116182879296245475
前言
《黑客网络》(英语:Hacknet)是一款模拟黑客行为的模拟游戏。(维基百科)
新手任务
1 2 3 4 5 6 7 8 9 10 11 12 13 14
| connect 23.204.82.94 scan disconnect connect 142.241.187.213 nmap PortHack scan ls cd /bin cat config.txt cd /log rm * ps kill 92
|
工具别名
将邮件添加到笔记
Bit 初次联系
1 2 3 4
| connect 23.204.82.94 cd /bin rm SecurityTracer.exe disconnect
|
Bit 让我们来一起获取一些工具
1 2 3 4 5
| connect 180.253.30.123 nmap PortHack scp SSHcrack.exe disconnect
|
Bit 初试牛刀
1 2 3 4 5
| connect 1.240.92.143 nmap SSHcrack 22 PortHack disconnect
|
Bit 善始善终
1 2 3 4 5 6 7
| connect 186.85.14.42 nmap SSHcrack 22 PortHack cd /log rm * disconnect
|
Bit 生涯起点
1 2
| connect 1.240.92.143 shell
|
1 2
| connect 199.59.149.230 nmap
|
1 2 3 4
| SSHcrack 22 PortHack cd /home scp Entropy_Induction_Test
|
Entropy 任务完成
1 2
| connect 1.240.92.143 shell
|
1 2
| connect 189.168.154.27 nmap
|
1 2 3 4 5
| SSHcrack 22 PortHack cd /MsgBoard rm * disconnect
|
Entropy 欢迎
1 2 3 4 5 6 7
| connect 38.170.36.196 login admin rosebud cd /bin scp FTPBounce.exe disconnect
|
Entropy RE:欢迎
Entropy Contract Listings->登录
Entropy Mailbot Point Clicker
1 2 3 4 5 6 7 8
| connect 115.144.12.233 nmap SSHcrack 22 FTPBounce 21 PortHack cd /PointClicker/Saves rm Mengsk.pcsavk disconnect
|
Entropy RE:欢迎
Entropy Contract Listings->登录
Entropy Mailbot 经典的反黑客攻击
1 2
| connect 1.240.92.143 shell
|
1 2
| connect 234.3.157.228 nmap
|
1 2 3 4 5 6 7
| SSHcrack 22 FTPBounce 21 PortHack cd /home/WORKSPACE scp SECURE_MAILLIST.dec rm SECURE_MAILLIST.dec disconnect
|
Entropy RE:欢迎
Entropy Contract Listings->登录
Entropy Mailbot 重回学校
1 2
| connect 1.240.92.143 shell
|
1 2
| connect 136.21.165.194 nmap
|
1 2 3 4 5
| SSHcrack 22 FTPBounce 21 PortHack cd /home/MH_STAFF cat pw_memo.log
|
Entropy Mailbot eOS设备扫描
1 2 3 4 5 6 7
| connect 38.170.36.196 login admin rosebud cd /bin scp eosDeviceScan.exe disconnect
|
1 2 3 4 5 6
| connect 140.49.126.161 nmap SSHcrack 22 FTPBounce 21 PortHack login
|
Entropy RE:欢迎
Entropy Contract Listings->登录
Entropy Mailbot X-C项目
1 2 3 4
| connect 195.87.179.2 nmap cd /X cat WIP_Xenogenetics.txt
|
Entropy 入侵行为必须收到惩罚
1 2 3 4
| connect 1.240.92.143 shell connect 186.85.14.42 shell
|
1 2 3 4 5 6 7
| connect 38.170.36.196 login admin rosebud cd /bin scp SMTPoverflow.exe disconnect
|
- 删除Naix的代理服务器的
Macrosoft_Internal_Raid_Archive.rar文件,完成主线
1 2
| connect 173.194.35.163 nmap
|
1 2 3 4 5 6 7
| SSHcrack 22 FTPBounce 21 SMTPoverflow 25 PortHack cd /home rm Macrosoft_Internal_Raid_Archive.rar disconnect
|
1 2 3 4 5 6
| scan connect 142.241.187.213 cd /sys scp x-server.sys disconnect reboot -i
|
- 自己的主机被Naix入侵结束后(防御成功或手动恢复GUI结束),从日志中找到入侵的主机IP(这是Naix的代理服务器)
1 2 3 4 5
| cd /log connect 142.138.118.248 namp SSHcrack 22 PortHack
|
1 2 3
| scan connect 173.194.35.172 nmap
|
1 2 3 4
| SSHcrack 22 FTPBounce 21 SMTPoverflow 25 PortHack
|
1 2
| cd /bin scp WebServerWorm.exe
|
- 删除Naix的
/sys/x-server.sys文件,完成复仇支线
1 2 3
| cd /sys rm x-server.sys disconnect
|
- 从Naix的根网关找到Naix备份的自己的主机的原始
/sys/x-server.sys文件并还原(可选)
1 2 3 4 5 6 7 8 9 10 11
| connect 23.204.82.94 cd /sys rm x-server.sys connect 173.194.35.172 cd /home scp [avatar]x-server.sys sys disconnect connect 23.204.82.94 cd /sys mv [avatar]x-server.sys x-server.sys reboot
|
Naix gg wp
1 2
| connect 1.240.92.143 shell
|
1 2
| connect 17.45.93.52 nmap
|
- 分析防火墙,多次执行
analyze,直到输出的每一行字符中只包和1个非0数字或大写字母,每行的大写字母组合起来就是密码
- 得到密码后将密码作为
solve的参数执行solve命令
1 2 3 4 5 6
| WebServerWorm 80 SMTPoverflow 25 PortHack cd /web replace index.html "Nortron Security Services" "dicks" disconnect
|
Naix 节目效果爆炸
1 2 3 4 5 6 7 8 9 10 11
| connect 17.45.93.52 scan connect 25.44.82.144 analyze solve R3BJ763 SSHcrack 22 FTPBounce 21 PortHack cd /staff_flders/J.Abrams cat REMINDER.txt scan
|
未完待更
参考文献
CSDN——Pass!on
知乎——胡二先生