hacknet主线攻略

Taboo 发布于 2023-11-12 306 次阅读


启动!

点击新游戏

输入用户名,输入密码,再次输入密码,enter,enter

点击绿点,点击扫描网络,点击断开

点击蓝点

nmap
porthack
scan
cd bin
cat config.txt
cd ..
cd log
rm *
dc
help
ps
kill 103

Bit:初次联系

查看邮件

dc
connect 213.183.30.248
cd bin
rm *

回复邮件

Bit:让我们来一起获取一些工具

查看邮件

connect 159.35.111.234
nmap
porthack
cd bin
scp SSHcrack.exe
cd /log
rm *
scan
connect 174.157.134.99
nmap
analyze
analyze
analyze
analyze
analyze
analyze
solve time
SSHcrack 22
porthack
cd bin
scp HexClock.exe
cd /log
rm *
dc

回复邮件

Bit:初试牛刀

查看邮件

connect 182.95.150.210
nmap
SSHcrack 22
porthack
cd log
rm *
dc

回复邮件

Bit:善始善终

查看邮件\

connect 131.51.124.251
nmap
SSHcrack 22
porthack
cd log
rm *
dc

回复邮件

Bit:生涯起点

查看邮件

connect 207.178.41.47
shell
connect 159.35.111.234
shell
connect 174.157.134.99
shell
connect 199.59.149.230
nmap
#过载
SSHcrack 22
porthack
cd home
scp Entropy_Induction_Test
cd /log
rm *
dc

Entropy:任务完成

查看邮件

connect 127.2.91.176
nmap
#过载
SSHcrack 22
porthack
cd /MsgBoard/listings
rm Entropy_Group_engaged_in_malicious_Hacking?
cd ..
rm config.sys
cd /log
rm *
dc

回复邮件

Entropy:Point Clicker

接合同,查看邮件

connect 193.190.129.146
nmap
SSHcrack 22
FTPBounce 21
porthack
cd PointClicker/Saves
rm Mengsk.pcsav
cd /log
rm *
dc

回复邮件

Entropy:经典的反黑客攻击

接合同,查看邮件

connect 156.210.27.149
nmap
#过载
SSHcrack 22
FTPBounce 21
porthack
dc
connect 156.210.27.149
ls
cd home/WORKSPACE
scp SECURE_MAILLIST.dec
rm SECURE_MAILLIST.dec
cd /log
rm *
dc

回复邮件

Entropy:重回学校

接合同,查看邮件

connect 62.193.183.71
nmap
#过载
SSHcrack 22
FTPBounce 21
porthack
cat /home/MH_STAFF/pw_memo.log
cd /log
rm *
dc

回复邮件,附加信息*******

Entropy:eOS设备扫描

查看邮件

connect 149.101.144.156
ls
cd bin
scp eosDeviceScan.exe
dc
connect 57.254.249.246
nmap
SSHcrack 22
FTPBounce 21
porthack
eosDeviceScan
#退出
cd log
rm *
connect 100.42.90.19
#登录
cat /eos/mail/jjstacks@jmail.com.act
cd /log
rm *
dc

回复邮件,附加信息tintin7

Entropy:X-C工程

查看邮件

connect 10.200.178.58
nmap
#过载
SSHcrack 22
porthack
cat /X/Personal/Penetrator_mk1.spec
cd /log
rm *
dc

回复邮件,附加信息4991

Entropy:入侵行为必须受到惩罚

查看邮件

connect 149.101.144.156
scp SMTPoverflow.exe
connect 173.194.35.163
nmap
#过载
SMTPoverflow 25
FTPBounce 21
SSHcrack 22
porthack
cd home
rm *
cd /log
rm *
dc

被反入侵

scan
connect 207.178.41.47
cd sys
scp x-server.sys /sys
connect 213.183.30.248
reboot -i

回复邮件,附加信息fuck you

溯源反打

cd log
connect 161.95.154.129
nmap
SSHcrack 22
porthack
cd bin
scp WebServerWorm.exe
scan
cd /log
rm *
connect 173.194.35.172
nmap
#过载
SMTPoverflow 25
FTPBounce 21
SSHcrack 22
porthack
dc
connect 173.194.35.172
cd home
scp [Taboo]x-server.sys
cd /sys
rm *
cd /log
rm *
dc
cd sys
rm x-server.sys
mv [Taboo]x-server.sys x-server.sys
reboot -i

退出重进

Naix:gg wp

connect 193.38.201.115
nmap
analyze
analyze
analyze
analyze
analyze
solve NORTRON
WebServerWorm 80
SMTPoveflow 25
porthack
ls
cd web
replace index.html "Nortron Security Services" "DICKS"
cd /log
rm *
dc

回复邮件

Naix:节目效果爆炸

connect 193.38.201.115
scan
connect 76.151.162.23
nmap
analyze
analyze
analyze
analyze
analyze
solve 5I6Z23Q
FTPBounce 21
SSHcrack 22
porthack
dc
connect 76.151.162.23
cat /staff_folders/J.Abrams/REMINDER.txt
scan
connect 156.6.123.119
#登录,查看邮件
connect 108.136.167.102
nmap
WebServerWorm 80
SMTPoveflow 25
FTPBounce 21
SSHcrack 22
porthack

回复邮件

(未完待续)

此作者没有提供个人介绍
最后更新于 2024-04-02