm not sure if tweaking this will be better than being quicker to run a software when it's needed. Another annoying thing is that on first attempt when password breaker finishes job it will auto close so you need to type in password as it breaks and sort of you need to guess the last letter. On the other hand when you disconnect and connect again you will have that password displayed and the trace will of course be reset (I think). https://i.imgur.com/WXBbPCY.jpg With the retrieved password we now need to go into file archives and user file copier to copy the file we need. https://i.imgur.com/hKFwN62.jpg When the file is on our computer, we need to log out and send the file to finish the mission. The tutorial mentions that we should delete logs of our activity, but does not present with such option, which is strange I think. https://i.imgur.com/3U01hKY.jpg Part 3 of the tutorial is just some small explanations how to get missions. Simply just log in to ISS, search through missions, if non available speed up time, choose mission of interest, contact client, accept the deal and get back to hacking. You can also browse some news and maybe one day the will be writing about your endeavors. https://i.imgur.com/gmwLV8Z.jpg It also has some useful tips on how to be a successful hacker. We can learn few basic things that were not introduced in the tutorial, how to delete logs, and how to minimize the chance of not being caught. There are few more others but that will come with time when hacks will require gaining new skills. https://i.imgur.com/atiMhJL.jpghttps://i.imgur.com/x3StlQ4.jpghttps://i.imgur.com/h1bgERj.jpg So that's enough for the tutorial. We are probably not ready for the real life hack and will be caught on first attempt. But who knows. Zombie 1 Link to comment Share on other sites More sharing options...
silencer_pl Posted November 20, 2016 Author Share Posted November 20, 2016 Having finished the tutorial and reaching rank of the Beginner Hacker, now the world is ready to accept new Hacker. Being Beginner gives only small jobs, but hey everyone must start somewhere. Before however we start to accept missions, we should do some prep work. First step is to go to InterNIC, this is some sort of global "phone" book, it stores lots of IP addresses to machines connected to the internet. As the tutorial said the more bouncing we do, the longer it takes to trace us. Also some systems will do trace fast other might be slower. Also some companies like banks and government will not give access to their logs that fast so it will make tracing a bit longer, additionally bouncing through machine where you have account also increases tracing time, more so when you have Admin access. However once active trace will reach machine where you have Admin access, that access is lost (password change). User accounts do not change password. So using InterNIC let's get some Government and Bank IPs. https://i.imgur.com/Jk8xU9c.jpg Additionaly InterNIC is very hacker friendly, meaning their Admin password NEVER changes and they do not trace any hack attempts, so since we are here let's get that Admin password for future Log deletion https://i.imgur.com/YqDrAkf.jpg Now the second part of prep work is to go to all those bank and create accounts. https://i.imgur.com/NfD9YOY.jpg Having account in all banks last thing to do is prepare bouncing path. Going to the map we select all the points, starting with InterNIC, then selecting all Uplink sites, next All banks, last all Government sites. Note, dotted border around destinations means you have user access, bold border means you have Admin account in this example it is the Uplink Test Server. Saving such connection will just fasten the speed of next hacks. https://i.imgur.com/n5M9YAz.jpg Now we are all set up for our first hacks. But before we go to mission list, one more thing must be done. Although it is not necessary, just for the sake of this AAR, I'm going to get some money from bank to get that Dictionary Hack. Currently my account is 900c and dictionary costs 1000c so additional 100c is needed, though not sure I needed to do that. Anyway, once the dictionary hack is purchased time to search those missions. There are all kinds of them, but currently for Beginner hacker only 2 types are available: Hack and steal a file or Hack and delete a file. https://i.imgur.com/daY84hs.jpg They pay grade is not that much it scales between 1300-1800 credits. Selecting a mission gives only small details - how much we going to be paid and what to do. Being on the margin on the rating required for mission, we must contact our employer. Being a little higher we can auto accept, but that not necessarily be wise. During contact with our potential employer we can ask a lot of things. Like who is the target, how secure the system will be. For the first assignments they probably will not tell you who the target is, and of course the systems will have minimal security. We could also ask about more money and to get paid in advance. To get more money we need to be a little higher in ranking than the job demands and advanced payments not everyone agrees on. Anyway asking for advanced payment is good way to prepare a machine before the hacking begins, so let's select few missions, get some advance money and get more stuff for our Gateway https://i.imgur.com/F8LQJk8.jpg Having selected most of the jobs available at given time, I've received enough cash to buy a Log_Deleter v4. v4 is the top tier log deleter and it makes impossible to undo the deletion. Although the first systems (ISS) does not have passive tracing (that's the tracing done based on logs you leave on machines you connect to), it's better to make it a muscle memory to remove logs you create both on machine you hack into (if you have time) and InterNIC. It's also wise to filter received missions, at it may be that for example two different employers would want a hack same company and one wants a file deleted while other wants exactly the same file copied. For example in this I have to copy 2 different files from same server, so why not do it in one hack? https://i.imgur.com/XyHFj5X.jpg So let's do our first real hack attempt on CityLink Technology Internal Services Machine. Let's load up pre-saved bouncing path and add CityLink and connect. https://i.imgur.com/hCQ5SoJ.jpg After connection, let's try that dictionary hack. Once started, it will try to use a password from the list it has, at this stage it should work. Also begin to notice that the trace has begun and this is not a test. A failure can be met with either a fine or a jail. https://i.imgur.com/cqySF9Z.jpg Once the password is found, we are now inside the machine with admin rights. Time to browse the file server and get the files we need. Just like in the test. https://i.imgur.com/fh1hyfN.jpg Now when the main objective is met, let's get back and erase those logs. As you can see we have generated few logs: 1. Connected to the machine2. Logging as admin3. Accessing file server4. Accessing files. We will leave another log upon disconnection, so the wisest thing would be to erase all logs except the connection one, so it will just look like wrong connection. But before that be mindful of the amount of trace time you have. In our case we have lots of time. https://i.imgur.com/UTjRivZ.jpg Now all is to disconnect from this machine and do the log cleaning on the InterNIC. There only 1 log interest us, the routing log. When being passively traced, admins from the source machine will go up from their machine up to our using the route logs we have created. So we delete the routing log in InterNIC, and just in case our password access looked like we have used admin access to remove the routing log. You can't blame someone from just connecting and disconnecting from public machine can you? https://i.imgur.com/O8jXKzH.jpg All other missions on current rank behave similar, connect to target using pre-saved bouncing path, hack into the machine, get what you need erase the logs, get out and finish the mission. https://i.imgur.com/wpHvPbh.jpg Doing enough of missions will soon get you an increase in the Uplink ranking. https://i.imgur.com/zxvfiDW.jpg With higher rank, new and more dangerous missions will be available. We can also check the news to see if our operations are somewhere noted. https://i.imgur.com/5vsUHio.jpg With the cash earned Today, we can now pay off the initial loan from the Uplink Bank, get best version of trace tracker (v4). This version will estimate time until trace in real time. Reaching 3rd rank we should now be able to get hacks for Encrypted files and change someone academic record. But that will come next time. Link to comment Share on other sites More sharing options...
silencer_pl Posted November 26, 2016 Author Share Posted November 26, 2016 Last time we have ended doing some basic missions after learning some stuff from the Uplink library of knowledge. We have moved from rank 1 to rank 4 Hacker and thus, we are now able to get more missions. On Level 3 we have now unlocked missions that allows us to change someone graduation notes. https://i.imgur.com/Kr3xz4l.jpg This is no more different task than previous one we did. In fact it's much easier, because: A) The tracing time is quite longerB) There is no real penalty if active trace catches us. Long trace time can be beneficial because you can take more assignments of this kind and do it in one hack. The next type of hacks is hacking Social Security Database and either altering existing data or create a new person. By modifying I mean you can make some one dead, or brought back to life, make him unemployed or employed. This is more dangerous hack and requires more coordination and introduces to a new security counter-measure. https://i.imgur.com/pPOqLtn.jpg As you can see new missions are more lucrative. So let's get few some on the list and see what we can do. At the moment there aren't that many of this kind of missions, but we take all we can get. Now let's get a closer look at that social security hack. When you contact employer and ask about security you can notice this reply: https://i.imgur.com/q0Dv0AP.jpg This is the first real system security to deal with. We need a tool to bypass a proxy. There are two software solutions to do that. Proxy Disabler and Proxy Bypasser. The first one is cheaper, takes more CPU power and is longer to activate and also using it alarms the system admin and the trace starts immediately, the other is more expensive but more stealthy. With combination of other security counter-measures makes hack attempts much safer. There are 5 versions of those software, additionaly to user bypasser you need another pre-requisite HUD Connection Analyzer. It's rather required either way for later hacks, so why waste money on the proxy disable, better get more money and invest in the HUD Connection Analyzer and Proxy Disable. Both HUD Analyzer and Proxy Bypass v5 cost total 40k credits and we do not have that much money right now.Also the game itself prohibits you from buying any bypasser if you do not have HUD Connection Analyzer. https://i.imgur.com/vaBhpus.jpg Ok so let's do the University hack and change someone career. Load up our pre-saved connection jumps, select International Academic Database and Connect. Once connected we learn few new more things. More accounts. Ignore the warning we are not scared. On this server we have 3 accounts, admin, readwrite, readonly. While in this case readwrite would be sufficient enough and hacking this does not trigger trace alarm, it will not allow us to remove logs from this machine. Not that we need to, but it's always better to worry about logs than forget about them and pay the price later. Dictionary hack probably will not work here anymore, so let's use the password breaker. After having access, we search for the right person. Once the person is found we make some adjustments and commit the change. In this case we have to lower this person Media Studies Class from 1 to 3. https://i.imgur.com/QrxanVd.jpg And our second target needs some improvements. https://i.imgur.com/T5bGgg2.jpg That's done, let's cover our tracks and report missions successful. By the way if you notice, the Trace Tracker v4 showed us that we had few minutes of free reign before being hacked.Unfortunately we are still way behind in money department so let's grab all the missions from last part. Since our level is much higher than needed, some of them agreed to pay more. Doing them gave us enough money to buy the Connection Analyzer but we are still short few thousand credits for the Proxy Bypass v5.Here is example how the HUD looks like https://i.imgur.com/Z93ZuU3.jpg Also doing some odd jobs we are now ranked level 5 and we can do even more dangerous things. Like changing some ones criminal records or validating someone bank account. But that requires more investment. So next time we will probably stick with some social database hacks. Link to comment Share on other sites More sharing options...
silencer_pl Posted November 27, 2016 Author Share Posted November 27, 2016 Welcome back. Last time we left of we were acquiring new software for higher ranked missions like accessing Social Database or Criminal Database records. Our software upgrade requires only Proxy Bypass now to get to that social database. So we are going through the serach list and get some more missions of this kind and ask for advanced payment. https://i.imgur.com/jLaWjZY.jpg Now with having enough money we can buy Proxy bypasser level 5 and could potentialy start hacking that International Security Database. But first, we need to go to InterNIC and add few more bouncing points, because government traces you very fast. Maybe this enough will be fine to do? Let's see. https://i.imgur.com/2HXIJR1.jpg After connection let's open that connection analyzer and apply our Proxy Bypasser. It took few seocnds and the bypass is applied. The timer on our trace tracker shows 124 seconds. 2 minutes for getting a password and finding a correct person should be enough I think, but at our first attempt let's not push it.. So let's crack that admin password and find our guy. It took 30 seconds for our CPU to crack the password, this means it's time to search for an upgrade. Later we will have to make more things CPU dependent and that 20GHz will be not enough. But back to the current hack. We have 90 seconds left so I'm betting I can modify 2 entries. So let's find our targets and do some changes.Here is our first candidate. We need to set his personal status to Employed. Simple enough just change the Deceased to Employed and commit the change. https://i.imgur.com/uMQWyfw.jpg Of course don't forget to cleanup the logs here and in InterNIC. Before we try another hack here, let's add few more bounces to the list. It's getting a little messy here, and it will probably be even more messy with later hacks. https://i.imgur.com/y2h2sx6.jpg Our next target need to die. Not literały, but his social status needs to show him as dead. So we change it to Deceased (watch out for typos. Not great for non native English speakers). https://i.imgur.com/oAD3vsB.jpg And our third target is just the same thing as our first. https://i.imgur.com/jmSaVb5.jpg We also have fourth target that needs the same deal as the second one. You get the deal. Once done clean up the logs and get money from clients. Finalizing all those Social Security missions have given as a rank up https://i.imgur.com/RbDxTfY.jpg On our current TODO mission list are few hacks to the Criminal Database and one to check someone finances. But first we have enough money for our first hardware upgrade. Yes the next assignments will require of us to have more computing power. However there is one thing. Unlike software upgrades, hardware upgrades require time. 24 hours for Uplink to get a technician and 1 hour for technician to make upgrades. https://i.imgur.com/eVnNgqi.jpg Our next upgrade will probably be new Gateway and The ZION is our best candidate money for value. 3 CPU slots, Max memory of 96Gq and 2 security slots. This would allow us to do some of the new type of missions like stealing databases, those require 60-110 of memory on platform so with 96 max - our current softwares we should be somewhere at ~80-85 Giga quads of memory. https://i.imgur.com/MQv4EoK.jpg Now we should probably wait to have that CPU installed or maybe find any more additional missions that we could do at this time. I've tried to wait and hour or so, but nothing special came up. So I wondered if I can get at least 1 person changed in Criminal Database. But here is the next stopper. The Criminal Database has Elliptic-Curve encryption. This means that apart from hacking the password we will need to hack this encryption. https://i.imgur.com/OZrcuTc.jpg Ok so we should head back to Uplink ISS and buy ourselves new software. There are only 3 versions of this and we have enough money for the best one. Always bet on the best. With new software let's get back to that Criminal Database. We start as previously. Proxy bypass, hack the password and now hack the encryption. With our 20GHz CPU it will take most of our available time. https://i.imgur.com/X3ES97F.jpg Once the encryption was done, I had like 20 seconds. Not enough time to do anything, so let's disconnect and wait for that upgrade. Although I could reconnect because I did not lost any access. But better safe than sorry. Let's clean up the logs and wait for the upgrade. https://i.imgur.com/FoGdFkR.jpg Once the notification came and the upgrade done, we can now return and do some hacking. As I said since we didn't access the admin account upon connecting we still had the login ready. Having access to criminal database it's just similar to all previous two mission types. Search for the dude in question and do what mission told to do. In case of this character, he needs a Robbery, but why not be more creative as well? Not liking Zombie's X-COM Collection is also offending crime. https://i.imgur.com/G2Zsu7e.jpg We probably could do another change on this attempt, but let's not push it. Clean up logs and try again for new customer. However this time we will need to crack password and encryption again but with new CPU it takes just so much faster. Our next client needs his record cleaned up, so hit that clear history button and be done with. https://i.imgur.com/8vu7TEX.jpg And our last target needs again to be accused of Robbery, but let's be more creative again. https://i.imgur.com/qwtfANS.jpg After reporting all the criminal database hacks, we've got report about our morality rank of kind. Apart from having hacker rank, there is other type of rank called Neuromancy. It's hard to explain it, because I'm not sure you can describe it as being morally good or bad. It changes depending on what type of missions you are mostly doing. From what I've read, hacking corporations is good thing, hacking actual person is bad thing. So for example our first missions that were to steal, delete data are of good kind. Changing academing records, Social status, criminal status, checking someones finances is bad thing. Doesn't matter it's sort of good, like clearing up criminal record. So anyway we are not untrustworthy. Well I woulnd't say that, I said I will do mission and I did, so what's untrustworthy in that. Overall people say that this doesn't do anything game wise, however some people said that some missions either don't appear or have lower chance to appear. https://i.imgur.com/cXCP9AW.jpg Last mission for today will be checking guys account status. So we will need to hack to his bank account. Since we are only hacking normal user account, it's not going to be any difficult but first we need additional software. The monitor bypasser. Monitor is actualy the part of system that detects illegal hack attempts and activates active traces. With this we could now be safe from active traces but still could be passively traced so don't forget about them logs. https://i.imgur.com/wDw4aoY.jpg So now let's connect to the bank, apply both monitor and proxy bypass and let's find the guys password by typing his account number as login. https://i.imgur.com/X0xRkQt.jpg Once inside, take note of what needs to be replied to the employer and be done. https://i.imgur.com/7UIwDvT.jpg So that would be all for today, except there is one more thing I would like to show. An easter egg (one of many). If you go to InterNIC and look through all the servers you will find: Protovision Game Server. Once you connect you are greeted with password. The password is uncrackable, but maybe if you remember one of the good movie from 1983 you should know it. https://i.imgur.com/uCo74Zn.jpg Once pass the password screen, you have this map with some cities. Yes it's a sort of map from movie War Games. We can now choose a city, so let's be cliche again and nuke Chicago. Of course we aren't nuking the real Chicago, but from what iternetz are saying there should be a news about this, that maybe we will see next time. https://i.imgur.com/SxBqggN.jpg Link to comment Share on other sites More sharing options...
silencer_pl Posted December 3, 2016 Author Share Posted December 3, 2016 Welcome back. When we last left off, we were making someone's life miserable or better, by either changing their Social information or manipulating Criminal Database. That made us rated as Untrustworthy in the neuromancy rating. So let's fix that. Today we will focus in system destruction's. But before we begin let's find out more about those jobs.There are 2 kind of system destructions: Hack into company ISS or hack into Mainframe. One is quite easier and faster while the other requires few more steps. All in all they are quite easy to perform. For now I'm barely able to do the easier one, because I need a Firewall bypass and I'm few credits short on the bypass V5. Fortunately there is one more mission to verify someones loan. So let me quickly do that and be right back. Ok, now with the Firewall bypass installed, let's take a look at the first new mission type: https://i.imgur.com/TuLZx7V.jpg So how to proceed. Simple. Just do what you previously did. Connect using pre-saved path, bypass all security (monitor, proxy, firewall), crack the password, delete the log of accessing as admin. And now the new option. Under Admin go into console. You will now see this. https://i.imgur.com/9TDQHGn.jpg What now. Well maybe try typing help to get the available options. Anyway, those of you that remember the times of MS-DOS, will know what to do. Our mission is to delete ALL the files on the server. Files are stored in directory USR. So we type cd usr and once inside this catalog just type delete and presto, the system will start deleting ALL the files. Now we have to wait until the process ends and disconnect. Don't forget to clear the logs in InterNIC. https://i.imgur.com/hNu4QOI.jpg Job done? Well not exactly. We cannot ask for the payment until there will be no news about our meddling. So we have to do all missions we could do and advance some time. The news come 2 times a day: 8AM and 4PM. Once the news like this appear, you can safely ask for the job complete money. https://i.imgur.com/UR6s38u.jpg Btw our little fun with War Games also was reported. Completing 2 missions for ISS destruction gave us new rank: Experienced, and we are now back being Neutral in the neuromancer rating. Good. Now our next milestone is to destroy those Mainframes. https://i.imgur.com/OKIe0A8.jpg Hacking mainframes require 2 more additional steps. First, we can only access mainframe if our bance is from the trusted source (read other server of the same company), second authorization is 2 steps process: Cracking password and voice authentication. The first problem we can solve by going to InterNIC and find public server access of the company in question, connect to it and get the phone number of the administrator. https://i.imgur.com/H25PyEN.jpg Now what we need admins phone number? Glad you ask. There is another software the we need. Voice analyzer it's called and it has 2 versions, the second version allows to store the voice imprint on your gateway. What this software do is it collects a voice sample and then creates a small phrase that is the key to bypass voice authentication barrier. Because everything is unified all companies have the same phrase. So let's run our software and ring that Admin. https://i.imgur.com/VxIDk8t.jpg After few seconds we have our admin voice and can now proceed with the mission. Load the bouncing path and remember to add company public server as last bounce. Once in bypass the security. Having still voice analyzer open, go to Voice Print Authentication and press play on the voice analyzer software. It will play the phrase using the voice of our Admin and voila we have passed this barrier. https://i.imgur.com/3xE9pss.jpg Now the password and we are in. Inside we do the same thing as with ISS except there are few steps more. After deleting files from USR directory, we need to go back and delete everything from SYS directory and initiate system SHUTDOWN. https://i.imgur.com/Qn3Blwk.jpg Don't forget about logs in InterNIC. Do all the other missions and wait... Also after such hacks, there will be loads of following missions, unfortunately we cannot accept this because it will cause to track ourselves. And also good luck to anyone who will attempt to trace back. https://i.imgur.com/BcCEXhx.jpg Tracing a hacker missions are not that enjoyable. You need pen and paper prepared, get 2 more softwares (IP lookup and Log_Undeleter). First you need to hack into the machine client tells you to. They do not give you admin access so you need to clear them logs. Then find the log closer to the date they have provided, use undelete, note the IP, look up the IP, repeat the process with the IP you have until you reach the Personal Computer. Also hackers will eventually clear the logs and the mission will be unwinnable, so you should take missions that are very fresh and mostly be of your doing. So that would be for today, I still need to do few more missions to get money. We are buying the new gateway I've talked about previously. There is third kind of destruction mission and that requires hacking LAN. Now hacking LAN it's a mini-game of it's own and requires few additional software upgrades. Unfortunately the basic gateway is out of Memory space. https://i.imgur.com/V3vKXXT.jpg So Today we end with the new machine, will have to upgrade RAM to start stealing from those databases and then maybe we will be hacking those LANs. Also there are missions with illegal bank transfers so I'll probably get few of those. There is a possibility to make yourself richer, but that is very risky. We will see if our account suddenly finds lots of credits. https://i.imgur.com/7dmPFc3.jpg Link to comment Share on other sites More sharing options...
silencer_pl Posted December 4, 2016 Author Share Posted December 4, 2016 Today will be rather short part. Last we left of we had upgraded our Gateway. Now we need to install more memory. This unit can store 96Gq of memory that's 3 times as much as the starting one. So we will go to the hardware market in Uplink ISS and order some new RAM. Of course this will be another 24h wait. https://i.imgur.com/LNYyKrT.jpg But before that, last time I've picked 2 bank transfer missions. Strangely one is for the account I've already hacked during check loan mission. Anyway this is a simple mission. Connect to a bank bypass the monitor proxy and firewall, hack the password for the account and just make a transfer. Log out delete log in InterNIC, send a respone. https://i.imgur.com/GJi1ryr.jpg Of course if we were to steal money to our accounts thing are more trickier. After sending money you need to clear statements in both the account you send from and account you send to in 20 seconds. Not a lot of time. Maybe I'll show later when I practice a little. Of course this mission creates another "Ghost" mission to find a hacker that made illegal transfer. https://i.imgur.com/P4NJNAZ.jpg Ok so now let's deal with those stealing some large amount of data. There were couple of missions available. Of course those missions too differ between hacking to ISS, Maniframe or LAN. We are currently not able to hack into LAN. It's damn costly. Second thing you need with stealing data is Decrypther software. Preferably v7 highest, because that scientific data will be very protected. https://i.imgur.com/loPh4wc.jpg During waiting time for Uplink to install those memory modules a very foreshadowing news appeared. I'm pretty sure we will be involved later too. https://i.imgur.com/LYhqFVY.jpg But for now let's get back to business. So our memory is installed. Doing this mission is easy as pie. You just do the same thing like in other missions. If it is ISS you just hack in copy files to your machine then go to dedicated file server and put them there and decrypt if needed. To help you all the files you need are in .dat extension. But since my sight is not perfect I've probably miss some. Don't forget to clean the logs, and don't forget to check if you have mission to copy data and destroy database of same server. Don't destroy the server before copying data. https://i.imgur.com/7wX1Cj6.jpghttps://i.imgur.com/7fhMq2C.jpg Anyway that's it for today. I have few LAN missions assigned, so I'll be probably stealing money from banks or doing other missions that are not track myself. After doing them database copy missions, my rank went to Uber-Skilled. That probably means new mission types. Link to comment Share on other sites More sharing options...
Space Voyager Posted December 5, 2016 Share Posted December 5, 2016 An interesting game, this... Play this and watch "Mr. Robot" and you're on your way to hack the world! Nookrium 1 Link to comment Share on other sites More sharing options...
silencer_pl Posted December 5, 2016 Author Share Posted December 5, 2016 So, you've noticed. Link to comment Share on other sites More sharing options...
Space Voyager Posted December 5, 2016 Share Posted December 5, 2016 What, the AAR? Definitely! Just hard to comment. In a way the game reminds me of Papers, please, mostly with its minimalistic UI. But if it keeps you playing, the game must be fun. Link to comment Share on other sites More sharing options...
silencer_pl Posted December 10, 2016 Author Share Posted December 10, 2016 Well Paper please is relatively new game. Uplink is pretty old. It is fun, though if you look at it. All the missions are the same, and I'm at the stage that the good rated missions are not coming in. Anyway... :: When we last left off, we were doing some database copy. Now we are sort of out of missions but soon new will pop up. Last type of mission we can be given is to ruin someones life. IT's either hack into criminal database and create false criminal record and make him arrested, or frame for hacking. The first one is easy and it doesn't require anything special. Now the other ones are more dangerous because you are on short time limit. The thing is you cannot use more than 3-4 bounces which gives you ~25 seconds. Some missions would only require to activate active trace, disconnect and then modify log that would point to a personal computer of the person in question. There is also missions that you will still need to delete all the files and that means you need to be fast both on keyboard and mouse. Ok so let's how this looks like.The mission description will be something like this: https://i.imgur.com/qGT6V3P.jpg So we are given who to frame now we need to chose how to deal with it. Let's first choose a target comapny. Create connection with small amount of bounces like this. https://i.imgur.com/MbFvQOF.jpg Connect, start bypassing password without disabling monitor, disconnect after few seconds. Go to InterNIC, now instead as we usually deleted logs, we need to modify one. In order to do that we need to first buy Log_Modifier software. Once we have visual on the logs in InterNIC we are searching the one that is marked as bounce log. Change IP from ours to the person who should be framed and we are done. https://i.imgur.com/htP8lgq.jpg We need to wait again few hours so the news will indicate that police captured a hacker and get our money. The other method of hacking into Global Criminal Database. Once you find the person, add 2 convictions to his list and in order for arrest to be accepted you need to add Broke Parole. Otherwise it will not work. After 3 hours the man will be arrested. https://i.imgur.com/yNK3RZ7.jpghttps://i.imgur.com/QdmcnTH.jpg And that's it for Today's mission types. However there is one more thing (or 2). There is a followup on the last news made by Uplink hacker. https://i.imgur.com/PGhMM93.jpg Second, we are ranked 2 as the best hacker. https://i.imgur.com/vRwLmfK.jpg Next time I will probably be showing how to get serious money and buy the best gateway. But for now, see you next time. Link to comment Share on other sites More sharing options...
silencer_pl Posted December 11, 2016 Author Share Posted December 11, 2016 And, Welcome back. Today I will show you 101 of being half Robin Hood of the hacking era. Why only half? Because we are going to rob a rich sucker and give all he has to poor ourselves. Don't try this at home. Step 1: Choose a Bank https://i.imgur.com/XtYd9vu.jpg Step 2: Get the Admins voice recordingStep 3: Connect to a bankStep 4: Bypass Monitor and Proxy (and Firewall if applicable)Step 5: Crack all the other security measures. https://i.imgur.com/WRa1s3c.jpg Step 6: Get yourself pen & paper. Step 7: Login under Admin, go to View Account Lists and start writing down all those delicious account numbers. Step 8: Start hacking those account numbers.Step 9: Once you are lucky you will find that kind of account. https://i.imgur.com/qbrURNs.jpg Just look at all the money. Step 10: Do a transfer to one of your accounts. Preferable to the one in the bank you are in. Will save you a lot of precious time. https://i.imgur.com/Nknnrr9.jpg Step 11: Once done quickly remove the transfer statement from both, the account you've just robbed and your account. https://i.imgur.com/REePhOh.jpg Step 12: Go to Admin again and remove any information you might have leftStep 13: Go to InterNIC and delete your logs too. Congratulations if you did not screw up you are now legal owner of large sum of credits. And even Uplink will congratulate you. https://i.imgur.com/10ODQFH.jpg So what to do with this amount of money? Well we are going to buy the overall best Gateway, upgrade it to the max and next time I'll show you how LAN hacking works. https://i.imgur.com/Kc8kBwB.jpg Link to comment Share on other sites More sharing options...
silencer_pl Posted December 17, 2016 Author Share Posted December 17, 2016 Alright, Today we will be dealing with those 3 remaining missions that require hacking LAN. Two of them are delete all files, the third one is copy files. Now LANs are quite a minigame itself and also require to be very fast. Unfortunately my hand-to-eye coordination is not that great, but we will manage somehow. Anyway before you start prepare pen and paper and make sure you have IP_Lookup software. First thing to do is to get admins voice recording. Once that is done connect to the server provided in mission description. You will be greeted with following message. https://i.imgur.com/TLNolGE.jpg First task is to disable everything you did in previous missions. Once done switch to LAN view. You will now see this. https://i.imgur.com/0UTkQZI.jpg This is your starting point: a Router. If you don't know what router is, then I don't know what you are doing here. First thing to do is to run LAN_Scan it will reveal everything that is visible on the LAN through your current connection. https://i.imgur.com/MH765L4.jpg Now we are going to use LAN_Probe, to detect where our Router leads to. Our final destination is Master Server. After some probing we have reached a wall (locks) and cannot proceed any further for now. To bypass locks we could either user LAN_Force software or find something else that removes the lock. Using LAN_Force alerts the Admin who starts active trace on the connection and tries to find you in LAN and will kick you out. Connecting to Master server also creates admin alert so it's best to not use LAN_Force unless you don't have a choice. Fortunately in our situation we have Authorization server which can unlock one of two locks. https://i.imgur.com/oNo4qR3.jpg So let's connect to it and disengage one of the locks. Following down the line with more probing we have found an isolation bridge. It is also part of the LAN that is responsible for controlling locks. However it is more complex and controls two locks. When you open one lock it closes the other. So once I will disengage the second lock my connection will be cut, but I can then follow other path. https://i.imgur.com/AmMe60B.jpg The second lock was protecting master server, so now it begins a true challenge. Race with time to do our stuff before Admin boots us from the LAN. We don't want that because it creates a risk of getting Feds on our tail. https://i.imgur.com/qE1a0V9.jpg In this example our taks is to delete all the files. Deleting files from the console is a slow process and now with high tech Gateway we could delete all the files manually much faster. Once inside the master server an alarm will be triggered and we have not so much time. First we need to use that voice identification and the crack a password. Once inside we will delete files as we've started our career. https://i.imgur.com/v3qthci.jpg Once all the files are deleted disconnect and remove all the logs you've made in InterNIC. Now we need to wait for the news of the Feds. Now the second mission, same deal. This time we have different LAN layout a little simpler but we have new thing: a modem. Modem is another way to get inside the LAN. If you can see the isolation bridge will block our access to the LAN once we use it. So first connect to the modem and remember the phone number. https://i.imgur.com/xhJMu9I.jpg Now disconnect from the LAN, type the number to the IP_Lookup. You will get a new endpoint on the map. Connect to that endpoint and you will connect to the LAN from that modem. https://i.imgur.com/bm21hDx.jpg Proceed as in last mission and don't get caught. Our third mission to copy files doesn't bring new things and the layout is pretty simple. https://i.imgur.com/LlHdHyz.jpg Just make sure not to get caught while copying files and everything will be alright. https://i.imgur.com/8OAy4E7.jpg So that's all for now. What else is to be done? Wait for that story about ARC to develop. This will be the end game stuff which will be much more harder than everything else we've done here. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now