Hack The Game | Simulation Game Become Hacker
Link Download
http://www.mediafire.com/?0rabsnpv97sucm3
Zip File Password = nikeryl
HackThe hacking Game is a simulation game to become a hacker. When you play this game you will possess alone the role of a hacker who carry a variety of missions. When I try to play this game, it was pretty hard too sob, we are obliged to know the syntax syntax-dos, are like the ping command, cd, telnet, etc.. (more good if bloggers memorized) Hehehe
HackThe Game that I think is a decent game for my friend have, especially for bloggers who want to be a hacker latian reliable but are confused about where, well HackThe This game is a solution, because the use of simulation, so rich so hackers its very real.
Listen
Read phonetically
Dictionary - View detailed dictionary
For how to play, please read the this first (though not confused).. Okey!
General
HackTheGame hacking is a simulation game. In it you take the role
a hacker that took place on various tasks. During this task
You will be able to use equipment (hacking) tools.
Try to complete the task as much as you can, without taxable traced
-------
Mission
-------
You receive your assignment via email. Read it carefully,
sample contains the IP address of your machine must hack. I
will explain how you should go about the rest
Just remember these Things:
- After successfully connecting to the target host using Telnet, which
target system will start your backtrace. Do not let them fully
Your trail because it will take you to an arrest. You can see
traces the process in the lower left corner for a Telnet session.
If you think you will finish the mission before
trail is complete, quickly and again decided to try again.
- VERY IMPORTANT: You always delete the logfile before disconnect from
telnet session. Logfiles are not always in the same place, because
every system is different. But usually in a folder named "Logs".
Looking for logfile (192,168,010,001) and Destroy (see equipment) it.
- If you get busted 3 times the game ends.
-----------
The toolbar
-----------
In the game you have various tools you want. Some devices will
stolen should be stolen on the first system.
Button Function
------ --------
Inbox: This is your email inbox. This is where you just received
task. read this email properly, contains many
information you might need during the mission
Ping: When you read mail, you need to ascertain whether there
target online. You do this by using the Ping button. Enter
target and ping this IP address. Your computer will try to
contact a remote computer, and will notify you if the ad is
online
Portscan: With portscan you can scan an IP address to be verified open
exploitable ports. Press the button and enter your Portscan
target IP address, together with the scanning range. Range
should be between 2000 and 4000 (normally to include
values)
Telnet: If you know the IP address of the target AND exploitable open a port,
Telnet can be used to connect to the target system
Password: With this, you can hack the password of the server by using animal
violence. When you connect to telnet but do not know the password, use
This device
This virus uploaded and install a virus on the server. You need
in a telnet session to use this function. After that upload
Viruses just close the window entirely, the console will automaticly
install viruses that are uploaded
Get File: When in a telnet session, you can access the target system using
dos commands like DIR and CD (see "Command Console"). When you find
files are copied, click Get File. Input file name, and
if the file is found in the current folder, it will begin
download it.
Files that are downloaded to your own (virtual) hard drive. All Downloads
placed in a folder called Downloads
Kill Files: To destroy a file simply click Kill file. Enter the file name and
will damage the file, if it's found in the current folder
Console commands
----------------
PING (ip address)
For example: ping 127.0.0.1
ping sends packets to the server. if online, he will respond. This
how you can tell if an online target
Telnet (ip address) (port)
For example: telnet 127.0.0.1 21
This will connect to the server on an open port. After entry
System log, you can access the target system
DIR (or LS)
This lists all the files from a remote computer. Example output is:
Command.com
IO.SYS
Windows (DIR)
Log (DIR)
Where "Command.com" and "IO.SYS" are files, and "Windows" and "Log" is
folder
CD (foldername)
For example: cd Windows
This will change the folder you are viewing. After giving this command you can use
with the DIR command to view the file in the folder
To return to the root of the document used this command:
CD ..
CD \
CD ..
CD \
MD (foldername) (or mkdir)
For example: mk myfiles
This makes a new folder in the root of the file structure. You can not create
Other folders within folders (yet)
DEL filename> (or RM)
For example: del command.com
Lets you delete a file in the current folder. This can not be undone.
Ipconfig
This shows, among others, your own IP address
CLS
This clears the screen
SAVE
Saves current game. Including changes made in
local filesystem. That stores files labeled with the handle / loginname. So
if you play the game as the "Soul Stealer", you have to login next time
same name "Soul Stealer"
Load / load
Loads the last saved game was found by loginname
HELP
show text
shutdown
Exit game
-------------------------------------
Installation tool from commandline
-------------------------------------
After you download the tool by downloading commands from a remote computer and
go offline, you can install the tool on your own local system. Just navigate
downloaded to a folder and enter the name of the device.
Example:
cd ..
cd download
PortscannerW32.exe
* Press after entering each command