|
[Currently Available]
Getting Started:
Setting up your accounts.
First Mission:
Completing the first mission and obtaining your hackshop IP
Hackshop Tools:
Use and requirements of hackshop tools/exploits.
[more to come. no section is considered complete]
if you have any questions or suggestions, feel free to contact me
menu items will lose their strikeout as content becomes available
Opening accounts:
• Open Browser.exe and search for 'mail'
• Select a website and follow the prompts to create a new email account
(account credentials are saved in Menu -> Preferences -> Accounts)
(some credentials are also saved locally. see security tutorials)
• Click the home icon to return to search and search for 'bank'
• Select a website and follow the prompts to create a new bank account
• Return home and search for 'shop'
(think like a hacker and avoid places you might search for new players)
• Select a website and navigate to the "shop"
• Rent a Basic Server and download nmap
(you will return later for libraries and computer upgrades)
Connecting to a proxy server:
• Open Mail.exe
• The first email will be the log in credentials for your new server
• Open a new Terminal.exe and enter 'ssh root@[password] [ip]'
(this is your proxy server. any action risking exposure should be completed here)
(it is advisable that home and servers be secured before exploring player content)
• The second email is your first job. Continue to the next section for more information.
Gathering information:
• The first step when starting any attack should be to 'nmap' your target
(if you have not already installed nmap, you can download it from any regular shop)
• Enter 'nmap [ip]' in the terminal for port and library details
• You can see that an SSH port is open to outside connection
(connect to any open ssh port with 'ssh [user]@[password] [ip]')
(until you have tools or access to a hackshop, this is the only way to access this server.
• Another way to gather information about a target IP is 'whois [ip]'
Obtaining login credentials:
• Social Engineering has many uses, including ways to obtain user credentials
• Open Mail.exe and click the pencil to access email templates
Finding and deciphering the data:
• Once a password is obtained, use 'ssh' to connect to the user
• Locate the users email file and use 'decipher /file/path' to crack the email password
(decipher is included as an attachment with the mission email)
• Once the password has been deciphered, reply to the email with only the password
• You will hear back shortly with the IP of a private hackshop
(hackshop IPs are private. sharing or using someone elses IP puts you at risk.)
• Continue to the next section for information on hackshops
-Protect your information-
The obvious but not always easy way to ensure your security is to not let anyone obtain your IP address.
Some of the common ways a hacker will attempt to locate your information are the following:
•Finding your ip in logs from websites, servers, shops, etc
•Tricking you into running a malicious file or visiting a server
•Using social engineering to obtain useful information
•Keep all of this in mind when interacting with players, player content, and searching the web
-Fix your permissions-
When you load into a new system, all user permissions will be set to defaul configuration. Typically, this type of configuration can lead to vulnerabilities, allowing hackers to read, create and execute files with low level permissions.
In order to prevent this, you must constantly ensure that your system settings provide only the permissions necessary to remain functional.
•To change system permissions, use the chmod command
usage: chmod [opt:-R] [u,g,o+wrx] [path file/folder]
-R: applies permissions recursively
u,g,o: user = root; g = group(users); o = other(guest)
only one user type can be used at a time
rwx: r = read; w = write; x = execute
set multiple at once: u+rwx o-w g+rx
•The entire file system can be changed with
•Individual folders and files can be changed with
•never remove group execute permissions from essential start up files on your home pc
ie: Terminal.exe and sudo
A server should have permissions removed for all users, on all files and folders
-Update your port forwarding-
Port forwarding allows you to open (or close) access to running services.
By default, your home computer will usually have at least one port forward
To an NPC service running in your network. Since you will never need to access
your home from an external source, and you should not host services from your
Home ip, the best practice is to simply remove all port access
To access port forwarding options, type in terminal: Browser.exe [gateway ip]:8080
If you do not know your gateway ip, use if config in terminal or launch ScanLan.exe
(Typically, the router IP will be: 192.168.1.1... but not always.
Eg: Browser.exe 192.168.1.1
-get secure libraries-
Libraries, or .so files, are internal files that are automatically generated
when a server is first generated into the world or when a service is started
Using the service start files (ie: http-server).
|