corTechs

source tools and information




-welcome to corTechs-


[5.1.04] 300 accounts added to banks.txt
[4.30.04] secure libs added (ssh/http/router)
[4.29.04] [hack attempt] added to player list
[4.22.04] 450 accounts added to banks.txt
[4.20.04] website relaunched























4 unique visits



***spoiler alert***
some content may ruin the adventure
use as refernce and make something better




-downloads-



Get Shell
(source)
LAN Map
(source)

*basic library attack - returns shell*
*works on all devices, remote and local*
-exploits all vulnerabilties of target port library
-'launch terminal' option when shell found
-optional password or lan ip parameter

*scans lan network and prints map to console*
*maps all connections to open/closed ports
*full hierarchy with ip/port/device/type/status

-labels router/switch/firewall
-lists all ports and current status
Corrupt Logs
(source)
Secure PC
(source)

*corrupt local system.log file*
-removes all log entries
-leaves optional message in system.log
-no disconnection log on exit
-use: sec [home/server/remote] or [h/s/r]



*Secures local pc*
-home/server/remote settings
-ONLY run 'home' on home pc
-removes all password files
-removes guest folder
-resets all permissions
-(remote: full perms to all users)

File Management List
(fml)
File Handler
(template)

*file and folder management*
*keypad or path navigation*
*full permissions control*

edit files and folders:
-add files and folders
-view/add/clear txt/src
-move/copy/delete
-build .src
-launch scripts
-empty folders
-h for help

*creates fake computer object from remote file object*












Get Remote User
(template)
Connect Wifi
(source)

*finds user of remote object*
*accepts shell/computer/file objects*
*returns current user as string ("root/username/guest")*

requires implementation into existing tool
may not work with player edited permissions

*auto connect to selected wifi*

-automatically runs airplay/aircrack
-displays password
-automatically connects


getRich
(source)

- auto bank finder/decipherer
- creates database of vulnerabilities
- generates 100-300 deciphered accounts/hr



























-wall of shame-

[notice: ip of hack attempts will be made public]


[85.1.223.93]



















Tutorials

Beginner:





Intermediate:




Advanced:




Scripting:


Tutorials:

[Currently Available]
Getting Started:
Setting up your accounts.
First Mission:
Completing the first mission and obtaining your hackshop IP
Hackshop Tools:
Use and requirements of hackshop tools/exploits.

[more to come. no section is considered complete]
if you have any questions or suggestions, feel free to contact me
menu items will lose their strikeout as content becomes available
[Getting Started]

Opening accounts:

• Open Browser.exe and search for 'mail'
• Select a website and follow the prompts to create a new email account

(account credentials are saved in Menu -> Preferences -> Accounts)

(some credentials are also saved locally. see security tutorials)

• Click the home icon to return to search and search for 'bank'
• Select a website and follow the prompts to create a new bank account
• Return home and search for 'shop'

(think like a hacker and avoid places you might search for new players)

• Select a website and navigate to the "shop"
• Rent a Basic Server and download nmap

(you will return later for libraries and computer upgrades)

Connecting to a proxy server:

• Open Mail.exe
• The first email will be the log in credentials for your new server
• Open a new Terminal.exe and enter 'ssh root@[password] [ip]'

(this is your proxy server. any action risking exposure should be completed here)
(it is advisable that home and servers be secured before exploring player content)

• The second email is your first job. Continue to the next section for more information.

[Completing the First Mission]

Gathering information:

• The first step when starting any attack should be to 'nmap' your target

(if you have not already installed nmap, you can download it from any regular shop)

• Enter 'nmap [ip]' in the terminal for port and library details
• You can see that an SSH port is open to outside connection

(connect to any open ssh port with 'ssh [user]@[password] [ip]')
(until you have tools or access to a hackshop, this is the only way to access this server.

• Another way to gather information about a target IP is 'whois [ip]'

Obtaining login credentials:

• Social Engineering has many uses, including ways to obtain user credentials
• Open Mail.exe and click the pencil to access email templates

Finding and deciphering the data:

• Once a password is obtained, use 'ssh' to connect to the user
• Locate the users email file and use 'decipher /file/path' to crack the email password

(decipher is included as an attachment with the mission email)

• Once the password has been deciphered, reply to the email with only the password
• You will hear back shortly with the IP of a private hackshop

(hackshop IPs are private. sharing or using someone elses IP puts you at risk.)

• Continue to the next section for information on hackshops

[Hackshop Tools]

-Hack Shop Tools-

(some tools and default programs can be compiled locally (and for free) by clicking 'view code' in Manual.exe)

AdminMonitor.exe: Monitors for admin activity on hacked connections

Keep this running on your home PC any time you are hacking npc networks
If an active trace begins, you need to remove your shell/deletion logs and exit the machine

crypto.so: Required for cracking, hacking wifi and obtaining an smtp user list

This should be kept in /lib on any computer you use to decipher passwords

metaxploit.so: Required for most hacking. Used to attack libraries, create rshell/server and run sniffers.

This should be kept in /lib for all default exploit tools.
(see advanced tools for more details)

decipher: Password deciphering tool. Utilizes crypto.so library.

scanlib: Library scanning tool. Utilizes metaxploit.so libray

Scans local library and returns a list of exploitable memory values and their requirements

scanrouter: Firewall detection tool. Returns firewall information for a router.

sniffer & rshell: NPC/Player hacking tools.

(see hackshop jobs and hacking players for more details)

[Hackshop Jobs]
[Understanding Libraries]
[Understanding Networks]
[Securing Your Home and Servers]

-Protect your information-

The obvious but not always easy way to ensure your security is to not let anyone obtain your IP address.
Some of the common ways a hacker will attempt to locate your information are the following:

•Finding your ip in logs from websites, servers, shops, etc
•Tricking you into running a malicious file or visiting a server
•Using social engineering to obtain useful information
  •Keep all of this in mind when interacting with players, player content, and searching the web


-Fix your permissions-

When you load into a new system, all user permissions will be set to defaul configuration. Typically, this type of configuration can lead to vulnerabilities, allowing hackers to read, create and execute files with low level permissions. In order to prevent this, you must constantly ensure that your system settings provide only the permissions necessary to remain functional.

•To change system permissions, use the chmod command

usage: chmod [opt:-R] [u,g,o+wrx] [path file/folder]
-R: applies permissions recursively
u,g,o: user = root; g = group(users); o = other(guest)
only one user type can be used at a time
rwx: r = read; w = write; x = execute
set multiple at once: u+rwx o-w g+rx

•The entire file system can be changed with
•Individual folders and files can be changed with
•never remove group execute permissions from essential start up files on your home pc
ie: Terminal.exe and sudo A server should have permissions removed for all users, on all files and folders -Update your port forwarding- Port forwarding allows you to open (or close) access to running services. By default, your home computer will usually have at least one port forward To an NPC service running in your network. Since you will never need to access your home from an external source, and you should not host services from your Home ip, the best practice is to simply remove all port access To access port forwarding options, type in terminal: Browser.exe [gateway ip]:8080 If you do not know your gateway ip, use if config in terminal or launch ScanLan.exe (Typically, the router IP will be: 192.168.1.1... but not always. Eg: Browser.exe 192.168.1.1 -get secure libraries- Libraries, or .so files, are internal files that are automatically generated when a server is first generated into the world or when a service is started Using the service start files (ie: http-server).
[Sniffers and Reverse Shells]
[Hacking Websites]
[How to Find Players]
[Hacking Players]