Put it on this site couse Mouser wants to merge our sites. Street Hacker Virtuweb Interactive Table Of Contents Introduction Terminal Commands Starting Point It Starts Assignment 1 Assignment 2 Assignment 3 The Real Deal (Final Ionix Mission) Prison! Extras(Note Books) Phreak Boxes and Hubs Weapons Cheats More missions Introduction Street Hacker is a very intricate game that is an embodiment of its name(not man y games have fully accomplished this). The basics of the game are rather tough a t first but once you catch onto it you have it. with that out of the way let me pipe a command referrence. Terminal Commands HELP: Displays help documentation. CLS: Clears the console display. CTRL+R Recalls the previously executed command. WRITE_LOG: Writes the console display to a log file. TIMESTAMP: Enables / Disables the console timestamp feature. IPSCAN: Run a ranged IP scan. PSCAN: Port scan a remote system. WHOIS: Online query for server information. .. Navigates to parent folder of current directory. C: Open / Displays a directory or rile. L: Open directory or filepath on local machine. [PATH NAME] Opens a directory or file from current directory. REFRESH: Refreshes the contents of the current directory. OPEN: Open a file in an external viewer for editing. DELETE: Deletes a file or a directory and its contents. DOWNLOAD: Download a remote file or directory. UPLOAD: Upload a file to a remote server. ZIP: Compress a file zip:[FILE PATH] UNZIP: Uncompress a file unzip:[FILE PATH] ENCRYPT: Encrypt a file encrypt:[FILE PATH] DECRYPT: Decrypt a file decrypt:[FILE PATH] CONNECT: Connect to server connect:[IP ADDRESS]:[PORT] RECONNECT: Attempt to reestablish your internet connection. DISCONNECT: Terminate connection to a remote server DIS: Terminate Connection to remote server LOGIN: Login to a LAN login:[NAME]:[PASSWORD] RUN: Execute an exploit script. CLEARROUTES: Empties your Routing List. ROUTE: Adds another routing connection.
LAUNCH: Launches a virus at a remote server VIRUSSCAN: Performs a complete virus scan FORCE.GEN: Login credentials brute force generator. FORCE.LIB: Login credentials library generator. A Few Hints First and Foremost, WATCH THE TUTORIAL! It is very helpful in getting comfortabl e with the game itself. There is no tutorial that can tell you exactly where to go or what to do. Most o f the missions are dynamic (meaning the specifics (like ip address and open ports) are generated at random). So dont exp ect this to explain exactly where to go and what to do...that would take the fun out of it all. Try to keep your b ankroll over $400 at all times. You dont want to lose your Solid Software subscription at any point (believe me its happened to me a few times *uggh*) It Starts.... (The Ionix Missions) So its safe to assume you've watched the opening talk scene and the convenient l ittle tutorial Vince offers. once completed you'll receive 3 emails. I'll run you through them in order.
[email protected] This email is simple, it details the offer from solid so ftware solutions to get you an account with them for a small fee ($100/week). you need to reply to this email with the string "i want to subs cribe" wait a few minutes and you should receive 2 more from that same person. one is t he software offers which details what programs they have and the other is your login information. This information is always the same. so lets make a macro so SS can be reached easily at anytime. minimize the email client and lets open the explorer. in your root directory(C:\) right click the screen and click new macro. When create it should be new macro##.mcr (## means a random 2 digit numeric code). Right click it and click rename. rename the file s s.mcr and press enter. Now double click the file. This should bring up the file editor(it looks a lot l ike the dos edit client i know but stay with me). In the editor the first 3 lines need to be: connect:20.155.48.10:21
[email protected] (replace this with your email address EG:
[email protected] t) c: Click close at the top of the file editor. Now close the file explorer. Now we w ant to tryout the macro we just created so we'll need to open the terminal. Once you have done that type ss.mcr and watc h as it automatically loads up the SS FTP Server. Since we're here lets have a look around. First we'll need to get you some programs to get you on your way so lets go to the c:\pub directory. You'll want to download generator.exe an d library.exe. simply accomplished with the following commands: download:c:\pub\generator.exe download:c:\pub\library.exe Once finished, minimize the terminal and go back to your email client. Vince's e mail is pretty much obvious since it merely tells you that you can activate the help system at any time by pressing F 1. On to more important business, Mordecai's email.
Assignment #1 ______________________________ \ Assignment #1 / //==========================\\ Deadline: 8:16 AM 7.18.03 Payment: $150 Target Server IP:30.12.80.215 Download the practice.doc from the documents directory of the target server. Whe n your done make sure you send the file to my e-mail inbox. Just hit reply and attach the file. End of Briefing... Open the terminal. First thing you need to do is a port scan (whoising the ip wo uld be a waste of time because it would merely return the registered server name which will be displayed when you connec t anyway). So you would need to do this: pscan:30.12.80.215 Once you have the search results, look for a "File Upload" port. Once found you' ll need to connect to it. Lets say its port 21. connect:30.12.80.215:21 You should receive the following message: Connecting to: 30.12.80.215 on port 21 WAN Connection Established to (30.12.80.215)... This is a practice server to test your skill. Awaiting User Login Name: Uh Oh! We don't have the proper login credentials. Guess its a good thing we bou ght that Brute Force Generator and library file huh? Type the following command and within a few seconds you should have all the info you need. force.gen: Once you receive the login credentials you need to login. To do this first type the username by itself and then the password. Once logged in you should see "user (username) logged in". now you nee d to open the root directory by typing c: in the command line. look through each directory for the file "practic e.doc". Once you have found it close the terminal and send it to mordecai. Assignment #1 complete. Assignment #2 Once you have sent "practice.doc" to mordecai you'll receive an email detailing Assignment #2. Two of them actually. One containing the mission details (below) and another containing a single file "log s.txt". (save the attachment before you proceed) ______________________________ \ Assignment #2 / //==========================\\ Deadline:4:16 PM 7.16.03 Payment: $275 Target Server IP: 41.15.67.115 Let's try another assignment. This time I want you to replace a security log fil
e. You might have to dig for it because it's not out in the open like the practice.doc. The filename is logs.txt and it is relativity small, about 20kbs. Alright get to work, and don't screw this up, the server may be a bit more challenging t o hack this time. End of Briefing... Don't let his wording fool you. This hack is about as easy as the last one. We h ave our information so the first order of business (as always) port scan the IP and get a list of the ports open. Find a F ile Upload Port and connect to it. (I dont need to show you that again so I'll skip that part). Again lets assume port 21 i s open and try and connect to it (connect:41.15.67.115:21) Once connected, it will ask you for a user name so run your generator and login. Navigate your way to the root directory (c:) and look through the folders. You'll find an "access" folder. Thi s is where you want to be. Well lookie here! Theres the file we want "logs.txt" so just do a quick delete and up load: delete:logs.txt upload:c:\logs.txt Get out of the server Disconnect: Assignment #2 complete. Assignment #3 Speeding along aren't we? You'll receive another email from mordecai within a fe w seconds detailing the final practice mission before the real game begins. This one may be a bit more d ifficult than the last but nothing a leet hax0r like yourself can't handle right? Well shall we get dow n to business? Check the email from mordecai ______________________________ \ Assignment #3 / //==========================\\ Deadline: 6:16 AM 7.18.03 Payment: $400 Target Server IP: 75.80.194.190 Let's try another assignment. This time I want you to delete some miscellaneous files from the last test server. This server is much more difficult than the others. It is behind a firewall so y ou will have to buy a sniffer virus in order to retrieve a login credentials. The files I want you to delete a re: File: factile48.doc File: products.bin File: prplan.xls They may not all be clumped together so keep your eyes open once you get inside. Don't let me down; I have given you 2 days to complete this assignment! End of Briefing...
First things first (no I don't mean port scan, not yet anyway). We need to open the PCQ console and design a keysniffer. It doesn't have to be big just basic. Now that we've designed our worm we'll need to wait for PCQ to send it to us. As soon as you receive the email from
[email protected], save the attachment, then run the exe from the expl orer window. This will extract it to the PCQ vault and make it available for launch on remote servers. Ok open the terminal, You should notice something different. In the top right hand corner of the terminal window is a vi rus list. These are used with the launch command: launch:virusname The first things you should do once in the Terminal should be common by now. Por t Scan, Connect, Login Generator. Now the difference is, once you've gained access to the WAN you'll also need to get login credentials for the LAN. The LAN is behind a firewall so this is where our keysniffer comes in. launch:keysniff *The actual Virus Name will be listed in the top right of the terminal window. When you receive the login credentials for the LAN you'll need to perform a logi n command: login:username:password Once logged in we need to get to the root directory (c:). Once in root we'll nee d to get to the "home" directory (c:\home). When that directory opens you'll notice the first file on our list to delete is at the very bottom. So run the delete command on "products.bin" and we move on. The administration f older is next on our list. (c:\home\administration) Once inside you'll notice theres only one file, and tha ts the file we are looking for. (delete:prplan.xls) Back out to c:\home and go into the testing directory. you'l l find "factile48.doc" in there. Delete it then disconnect from the server. Assignment #3 complete. The Real Deal (Final Ionix Mission) You must have gotten used to all of this by now, right? Well here comes the fun part. When you receive mordecai's email you'll notice he left a minor detail out. The IP Address! We'll have to do search to find it but its very minor. Lets have a look at the mission details. ______________________________ \ The Real Deal / //==========================\\ Deadline: 11:16 AM 7.19.03 Payment: $500 Target Server IP: EA Production Server Well this is the moment you have been waiting for. You get to show me your true skill. This mission will be
taking place on Eastern Analog's EA Production Server. This is very important, a nd I know I can count on you to get the job done. I am giving you 2 days. Modify the employee_plan.doc This following original record [MIS 2113-026 Databases Tado AH300] must be edited so that it says [MIS 4555-666 IT_Management Crow AH600] I will contact you if I hear word that Eastern Analog is panicking because of th e alterations you have made. End of Briefing... So he wants us to break into the Eastern Analog Production Server and modify emp loyee_plan.doc. Piece of cake right? I agree. First thing we need to do is crack open the terminal and do a search on EA (leave out the rest because it will return a lot of search results). whois:EA Now we have our search results. So lets go ahead and port scan the ip registered to EA Production Server (some of the IP addresses are generated by the game randomly so theres a chance yours may be different than mine.). So now we have a list of open ports. Connect to a file upload port and start our normal routine (get full login credentials). Once logged in we need to do a full path navigate to (c:\documents \user\dev). Theres the file we need to edit so lets run the open command. open:c:\documents\user\dev\employee_plan.doc find the line: MIS
2113-026
Databases
Tado
AH300
Crow
AH600
and change it to: MIS
4555-666
IT_Management
Save the file and disconnect. Ionix Missions Complete! Prison and Vengeance! It was a setup! Mordecai hired you to do his dirty work and let you take the fal l for all of it. Guess we'll have to show him what happens when you cross the wrong people. But first you have 4 year s of jail time to look forward to before that happens. (BUGGER!). Guess thats enough time to think up what you pla n on doing to him when you get a hold of him right? In Search For Answers Oddly, you get released from prison around 3 years and 8 months early (strange e h?). You meet with Vince and he gives you a notebook and wishes you the best. At this point the game will autosave and you come back out to the main menu (for those of you that only downloaded the demo...sorry but this is where your g ame ends). Once you boot up your machine you'll receive an email from
[email protected] and get some answers that you've been waiting for and also a
promise to receive the rest of them after you prove yourself. This mystery man i s responsible for altering your prison records and also has key information on The Ionix Corporation but refuses to give it to you unless you complete a few tasks for him...
Extras NoteBook Stats CON
=
AR
=
Connections(1/4 means that the computer only has a modem, 4/4 means the computer has modem, lan, wireless, and optical) Average rating(higher the better)
NAME AR Wizard XF 950 P2 3 *Integrated 8MB
CPU
VIDEO
MEM
HD
#
CON
COST
450MHz
8MB*
32MB
5GB
8lb
1/4
$504
Wizard XF 1000 P2 6 *Integrated 8MB
500MHz
8MB*
64MB
5GB
8lb
1/4
$515
Wizard XF 1150 P3 9 *Integrated 16MB
550MHz
16MB*
64MB
10GB
8lb
1/4
$535
Wizard XF 1200 P3 12 *Integrated 16MB
600MHz
16MB*
64MB
10GB
8lb
1/4
$562
Wizard XF 1250 P3 15 *Integrated 32MB
650MHz
32MB*
128MB
15GB
7lb
1/4
$597
Wizard XF 1300 P3 18 *Integrated 32MB
700MHz
32MB*
128MB
15GB
7lb
1/4
$640
Warlock LR 2000 P3 21 *3D XCEL 16MB
800MHz
16MB*
64MB
15GB
8lb
1/4
$692
Warlock LR 2500 P3 24 *3D XCEL 16MB
900MHz
16MB*
64MB
20GB
8lb
1/4
$751
Warlock LR 3000 P4 26 *3D XCEL 32MB
1.0GHz
32MB*
128MB
25GB
7lb
2/4
$817
Warlock LR 3500 P4 30 *3D XCEL 32MB
1.1GHz
32MB*
128MB
30GB
7lb
2/4
$891
-----
Warlock LR 4000 P4 32 *3D XCEL 64MB Warlock LR 5000 P4 25* *3D XCEL 64MB
1.2GHz 64MB*
256MB
35GB
7lb
2/4
$974
1.3GHz
64MB*
256MB
40GB
7lb
2/4
$1,064
Vanquish VX 5500 38 *Discharge 6000 32MB
1.4GHz
32MB*
256MB
40GB
7lb
2/4
$1,161
Vanquish VX 6000 41 *Discharge 6100 32MB
1.5GHz
32MB*
256MB
45GB
7lb
2/4
$1,267
Vanquish VX 6500 44 *Discharge 6200 32MB
1.6GHz
32MB*
384MB
50GB
7lb
2/4
$1,381
Vanquish VX 7000 47 *Discharge 7000 64MB
1.7GHz
64MB*
384MB
60GB
6lb
2/4
$1,502
Vanquish VX 7500 50 *Discharge 7500 64MB
1.8GHz
64MB*
512MB
70GB
6lb
3/4
$1,631
Vanquish VX 8000 53 *Discharge 8000 128MB
1.9GHz
128MB*
512MB
80GB
6lb
3/4
$1,768
Vanquish VX 8500 56 *Discharge 8300 128MB
2.0GHz
128MB*
768MB
90GB
6lb
3/4
$1,913
Vanquish VX 9000 54 *Discharge 8600 128MB
2.1GHz
128MB*
768MB
100GB
6lb
3/4
$2,065
Vanquish VX 9500 62 *Discharge 9000 256MB
2.2GHz
256MB*
1024MB
110GB
5lb
3/4
$2,226
Vanquish VX 10000 65 *Discharge 9500 256MB
2.3GHz
256MB*
1024MB
120GB
5lb
3/4
$2,394
Celestial CX6.0 P4 68 *Nitrous 3D 256MB
2.4GHz
256MB*
512MB
140GB
6lb
3/4
$2,571
Celestial CX6.1 P4 71 *Nitrous 3D 256MB
2.5GHz
256MB*
512MB
140GB
6lb
3/4
$2,755
-----
-----
Celestial CX6.2 P5 74 *Nitrous 3D 256MB
2.6GHz
256MB*
512MB
512MB
6lb
3/4
$2,946
Celestial CX6.3 P4 76 *Nitrous 3D 256MB
2.7GHz
256MB*
1024MB
160GB
6lb
3/4
$3,146
Celestial CX6.4 P5 79 *Nitrous 3D 512MB
2.8GHz
512MB*
1024MB
160GB
5lb
4/4
$3,353
Celestial CX6.5 P5 82 *Nitrous 3D 512MB
2.9GHz
512MB*
1024MB
160GB
5lb
4/4
$3,568
Celestial CX6.6 P5 85 *Nitrous 3D 512MB
3.0GHz
512MB*
1536MB
180GB
5lb
4/4
$3,792
Celestial CX6.7 P5 88 *Nitrous 3D 512MB
3.1GHz
512MB*
1536MB
180GB
5lb
4/4
$4,022
Celestial CX6.8 P5 91 *Nitrous 3D 512MB
3.2GHz
512MB*
1536MB
180GB
5lb
4/4
$4,261
Celestial CX6.9 P5 94 *Nitrous 3D 512MB
3.3GHz
512MB*
2048MB
200GB
5lb
4/4
$4,508
Celestial CX7.0 P5 97 *Nitrous 3D 1024MB
3.4GHz
1024MB*2048MB
200GB
5lb
4/4
$4,762
Celestial CX7.1 P5 100 *Nitrous 3D 1024MB Hybrid Fusion NS8
3.5GHz
1024MB*2048MB
200GB
5lb
4/4
$5,024
P8 10.0GHz
3072MB*10240MB 1TB
3lB
4/4
$1,000 300
Phreakboxes and Hubs *PHREAKBOXES NAME COST Black Box I $200
DISCRIPTION
INT
Disables many building security cameras
LOW
Black Box II $400
Disables most building security cameras
LOW
Black Box III $600
Disables all building security cameras
MED*
Chrome Box I $600
Manipulates traffic signals with a
MED*
.5 mile radius of effect
Chrome Box II $800
Manipulates traffic signals with a
HI
1 mile radius of effect Chrome Box III $1,000
Manipulates traffic signals with a
HI
2 mile radius of effect Blotto Box $400
Shorts out all phone lines in area
LOW
Dayglo Box $1,000
Causes a power grid failure in that area
HI
Dark Box $600
Disables all building elevators
MED*
Clear Box $600
Causes all automatic security doors
MED*
to lock Static Box $400
Activates building fire alarm systems
LOW
*Not sure if the wording meant HI,LOW, or MED so I put MED bassed on what I thou ght *PHREAKBOX HUBS NAME AND Phreakbox 3 Port Phreakbox 6 Port Phreakbox 9 Port
NUMBER OF PORTS Hub Hub Hub
3 6 9
# $200 $400 $600
COST
Weapons CON STR DEX RF # POW*
= = = = = =
Concealability Strength needed to opperate Dexterity needed to opperate Rate of fire Weight of weapon Power of weapon relative to other weapons (based on 1 through 6, 1 being lowest power)
*Pistols NAME CON Browning Hi-Power 2 Glock 17 1 Colt 1 Colt M1911A1 2 S&W M10 HI Colt Delta Elite 2 Sig Sauer P220 HI
STR DEX HI
RF LOW
COST HI
CLIP # 1.7
POW $250
13
6
HI
LOW
HI
1.7
$200
17
4
HI
LOW
HI
2.5
$160
6
4
HI
LOW
HI
1.7
$280
7
6
LOW HI
HI LOW
2.5 HI
$150 1.7
6 $470
4 8
1 6
LOW
HI
1.7
$330
7
6
2
Colt King Cobra HI S&W M29 LOW H&K USP HI Beretta m92 1 Desert Eagle 3 *Submachine Guns NAME CON Thompson M1928 SMG 2 IMI Uzi SMG 1 H&K MP5 SMG 1 IMI Mini-Uzi 1 Ingram MAC-10 SMG 2
LOW LOW LOW HI
HI LOW HI LOW
2.5 2.5 1.7 HI
$420 $500 $370 2.5
6 6 7 $170
4 4 6 15
2 3 2 4
MED
LOW
LOW
1.7
$450
9
6
RF HI
COST LOW
CLIP # 1.0
POW $520
30
9
HI
HI
LOW
1.0
$700
32
9
MED
HI
LOW
1.0
$550
30
9
HI
HI
LOW
1.0
$650
20
9
HI
HI
LOW
1.0
$750
20
9
RF HI
COST LOW
CLIP # 2.5
POW $800
7
9
HI
LOW
2.5
$730
7
9
STR DEX LOW
*Shotguns NAME CON STR DEX Benelli M1 Super 90 LOW 4 Winchester* LOW 4
*Winchester 1300 Marine (same stats as Benelli yet cheaper) *Assualt Rifles NAME CON U.S M-16 4 Steyr AUG 4 AK-47 5 *Machine Guns NAME CON Browning* 6 M-60 Machine Gun 6
STR DEX LOW
RF HI
COST LOW
CLIP # 0.8
POW $920
30
11
MED
HI
LOW
0.8
$900
30
11
LOW
HI
LOW
0.8
$950
30
11
STR DEX LOW
RF HI
COST LOW
CLIP # 0.6
POW $1,150
120
14
LOW
HI
LOW
0.5
$1,300
200
14
*Browning Automatic Rifle Cheats These must be typed directly into the terminal window (exactly as shown in the c ode column) ----------------------------------------------Code effect ----------------------------------------------down with the demo Finish the demo pronto internet fraud rules Steal 5000 from a random user com open Connect to the internet swordfish Get all login credentials i don't pay for software Get all Solid Software Products
overclock evil sunlight seconds) who needs sleep seconds) decipher timed out rush hour administrator guest
Get the Hybrid Fusion Fast forward to night time
(May take a few
Fast forward to daytime
(May take a few
Decrypt and Unzip everything on your computer Terminate all admin's traces Reset the streets with new dealers Computer login is no longer required Computer login is required
!!Warning!! The following section contains some spoilers. I have done my best to try and 'ce nsor' the content, but proceed at your own risk!
Table Of Contents Prove Your Worth 1 Prove Your Worth 2 Prove Your Worth 3 Prove Your Worth 4 Prove Your Worth 5 Long Awaited Answers Mercenary For Hire Recon and Feedback Script Kiddies Risky Business Prove Your Worth 1 Before we get into the missions themselves, theres a few things you're gonna nee d to know. First of all, All the programs you had are gone. You'll need to resubscribe to Solid Software. You' need to download a copy of the latest version of EVERYTHING including PCQ (believe me you'll need i t). Once you have done that install all the programs (dont double click on generator or library, they a ren't installers. Once all the installable programs have been installed, delete the installers from you r disk. Now go to the financial explorer program and withdrawel all but $500. The button beside the sh utdown button is for
"hitting the streets" click that. You'll want to buy a gun, a hub and any phreak boxes you can afford. If you tried the terminal already you'll notice you can no longer connect to the internet from home so you'll have to infiltrate buildings to do your hacks. (helpful hint: Find a buil ding with minimal security.) Now we need to do one more thing before we can get started(well actua lly 2). Go back home and boot up your computer. Open the PCQ Interface and recreate your keysniffer w orm. Now go into your financial explorer and deposit however much money you had left over from what yo u spent on the streets. Once you receive your new virus save it and extract it (you know the drill). Now you need to click the hit the streets button again but this time go downtown. Find a building you can hack from (UBS Tower is the one i use in chicago). Once you find a building to use click "Infiltrate". W hen you get inside the building you'll see a new menu (Figure 1.2). Activate any phreakboxes you have a nd then click the laptop icon to connect. Now you'll want to go into your email and read cnace's mission specifics. Once you have the company name he wants you to hit, open the terminal and whois the company whois:company name Example = whois:United Vidia Because you'll be hacking the same company over the next few missions (4 I belie ve) make a note in the "my docs" program with the whois info. Ok so now you have 2 ip addresses for the company nace wants you to hack and what we do next should be set in stone by now. Port Scan the first i p address. If you dont find a file upload port dont worry, thats why you downloaded the scripts from SS (you did download them right?). So if there is no file upload port we'll need to run a script to hack t he machine. (Hint: "Webservers" almost always have port 21 (FTP) open). I'm going to assume you alr eady gained access to the machine. So now we need to find the alphacode. First thing we want to look in is the documents folder. So we go to "documents" (if the server has one) and we notice that theres only one folder there "applications" and we know thats not what we need. So we'll have to check the other server. I w ont yank your chain anymore. Once in the second server (assuming the first one was running the Macross OS) th is one should be running Fedora. Which means you'll need to go to (c:\home\research\coding). Theres your file. download:c:\home\research\coding\alphacode.scp disconnect: decrypt:c:\downloads\alphacode.scp unzip:c:\downloads\alphacode.scp Now email the file to
[email protected] Prove Your Worth 1 Complete! Prove Your Worth 2 Uh oh! The company traced your activities back to cnace's company and managed to
steal an important document from him. Then that makes it obvious what we need to do. We need to scour both of bla cksteels servers and find what file they took. So we login to each server and search for a file. Look in the do cuments folder for "reports" inside that folder will be "rivalinfo.doc" and that is the file you need. delete:c:\documents\user\reports\rivalinfo.doc (if running on Macross OS) delete:c:\home\reports\rivalinfo.doc (for Fedora OS) Prove Your Worth 2 Complete Prove Your Worth 3 This one will be a bit tricky. You'll need to hit the streets and find an agent from the company and accept a job from them. You may have to travel to another city to find them. The compan y's name will be in the funder block on the mission selection screen. So you go back to your email and receive an email from your contact. So we need to design a virus to get their ip address. This part should be second nature. For the purposes of this tu torial I will assume you named it "callback" Open PCQ and create a basic IP CallBack trojan. Once you've extracted it to pcq you'll need to attach it to an email. (c:\programs\pcq\vault\callback.trj). Within a fe w seconds you'll receive an email from "Anonymous". That should contain the agents IP address. So what do we do now? (as if it's not obvious). Infiltrate a building and port scan the ip address. So we found an ope n port and connected to it. In the event that you need login credentials, you know how to get them. Once you've logged in we'll need to check their documents folder for a folder called "classidied". Well ther e it is, download mission_synopsis.lst and disconnect.decrypt it and send it to cnace. Prove Your Worth 3 Complete! Prove Your Worth 4 This mission will be a piece of cake if you've followed the other steps. The ema il will give you the file you need to replace and the exact server to replace it on. So go into your notepad file a nd find the IP Address for the server he gives you and port scan it. Connect, Login, Navigate to the root directory. G o into the documents directory and look for the hackcntct directory. Delete missionlist.dat from there and upload t he one you saved from nace's email. Prove Your Worth 4 Complete! Prove Your Worth 5 Oh yea! Here comes the pleasure of a real hack. Nace wants you to destroy his ri val company's server. So the first thing we'll need to do is create a Heart_Burn virus to get the job done. (you ma y also want to create a few viruses to distract the operator while you run the other virus.). So nace gives us the s erver he wants taken down and its up to us to get it done. So go back to your notes file and get the IP. Port Scan, C onnect, Login, same as always right? WRONG! Once logged in you need to start launching your distractions and when the y are all active, launch your heart_burn virus. If the virus is successful, you should see:
Remote Host Server Has Gone Offline Connection Terminated Prove Your Worth 5 Complete! Long Awaited Answers (...Or Not!) So you killed a little time waiting for morning and you finally receive nace's e mail. But wait. It's nace's secretary, Someones killed him! Bugger. The email leaves you still lookin g for answers with you only knowing that nace met someone affiliated with Ionix and the rest of the email wa s corrupted with a virus (vtoli.wrm - Hmm that seems suspicious for some reason). What shall we do now? M oments later we get an apologetic letter from Vince (strangely he knew about it fast). Those wheels in your head a re no doubt turning now as you begin to realize something fishy is going on and you'll stop at nothing to figur e out what it is. Vince offers you a position on his team, maybe this will give you a chance to do some "Footpr inting" of your own. So he wants you to do some intelligence gathering on the "World Banc" corporation. Mercenary For Hire (Money never was this easy) We'll need to get an active connection to the internet so go ahead and infiltrat e a building. Open up the terminal and do a whois on World Banc. Once an IP address is found we'll need to port sca n it, connect to it, login, and navigate to root. Now, we're looking for some sort of securityservers file. Once completed, disconnect. Now we need to decrypt the file and send it to Vince. When you've sent the file to vince go back to the terminal window a nd type: open:c:\downloads\*SecurityFile*. This will open the file for editing within the terminal window. Make a notepad c opy of the server IP addresses and save it.Save the bin file. This will prepare you for your next mission. Within a few minutes you get a reply from vince detailing the next phase of the mission. He wants you to take down the security servers (Hope you have your viruses ready). Once completed you'll have an extra $2000. Thats assuming you remember h ow to take down a server. (Launch each distraction and then launch your Heart_Burn virus) (note* Make sure you are logged into the LAN before killing the server. Use your keysniffer if neccesary.) Spoiler**You'll need to do this in ascending order. on through server #1.** World Banc Missions Completed! Recon and Feedback As he promised, Vince contacts you the next morning he is typing up the briefing for his next mission. A few seconds later you receive 2 "Reconnaissance". Once is your mission details and the other is a file you'll need lets have a look and what he wants us to do:
Start with server #5 and go
just after 9AM to inform you emails from Vince subjected to complete this mission. So
Ok, now I need to get the schematics for a high-tech device. They are locked awa y inside the Versynergy Corp Headquarters. I am going to insert an infiltration team to remove these schemati
cs but first I need you to do some reconnaissance. What I need for you to do is to send me the Maps of each fl oor. In addition, destroy surveillance camera feeds, change Joe Anthony's security pin to 44444 so we will have effortless entry, and to re-route security patrols with the new file I provide. The Versynergy Server' s IP address is *.*.*.* By the time you do this I should have the team prepped and ready to go. So he wants us to hack into the Versynergy Corporate Computer and make some chan ges. Mission Checklist: 1) 2) 3) 4)
Delete camera feeds Upload a new patrols file Change password for Joe Anthony Get maps for each floor
Piece of cake. Lets get started. First things first. We need to do our basic rou tine and gain access to the machine. Once in root, start looking for those files. So first we need to delete the camera feed. delete:***.*** Now we need to replace "patrols.mpg" with the one Vince gave us. (delete the old one and upload the new one.) and now we need to change the password for joe anthony. In the E column of the d irectory tree we can see that its set at Level 4 encryption so we'll need to decrypt the file first decrypt:c:\***\access_protocols.xls and then open it. once open we need to find joe anthony's record and change the password to 44444 and then save the file. Once that is complete we'll need to go find the scematics folder, and down load all five schematics files. When you finish downloading them, disconnect and send vince all 5 files. With the Rec onnaissance complete Vince will reply explaining that he will have further instructions the next morning.Surely as he said, just after 9 (seems to be a pattern here) Vince sends you an email subjected "Feedback" detailing the next s tep of his plan. Lets have a look at it: The team is mobilizing and I need you to create a distraction. The best way I th ink this can be achieved is by blowing up the downtown electrical sub-station. This will keep officers and othe r security officials busy for quite some time. I'll leave the rest up to you, and we will move after the sub-station blows. I am sure there are configuration files that can aid you. The IP of the substation is 237.23.67.170 and our window of attack is less than 1 day so think quickly. So he wants you to blow a substation. This can be quite tricky (if you think abo ut it too hard.) so lets keep it simple. Do the normal stuff and gain access to the root directory. From root we need to go to the electrical
system configuration directory. Here we have several files we could use to blow this substation. Most of them are config files and the other is a technical document. What we want to do is create an Overload Circuit by routing the outgoing electrical feed into the incoming elect rical feed. Spoiler**Find the Feedout Configuration File, and change it to this: [OUTGOING FEED] ROUTE TO [INCOMING FEED] . BOOM! ** Feedback is a Success! Script Kiddies (Gotta Hate Them!) So you've completed the feedback mission and made Vince a very happy man. He tel ls you he shouldn't need you for anything else. However, he emails you and tells you that some script kiddies hav e taken over his FTP server. He would do it himself but chance has it that he must go to a business deal and wou ld rather you did it. (chump change is better than non at all right?) He gives you his server IP and login cr edentials (nice change of pace). so we can skip the normal process. Open the terminal and use the connect command and connect to Vinsons FTP server Once inside we need to change his access settings (remove the script kiddies pri viledges) and save a copy of his access logs. Should be easy. Since we know where we need to go we can jus t hop in, make the changes, save the file, and get out. So we need to navigate to the appropriate folder. In this folder are 2 very obvious files First we need to remove the script kiddies access credentials so we would need t o open the Login file and delete their record. Once finished save the file. Now we need to download the access lo g and send it to vince. In the email he asks if we would look over the log and see if they did anything sus picious. So open your explorer and check out the Access Log file. Are my eyes playing tricks on me?! In the file, you find a very supsicious entry . Disregard that for now. Send Vince a copy of the access log and wait for his reply. He sen ds you some money and tells you to keep in touch. So now we have some work to do. You may want to purchase a faster machine because it gets rather hairy from here on in. Also download any new software from SS before proc eeding. Risky Business (Very Risky) Well now that we have an IP address we can scan, we need to start our normal rou tine, port scan, connect, login, root. Now that we have our root access we need to find the information Mr. Nace was trying to send us. Navigate to the appropriate folder, and you'll see that theres an encrypted email file fr om Mr. Nace. Download it and disconnect. navigate to c:\downloads and the run cipher on the email message (decrypt:c:\dow nloads\***.Email). Once decrypted, open it through your explorer. The content is as follows:
Spoiler** [The Truth You're Looking For] Contents -------------------------> You have well proven yourself. Apparently > there is nothing you can't do and I am truly > grateful for your services. As I promised I will > give you the truth you re looking for about Mordecai. > I believe it all started 3 years ago when I met #(DKAH;d akdie,c,fieijfgkdkd ... Ah, Ah, Ah, You'll just have to find this file for yourself! ** At this point, if this game was in real life, let's just say, You'd be pissed, o k? We have the IP address, the rest is obvious. Gain access to root on the Routing server. (you may need a script for this so make sure you have the latest ones.) From root we need to find the r outing list to get to the Ionix main server. So thats obviously a system log meaning its likely buried in one of the system folders. Only one folder here regarding Route Histroy (Hint!) Lets have a look. Inside yo u'll find an interesting log file download a copy and disconnect. This file contains a list of IP Addresses but on ly one of them should concern us: Spoiler** level0 64-40-53-115.nocost.com level9 82-34-70-173.cable.ubr02.gill.deepblue.R0Z$ level3 pool-141-150-15-fI&qd.east.verid.netN level1 Ottawa-HSE-ppp255969. .ca level0 64-40-53-11p92Hharge.comg level4 nantes-1-62-147-43-25 level0 193.117.110.154 level0 64-40-53-115.nocost.com level3 210.124.76.41 level6 62-147-43-251.dial.paroxism.net Again, Ah, Ah, Ah, you'll just have to find the rest of this file, for yourself! You hate me, don't you? *HINT* If you get stuck on this mission for too long, read the above paragraph. It implies a company name, you should look for in this History file. It only shows up once.. ** We have an IP address no doubt that that's our next stop. Doing a 'whois' on tha t particular IP address only confirms our suspicions.. How convenient is this? We have an IP Address that links directly to *** and now we can find out what he is up to. Gain root. From root we need to look for anything incriminating on *** so we'll need to check his documents. Wow, a writings folder, lets check this out. Hmm an online *** de crypt, download, disconnect. Open your explorer and open that writing file. Well this is interesting:
Spoiler** Entry #1 I decided that if I'm going to get into working with *** I better keep track of what's going on with my own organization; thus this Diary. Entry #2 *** has given their first assignment to my organization. Seems a bit risky but they're paying me a hell of a lot. Entry #3 Well, we've completed # *** assignments. The FBI started to catch on to our activities, but *** has bought out anDKjiae;lfkdagha;kl*(#@)*(^$# You guessed it! Sorry, but I can't let you just read through the entire game, Sorry! ** Son of a! It was a setup all along. But the nice thing is theres still time to d eal with it. So the only useful bit of info in here is the email address and codeword. Send the contact an email with any subject as long as the email body contains the code word. After a few minutes, you should get an in teresting reply. The first thing you want to do is deduct $1000 from your account and hit the str eets (you'll understand why in just a second). Out on the streets go to the "Tech Express" (the notebook shop). You'll see your contact, is the only dealer available and boy does he have a deal for you! You'll just ha ve to figure that out on your own, though! End Game (Safety or BOOM?) (Note: You cant shutdown until you have finished this part.) From root you need to access the Ionix Plans Information. So navigate to the plans folder. You'll s ee 2 files and you need to download them both. You'll see a IP text file, and an Inititave file. Once downloaded you need to disconnect from the server and decrypt the files. On ce decrypted: open the file to see the following: Spoiler** Our great plans have been put into work. If for some reason, we need to abort the process use the codeword. ** So we have our codeword, We have a means to stop the strike, and We have a IP ad dress file that contains the following: Spoiler** macro initiated US DEFENSE:xx.xxx.xx.xxx
UK DEFENSE:xx.xxx.xx.xxx GERMAN DEFENSE:xx.xxx.xx.xxx FRENCH DEFENSE:xx.xxx.xx.xxx RUSSIAN DEFENSE:xx.xxx.xx.xxx ** So now we have the IP Addresses of the 5 defense servers. The rest is obvious. H ack these 5 servers, find the configuration file, where you can input the 'codeword', and well.. input it! I'd walk you through it, but it's just too easy, you'll figure it out!... Spoiler**You hate me, dont you?** After that, you have just saved the world! Enjoy the nice little ending and have fun with your new found fame, freedom, and hardware. :) (Note* it will take a little while for the ending to start so grab something to drink while you wait.) Ice Hearts' Credits Thanks, Virtuweb Interactive Staff (of course, they made this awesome game) Mouser for his nudger system (Streethacker.tk") CyberBli$$ for the item stats And to my friend Josh for turning me onto this game Oh lets not forget Folgers coffee. Couldn't have done it without them! Special Thanks to: IceHeart for making this walkthrough from the ground up, and sending it to me. N ice Job!