Table Of Contents
Introduction
Terminal Commands
Starting Point
It Starts
Assignment 1
Assignment 2
Assignment 3
The Real Deal (Final Ionix Mission)
Prison!
Extras(Note Books)
Phreak Boxes and Hubs
Weapons
Cheats
Street Hacker is a very intricate game that is an embodiment of its name(not many games have fully accomplished this). The basics of the game are rather tough at first but once you catch onto it you have it. with that out of the way let me pipe a command referrence.
connect:20.155.48.10:21 tutorial@daemon.net (replace this with your email address EG: username@daemon.net) c:Click close at the top of the file editor. Now close the file explorer. Now we want to tryout the macro we just created
download:c:\pub\generator.exe download:c:\pub\library.exeOnce finished, minimize the terminal and go back to your email client. Vince's email is pretty much obvious since it
______________________________ \ Assignment #1 / //==========================\\Deadline: 8:16 AM 7.18.03
Open the terminal. First thing you need to do is a port scan (whoising the ip would be a waste of time because it would
merely return the registered server name which will be displayed when you connect anyway). So you would need to do this:
pscan:30.12.80.215Once you have the search results, look for a "File Upload" port. Once found you'll need to connect to it. Lets say its port 21.
connect:30.12.80.215:21You should receive the following message:
Uh Oh! We don't have the proper login credentials. Guess its a good thing we bought that Brute Force Generator and
library file huh? Type the following command and within a few seconds you should have all the info you need.
force.gen:Once you receive the login credentials you need to login. To do this first type the username by itself and then the
______________________________ \ Assignment #2 / //==========================\\Deadline:4:16 PM 7.16.03
Let's try another assignment. This time I want you to replace a security log file. You might have to dig for it because
it's not out in the open like the practice.doc. The filename is logs.txt and it is relativity small, about 20kbs. Alright
get to work, and don't screw this up, the server may be a bit more challenging to hack this time. End of Briefing...
Don't let his wording fool you. This hack is about as easy as the last one. We have our information so the first order of
business (as always) port scan the IP and get a list of the ports open. Find a File Upload Port and connect to it. (I dont
need to show you that again so I'll skip that part). Again lets assume port 21 is open and try and connect to it
(connect:41.15.67.115:21)Once connected, it will ask you for a user name so run your generator and login. Navigate your way to the root
delete:logs.txt upload:c:\logs.txtGet out of the server
Disconnect:Assignment #2 complete.
______________________________ \ Assignment #3 / //==========================\\Deadline: 6:16 AM 7.18.03
Let's try another assignment. This time I want you to delete some miscellaneous files from the last test server.
This server is much more difficult than the others. It is behind a firewall so you will have to buy a sniffer
virus in order to retrieve a login credentials. The files I want you to delete are:
File: factile48.doc
File: products.bin
File: prplan.xls
They may not all be clumped together so keep your eyes open once you get inside. Don't let me down; I have given
you 2 days to complete this assignment! End of Briefing...
First things first (no I don't mean port scan, not yet anyway). We need to open the PCQ console and design a keysniffer.
It doesn't have to be big just basic.
Now that we've designed our worm we'll need to wait for PCQ to send it to us. As soon as you receive the
email from assembly@pcq.com, save the attachment, then run the exe from the explorer window. This will extract
it to the PCQ vault and make it available for launch on remote servers. Ok open the terminal, You should notice
something different. In the top right hand corner of the terminal window is a virus list. These are used with the
launch command:
launch:virusnameThe first things you should do once in the Terminal should be common by now. Port Scan, Connect, Login Generator.
launch:keysniff*The actual Virus Name will be listed in the top right of the terminal window.
login:username:passwordOnce logged in we need to get to the root directory (c:). Once in root we'll need to get to the "home" directory
______________________________ \ The Real Deal / //==========================\\Deadline: 11:16 AM 7.19.03
Well this is the moment you have been waiting for. You get to show me your true skill. This mission will be
taking place on Eastern Analog's EA Production Server. This is very important, and I know I can count on you
to get the job done. I am giving you 2 days.
Modify the employee_plan.doc
This following original record
[MIS 2113-026 Databases Tado AH300]
must be edited so that it says
[MIS 4555-666 IT_Management Crow AH600]
I will contact you if I hear word that Eastern Analog is panicking because of the alterations you have made.
End of Briefing...
So he wants us to break into the Eastern Analog Production Server and modify employee_plan.doc. Piece of cake right?
I agree. First thing we need to do is crack open the terminal and do a search on EA (leave out the rest because it
will return a lot of search results).
whois:EANow we have our search results. So lets go ahead and port scan the ip registered to EA Production Server (some of
open:c:\documents\user\dev\employee_plan.docfind the line:
MIS 2113-026 Databases Tado AH300and change it to:
MIS 4555-666 IT_Management Crow AH600Save the file and disconnect. Ionix Missions Complete!
In Search For Answers
Oddly, you get released from prison around 3 years and 8 months early (strange eh?). You meet with Vince and he gives
you a notebook and wishes you the best. At this point the game will autosave and you come back out to the main menu
(for those of you that only downloaded the demo...sorry but this is where your game ends). Once you boot up your
machine you'll receive an email from cnace@daemon.net and get some answers that you've been waiting for and also a
promise to receive the rest of them after you prove yourself. This mystery man is responsible for altering your
prison records and also has key information on The Ionix Corporation but refuses to give it to you unless you
complete a few tasks for him...
CON = Connections(1/4 means that the computer only has a modem, 4/4 means the computer has modem, lan, wireless, and optical) AR = Average rating(higher the better) NAME CPU VIDEO MEM HD # CON COST AR Wizard XF 950 P2 450MHz 8MB* 32MB 5GB 8lb 1/4 $504 3 *Integrated 8MB Wizard XF 1000 P2 500MHz 8MB* 64MB 5GB 8lb 1/4 $515 6 *Integrated 8MB Wizard XF 1150 P3 550MHz 16MB* 64MB 10GB 8lb 1/4 $535 9 *Integrated 16MB Wizard XF 1200 P3 600MHz 16MB* 64MB 10GB 8lb 1/4 $562 12 *Integrated 16MB Wizard XF 1250 P3 650MHz 32MB* 128MB 15GB 7lb 1/4 $597 15 *Integrated 32MB Wizard XF 1300 P3 700MHz 32MB* 128MB 15GB 7lb 1/4 $640 18 *Integrated 32MB ----- Warlock LR 2000 P3 800MHz 16MB* 64MB 15GB 8lb 1/4 $692 21 *3D XCEL 16MB Warlock LR 2500 P3 900MHz 16MB* 64MB 20GB 8lb 1/4 $751 24 *3D XCEL 16MB Warlock LR 3000 P4 1.0GHz 32MB* 128MB 25GB 7lb 2/4 $817 26 *3D XCEL 32MB Warlock LR 3500 P4 1.1GHz 32MB* 128MB 30GB 7lb 2/4 $891 30 *3D XCEL 32MB Warlock LR 4000 P4 1.2GHz 64MB* 256MB 35GB 7lb 2/4 $974 32 *3D XCEL 64MB Warlock LR 5000 P4 1.3GHz 64MB* 256MB 40GB 7lb 2/4 $1,064 25* *3D XCEL 64MB ----- Vanquish VX 5500 1.4GHz 32MB* 256MB 40GB 7lb 2/4 $1,161 38 *Discharge 6000 32MB Vanquish VX 6000 1.5GHz 32MB* 256MB 45GB 7lb 2/4 $1,267 41 *Discharge 6100 32MB Vanquish VX 6500 1.6GHz 32MB* 384MB 50GB 7lb 2/4 $1,381 44 *Discharge 6200 32MB Vanquish VX 7000 1.7GHz 64MB* 384MB 60GB 6lb 2/4 $1,502 47 *Discharge 7000 64MB Vanquish VX 7500 1.8GHz 64MB* 512MB 70GB 6lb 3/4 $1,631 50 *Discharge 7500 64MB Vanquish VX 8000 1.9GHz 128MB* 512MB 80GB 6lb 3/4 $1,768 53 *Discharge 8000 128MB Vanquish VX 8500 2.0GHz 128MB* 768MB 90GB 6lb 3/4 $1,913 56 *Discharge 8300 128MB Vanquish VX 9000 2.1GHz 128MB* 768MB 100GB 6lb 3/4 $2,065 54 *Discharge 8600 128MB Vanquish VX 9500 2.2GHz 256MB* 1024MB 110GB 5lb 3/4 $2,226 62 *Discharge 9000 256MB Vanquish VX 10000 2.3GHz 256MB* 1024MB 120GB 5lb 3/4 $2,394 65 *Discharge 9500 256MB ----- Celestial CX6.0 P4 2.4GHz 256MB* 512MB 140GB 6lb 3/4 $2,571 68 *Nitrous 3D 256MB Celestial CX6.1 P4 2.5GHz 256MB* 512MB 140GB 6lb 3/4 $2,755 71 *Nitrous 3D 256MB Celestial CX6.2 P5 2.6GHz 256MB* 512MB 512MB 6lb 3/4 $2,946 74 *Nitrous 3D 256MB Celestial CX6.3 P4 2.7GHz 256MB* 1024MB 160GB 6lb 3/4 $3,146 76 *Nitrous 3D 256MB Celestial CX6.4 P5 2.8GHz 512MB* 1024MB 160GB 5lb 4/4 $3,353 79 *Nitrous 3D 512MB Celestial CX6.5 P5 2.9GHz 512MB* 1024MB 160GB 5lb 4/4 $3,568 82 *Nitrous 3D 512MB Celestial CX6.6 P5 3.0GHz 512MB* 1536MB 180GB 5lb 4/4 $3,792 85 *Nitrous 3D 512MB Celestial CX6.7 P5 3.1GHz 512MB* 1536MB 180GB 5lb 4/4 $4,022 88 *Nitrous 3D 512MB Celestial CX6.8 P5 3.2GHz 512MB* 1536MB 180GB 5lb 4/4 $4,261 91 *Nitrous 3D 512MB Celestial CX6.9 P5 3.3GHz 512MB* 2048MB 200GB 5lb 4/4 $4,508 94 *Nitrous 3D 512MB Celestial CX7.0 P5 3.4GHz 1024MB*2048MB 200GB 5lb 4/4 $4,762 97 *Nitrous 3D 1024MB Celestial CX7.1 P5 3.5GHz 1024MB*2048MB 200GB 5lb 4/4 $5,024 100 *Nitrous 3D 1024MB Hybrid Fusion NS8 P8 10.0GHz 3072MB*10240MB 1TB 3lB 4/4 $1,000 300Phreakboxes and Hubs
*PHREAKBOXES NAME DISCRIPTION INT COST Black Box I Disables many building security cameras LOW $200 Black Box II Disables most building security cameras LOW $400 Black Box III Disables all building security cameras MED* $600 Chrome Box I Manipulates traffic signals with a MED* $600 .5 mile radius of effect Chrome Box II Manipulates traffic signals with a HI $800 1 mile radius of effect Chrome Box III Manipulates traffic signals with a HI $1,000 2 mile radius of effect Blotto Box Shorts out all phone lines in area LOW $400 Dayglo Box Causes a power grid failure in that area HI $1,000 Dark Box Disables all building elevators MED* $600 Clear Box Causes all automatic security doors MED* $600 to lock Static Box Activates building fire alarm systems LOW $400 *Not sure if the wording meant HI,LOW, or MED so I put MED bassed on what I thought *PHREAKBOX HUBS NAME AND NUMBER OF PORTS # COST Phreakbox 3 Port Hub 3 $200 Phreakbox 6 Port Hub 6 $400 Phreakbox 9 Port Hub 9 $600Weapons
CON = Concealability STR = Strength needed to opperate DEX = Dexterity needed to opperate RF = Rate of fire # = Weight of weapon POW* = Power of weapon relative to other weapons (based on 1 through 6, 1 being lowest power) *Pistols NAME CON STR DEX RF COST CLIP # POW Browning Hi-Power HI LOW HI 1.7 $250 13 6 2 Glock 17 HI LOW HI 1.7 $200 17 4 1 Colt HI LOW HI 2.5 $160 6 4 1 Colt M1911A1 HI LOW HI 1.7 $280 7 6 2 S&W M10 HI LOW HI 2.5 $150 6 4 1 Colt Delta Elite HI LOW HI 1.7 $470 8 6 2 Sig Sauer P220 HI LOW HI 1.7 $330 7 6 2 Colt King Cobra HI LOW HI 2.5 $420 6 4 2 S&W M29 LOW LOW LOW 2.5 $500 6 4 3 H&K USP HI LOW HI 1.7 $370 7 6 2 Beretta m92 HI LOW HI 2.5 $170 15 4 1 Desert Eagle MED LOW LOW 1.7 $450 9 6 3 *Submachine Guns NAME CON STR DEX RF COST CLIP # POW Thompson M1928 SMG LOW HI LOW 1.0 $520 30 9 2 IMI Uzi SMG HI HI LOW 1.0 $700 32 9 1 H&K MP5 SMG MED HI LOW 1.0 $550 30 9 1 IMI Mini-Uzi HI HI LOW 1.0 $650 20 9 1 Ingram MAC-10 SMG HI HI LOW 1.0 $750 20 9 2 *Shotguns NAME CON STR DEX RF COST CLIP # POW Benelli M1 Super 90 LOW HI LOW 2.5 $800 7 9 4 Winchester* LOW HI LOW 2.5 $730 7 9 4 *Winchester 1300 Marine (same stats as Benelli yet cheaper) *Assualt Rifles NAME CON STR DEX RF COST CLIP # POW U.S M-16 LOW HI LOW 0.8 $920 30 11 4 Steyr AUG MED HI LOW 0.8 $900 30 11 4 AK-47 LOW HI LOW 0.8 $950 30 11 5 *Machine Guns NAME CON STR DEX RF COST CLIP # POW Browning* LOW HI LOW 0.6 $1,150 120 14 6 M-60 Machine Gun LOW HI LOW 0.5 $1,300 200 14 6 *Browning Automatic RifleCheats
These must be typed directly into the terminal window (exactly as shown in the code column) ----------------------------------------------- Code effect ----------------------------------------------- down with the demo Finish the demo pronto internet fraud rules Steal 5000 from a random user com open Connect to the internet swordfish Get all login credentials i don't pay for software Get all Solid Software Products overclock Get the Hybrid Fusion evil sunlight Fast forward to night time (May take a few seconds) who needs sleep Fast forward to daytime (May take a few seconds) decipher Decrypt and Unzip everything on your computer timed out Terminate all admin's traces rush hour Reset the streets with new dealers administrator Computer login is no longer required guest Computer login is required
whois:company name Example = whois:United VidiaBecause you'll be hacking the same company over the next few missions (4 I believe) make a note in the
download:c:\home\research\coding\alphacode.scp disconnect: decrypt:c:\downloads\alphacode.scp unzip:c:\downloads\alphacode.scpNow email the file to cnace@daemon.net
delete:c:\documents\user\reports\rivalinfo.doc (if running on Macross OS) delete:c:\home\reports\rivalinfo.doc (for Fedora OS)Prove Your Worth 2 Complete
So you go back to your email and receive an email from your contact. So we need to design a virus to get
their ip address. This part should be second nature. For the purposes of this tutorial I will assume you
named it "callback" Open PCQ and create a basic IP CallBack trojan. Once you've extracted it to pcq you'll
need to attach it to an email. (c:\programs\pcq\vault\callback.trj). Within a few seconds you'll receive an
email from "Anonymous". That should contain the agents IP address. So what do we do now? (as if it's not
obvious). Infiltrate a building and port scan the ip address. So we found an open port and connected to
it. In the event that you need login credentials, you know how to get them. Once you've logged in we'll
need to check their documents folder for a folder called "classidied". Well there it is, download
mission_synopsis.lst and disconnect.decrypt it and send it to cnace.
Prove Your Worth 3 Complete!
Remote Host Server Has Gone Offline Connection TerminatedProve Your Worth 5 Complete!
open:c:\downloads\*SecurityFile*.This will open the file for editing within the terminal window. Make a notepad copy of the server IP addresses and
Spoiler**You'll need to do this in ascending order. Start with server #5 and go on through server #1.**
World Banc Missions Completed!
Ok, now I need to get the schematics for a high-tech device. They are locked away inside the Versynergy Corp
Headquarters. I am going to insert an infiltration team to remove these schematics but first I need you to do
some reconnaissance. What I need for you to do is to send me the Maps of each floor. In addition, destroy
surveillance camera feeds, change Joe Anthony's security pin to 44444 so we will have effortless entry, and
to re-route security patrols with the new file I provide. The Versynergy Server's IP address is *.*.*.*
By the time you do this I should have the team prepped and ready to go.
So he wants us to hack into the Versynergy Corporate Computer and make some changes.
Mission Checklist:
1) Delete camera feeds
2) Upload a new patrols file
3) Change password for Joe Anthony
4) Get maps for each floor
Piece of cake. Lets get started. First things first. We need to do our basic routine and gain access to the
machine. Once in root, start looking for those files.
So first we need to delete the camera feed.
delete:***.***Now we need to replace "patrols.mpg" with the one Vince gave us. (delete the old one and upload the new one.)
decrypt:c:\***\access_protocols.xlsand then open it. once open we need to find joe anthony's record and change the password to 44444 and then save the
The team is mobilizing and I need you to create a distraction. The best way I think this can be achieved is by
blowing up the downtown electrical sub-station. This will keep officers and other security officials busy for quite
some time. I'll leave the rest up to you, and we will move after the sub-station blows. I am sure there are
configuration files that can aid you. The IP of the substation is 237.23.67.170 and our window of attack is less
than 1 day so think quickly.
So he wants you to blow a substation. This can be quite tricky (if you think about it too hard.) so lets keep it
simple. Do the normal stuff and gain access to the root directory. From root we need to go to the electrical
system configuration directory. Here we have several files we could use to blow this
substation. Most of them are config files and the other is a technical document. What we want to do is create an
Overload Circuit by routing the outgoing electrical feed into the incoming electrical feed.
Spoiler**Find the Feedout Configuration File, and change it to this:
[OUTGOING FEED] ROUTE TO [INCOMING FEED]
. BOOM!
**
Feedback is a Success!
Once inside we need to change his access settings (remove the script kiddies priviledges) and save a copy
of his access logs. Should be easy. Since we know where we need to go we can just hop in, make the changes,
save the file, and get out. So we need to navigate to the appropriate folder. In this folder are 2 very obvious files
First we need to remove the script kiddies access credentials so we would need to open the Login file and delete
their record. Once finished save the file. Now we need to download the access log and send it to vince. In
the email he asks if we would look over the log and see if they did anything suspicious. So open your explorer
and check out the Access Log file.
Are my eyes playing tricks on me?! In the file, you find a very supsicious entry. Disregard
that for now. Send Vince a copy of the access log and wait for his reply. He sends you some money and tells
you to keep in touch. So now we have some work to do. You may want to purchase a faster machine because it gets
rather hairy from here on in. Also download any new software from SS before proceeding.
Spoiler**
[The Truth You're Looking For]
Contents --------------------------
> You have well proven yourself. Apparently
> there is nothing you can't do and I am truly
> grateful for your services. As I promised I will
> give you the truth you re looking for about Mordecai.
> I believe it all started 3 years ago when I met #(DKAH;d
akdie,c,fieijfgkdkd ...
Ah, Ah, Ah, You'll just have to find this file for yourself!
**
At this point, if this game was in real life, let's just say, You'd be pissed, ok? We have
the IP address, the rest is obvious. Gain access to root on the Routing server. (you may need a script
for this so make sure you have the latest ones.) From root we need to find the routing list to get to the Ionix
main server. So thats obviously a system log meaning its likely buried in one of the system folders.
Only one folder here regarding Route Histroy (Hint!) Lets have a look. Inside you'll find an interesting log file
download a copy and disconnect. This file contains a list of IP Addresses but only one of them should concern us:
Spoiler**
level0 64-40-53-115.nocost.com
level9 82-34-70-173.cable.ubr02.gill.deepblue.R0Z$
level3 pool-141-150-15-fI&qd.east.verid.netN
level1 Ottawa-HSE-ppp255969. .ca
level0 64-40-53-11p92Hharge.comg
level4 nantes-1-62-147-43-25
level0 193.117.110.154
level0 64-40-53-115.nocost.com
level3 210.124.76.41
level6 62-147-43-251.dial.paroxism.net
Again, Ah, Ah, Ah, you'll just have to find
the rest of this file, for yourself! You hate me, don't you?
*HINT* If you get stuck on this mission for too long, read the above paragraph.
It implies a company name, you should look for in this History file.
It only shows up once..
**
We have an IP address no doubt that that's our next stop. Doing a 'whois' on that particular IP address
only confirms our suspicions..
How convenient is this? We have an IP Address that links directly to *** and now we can find out what he
is up to. Gain root. From root we need to look for anything incriminating on *** so we'll need to check
his documents. Wow, a writings folder, lets check this out. Hmm an online *** decrypt, download, disconnect.
Open your explorer and open that writing file. Well this is interesting:
Spoiler**
Entry #1
I decided that if I'm going to get into working
with *** I better keep track of what's going
on with my own organization; thus this Diary.
Entry #2
*** has given their first assignment to my
organization. Seems a bit risky but they're
paying me a hell of a lot.
Entry #3
Well, we've completed # *** assignments. The
FBI started to catch on to our activities, but
*** has bought out anDKjiae;lfkdagha;kl*(#@)*(^$#
You guessed it! Sorry, but I can't let you just read through the entire game,
Sorry!
**
Son of a! It was a setup all along. But the nice thing is theres still time to deal with it. So the only useful
bit of info in here is the email address and codeword. Send the contact an email with any subject as long as
the email body contains the code word. After a few minutes, you should get an interesting reply.
The first thing you want to do is deduct $1000 from your account and hit the streets (you'll understand
why in just a second). Out on the streets go to the "Tech Express" (the notebook shop). You'll see your contact,
is the only dealer available and boy does he have a deal for you! You'll just have to figure that out on your own, though!
Spoiler**
Our great plans have been put into work. If for some reason,
we need to abort the process use the codeword.
**
So we have our codeword, We have a means to stop the strike, and We have a IP address file that
contains the following:
Spoiler**
macro initiated
US DEFENSE:xx.xxx.xx.xxx
UK DEFENSE:xx.xxx.xx.xxx
GERMAN DEFENSE:xx.xxx.xx.xxx
FRENCH DEFENSE:xx.xxx.xx.xxx
RUSSIAN DEFENSE:xx.xxx.xx.xxx
**
So now we have the IP Addresses of the 5 defense servers. The rest is obvious. Hack these 5 servers, find the
configuration file, where you can input the 'codeword', and well.. input it! I'd walk you through it, but it's
just too easy, you'll figure it out!...
Spoiler**You hate me, dont you?**
After that, you have just saved the world! Enjoy the nice little ending and have fun with your new found
fame, freedom, and hardware. :)
(Note* it will take a little while for the ending to start so grab something to drink while you wait.)