116182879296245475
前言
《黑客网络》(英语:Hacknet)是一款模拟黑客行为的模拟游戏。(维基百科)
新手任务
1 2 3 4 5 6 7 8 9 10 11 12 13 14
| connect 23.204.82.94 scan disconnect connect 142.241.187.213 nmap PortHack scan ls cd /bin cat config.txt cd /log rm * ps kill 92
|
工具别名
将邮件添加到笔记
Bit 初次联系
1 2 3 4
| connect 23.204.82.94 cd /bin rm SecurityTracer.exe disconnect
|
Bit 让我们来一起获取一些工具
1 2 3
| connect 180.253.30.123 nmap PortHack
|
Bit 初试牛刀
1 2 3 4
| connect 1.240.92.143 nmap SSHcrack 22 PortHack
|
Bit 善始善终
1 2 3 4
| connect 186.85.14.42 nmap SSHcrack 22 PortHack
|
Bit 生涯起点
1 2
| connect 1.240.92.143 shell
|
1 2
| connect 199.59.149.230 nmap
|
1 2
| cd /home scp Entropy_Induction_Test
|
Entropy 任务完成
1 2
| connect 1.240.92.143 shell
|
1 2
| connect 189.168.154.27 nmap
|
Entropy 欢迎
1 2 3 4
| connect 38.170.36.196 login admin rosebud
|
1 2
| cd /bin scp FTPBounce.exe
|
Entropy RE:欢迎
Entropy Contract Listings->登录
Entropy Mailbot Point Clicker
1 2 3 4 5
| connect 115.144.12.233 nmap SSHcrack 22 FTPBounce 21 PortHack
|
1 2
| cd /PointClicker/Saves rm Mengsk.pcsavk
|
Entropy RE:欢迎
Entropy Contract Listings->登录
Entropy Mailbot 经典的反黑客攻击
1 2
| connect 1.240.92.143 shell
|
1 2
| connect 234.3.157.228 nmap
|
1 2 3
| SSHcrack 22 FTPBounce 21 PortHack
|
1 2 3
| cd /home/WORKSPACE scp SECURE_MAILLIST.dec rm SECURE_MAILLIST.dec
|
Entropy RE:欢迎
Entropy Contract Listings->登录
Entropy Mailbot 重回学校
1 2
| connect 1.240.92.143 shell
|
1 2
| connect 136.21.165.194 nmap
|
1 2 3
| SSHcrack 22 FTPBounce 21 PortHack
|
1 2
| cd /home/MH_STAFF cat pw_memo.log
|
Entropy Mailbot eOS设备扫描
1 2 3 4
| connect 38.170.36.196 login admin rosebud
|
1 2
| cd /bin scp eosDeviceScan.exe
|
1 2 3 4 5 6
| connect 140.49.126.161 nmap SSHcrack 22 FTPBounce 21 PortHack login
|
Entropy RE:欢迎
Entropy Contract Listings->登录
Entropy Mailbot X-C项目
1 2 3 4
| connect 195.87.179.2 nmap cd /X cat WIP_Xenogenetics.txt
|
Entropy 入侵行为必须收到惩罚
1 2 3 4
| connect 1.240.92.143 shell connect 186.85.14.42 shell
|
1 2 3 4
| connect 38.170.36.196 login admin rosebud
|
1 2
| cd /bin scp SMTPoverflow.exe
|
- 删除Naix的代理服务器的
Macrosoft_Internal_Raid_Archive.rar文件,完成主线
1 2
| connect 173.194.35.163 nmap
|
1 2 3 4
| SSHcrack 22 FTPBounce 21 SMTPoverflow 25 PortHack
|
1 2
| cd /home rm Macrosoft_Internal_Raid_Archive.rar
|
1 2 3 4 5 6
| scan connect 142.241.187.213 cd /sys scp x-server.sys disconnect reboot -i
|
- 自己的主机被Naix入侵结束后(防御成功或手动恢复GUI结束),从日志中找到入侵的主机IP(这是Naix的代理服务器)
1 2 3 4 5
| cd /log connect 142.138.118.248 namp SSHcrack 22 PortHack
|
1 2 3
| scan connect 173.194.35.172 nmap
|
1 2 3 4
| SSHcrack 22 FTPBounce 21 SMTPoverflow 25 PortHack
|
1 2
| cd /bin scp WebServerWorm.exe
|
- 删除Naix的
/sys/x-server.sys文件,完成复仇支线
1 2 3
| cd /sys rm x-server.sys disconnect
|
- 从Naix的根网关找到Naix备份的自己的主机的原始
/sys/x-server.sys文件并还原(可选)
1 2 3 4 5 6 7 8 9 10 11
| connect 23.204.82.94 cd /sys rm x-server.sys connect 173.194.35.172 cd /home scp [avatar]x-server.sys sys disconnect connect 23.204.82.94 cd /sys mv [avatar]x-server.sys x-server.sys reboot -i
|
Naix gg wp
1 2
| connect 1.240.92.143 shell
|
1 2
| connect 17.45.93.52 nmap
|
- 分析防火墙
- 次执行
analyze,直到输出的每一行字符中只包和1个非0数字或大写字母,每行的大写字母组合起来就是密码
- 得到密码后将密码作为
solve的参数执行solve命令
1 2 3 4 5
| analyze solve NORTRON SMTPoverflow 25 WebServerWorm 80 PortHack
|
1 2
| cd /web replace index.html "Nortron Security Services" "dicks"
|
Naix 节目效果爆炸
1 2
| connect 1.240.92.143 shell
|
1 2 3 4 5 6 7 8
| connect 17.45.93.52 scan connect 25.44.82.144 analyze solve R3BJ763 SSHcrack 22 FTPBounce 21 PortHack
|
1 2
| cd /staff_flders/J.Abrams cat REMINDER.txt
|
- 得到用户名和密码,用这个账户去邮箱服务器(160.103.94.175)中获取中央服务器(120.179.170.227)防火墙密码,或者直接暴力破解中央服务器(120.179.170.227)防火墙密码
用户名:j.abrams
密码:bootyking420
1 2 3 4 5 6 7 8 9 10
| scan connect 120.179.170.227 nmap analyze solve 123456789ABC SSHcrack 22 FTPBounce 21 SMTPoverflow 25 WebServerWorm 80 PortHack
|
Naix 一个重要的链接
1 2
| coonect 103.31.7.34 PortHack
|
1 2 3 4 5 6 7 8 9
| cd /web cat index.html coonect 103.31.7.38
coonect 103.31.7.41
coonect 103.31.8.1
coonect 103.31.7.211
|
- 得到4个IP地址:103.31.7.38、103.31.7.41、103.31.8.1、103.31.7.211
未完待更
参考文献
CSDN——Pass!on
知乎——胡二先生