I actually, way back, did just about the same.... did not have my own internet service provider but did have a router that had ddwrt installed on it that could scan wifi connections and later route if settings were set. about 4 in the morning with my laptop, did just about the same steps, nearby an apartmernt complex sat about an hour or so to get someones computer disconnected on their wifi then getting packets when their computer was trying to connect again with their router, later cracking the key. though it was way back when there were wep and maybe wep2 keys and something like this was a way easier.
I hope people are still playing this, I just found it and now I'm hooked. If I want to start wargaming for real, do you know where's a good place to start?
@@greyhackgaming wouldnt it be in the /etc/shadow file i have no idea never played the game but from my understanding hashes are stored in the shadow and not in the passwd
@@greyhackgaming yeah yeah, i'm not an absolute beginner but that would be helpful because i haven't played this game for about 9 months and i became a noob :)
Hello i saw that in multiple videos you use script named 'x' i looked a lot of your videos but did not find any where you explained what it is or what it does. Are you planning on making video explaining what it does or you already did and i missed it? (Or its some top secret script and i should get lost)
This is an interesting question. Since the primary channel focus is guides, I have found it hard to justify showing off a tool that players have no access to. So the tools I have showcased thus far have all been attainable, I can imagine a lot of people asking for my x tool if I made a video dedicated to it. But I can consider it if that is something that people want to see. Much of it is secret, but some is not, so there is certainly material for a video. I have used it to show some stuff before here: ruclips.net/video/j-LaRQYpK00/видео.html ruclips.net/video/XPKQAeBSP4Q/видео.html And I have also showed some of it when comparing to the other tools I have showcased. As for what it does, it's pretty much a virtual terminal with a bunch of tools built in.
@@greyhackgaming you can take it as advertising/guide and then sell it on your BTC store or separate it into modules and do how to X. I am trying to make my own virtual terminal and its hard if you dont know the language and the documentation is sparse. I would be interested for example "how to make commands interact with each other" for example from your videos command "cat file : hash" i find that as the hardest thing so far also guide on how to hide progress bar which overrides last line :D
@@slaskos It will never be sold on the BTCshop, so with that as the premise I am unsure if a video dedicated to it is a good idea, but it is possible. If nothing else I might include more footage of it in other videos. I would say that building a piping system is a bit more complex even if you know the programming language, thought and planning regarding standardizing input and output handling is needed for every command to be able to pipe into the others. I don't think such systems are within the scope of what I will be making guides on for now. Usually, players create hacky solutions for piping that only apply to cat | grep | decipher and not in general. Perhaps you want to start there.
No Wpa2 is the standard, i was wardriving a little while ago, scanned every business near me. None of them were using Wep. so i just said fuck it and did a pixie-dust attack using wifite on as many networks as i possibly could, it only worked on one network, i then ran a port scan (laptop wifi was messing up so had to use some app on my phone for the scan) saw that port 80 was open on one of the devices. It was a fucking projector controller page. Didnt really mess around with it too too much only thing i ever did was show some buddies later and freak out a couple of guest by closing it and opening it up. I thought about going back and running a real nmap scan to see if there were anymore ports open and maybe do some pivoting with metasploit if i searchsploit and found a exploitable service (i doubt that there was anything very good on that network). Also i was able to gain access to the company router they left the settings defaulted, so yea i could have been an asshole and fucked with their shit but why do that lol, im also sure i was on a isolated network within the company since there where only like 2 or 3 devices on the network i gained access to, so getting around this would probably be too hard, i dont even think it was a vlan so something like mac flooding wouldn't work here im not sure.
This game is really fun but at the same time it doesn't get much media attention. Thanks for keeping it alive :)
nice to see u again back, nice introducing video!
just got the game, and i really like it. Im glad to be supporting a development like this
Good timing too. Merge time!
new to the game, love your videos! thanks for all your work :)
I actually, way back, did just about the same.... did not have my own internet service provider but did have a router that had ddwrt installed on it that could scan wifi connections and later route if settings were set.
about 4 in the morning with my laptop, did just about the same steps, nearby an apartmernt complex sat about an hour or so to get someones computer disconnected on their wifi then getting packets when their computer was trying to connect again with their router, later cracking the key.
though it was way back when there were wep and maybe wep2 keys and something like this was a way easier.
"erm" lol
I hope people are still playing this, I just found it and now I'm hooked. If I want to start wargaming for real, do you know where's a good place to start?
Hey ! I have the game but I cannot access root user on my own system with the correct password... any fix ?
You can decipher the root hash in your /etc/passwd file to see what the current root password is
@@greyhackgaming wouldnt it be in the /etc/shadow file i have no idea never played the game but from my understanding hashes are stored in the shadow and not in the passwd
the hack shop and the exploits that we can download of the site are safe?
thanks for the tips.
Nothing is safe, thats the point, it's more covering every way you can!
This game reminds me of TelStar lmao
How did you change your wallpaper?
Custom wallpapers is a new feature in the nightly build
hi! Could you do more videos about coding, scripting??
Good videos
Thanks!
What kind of coding would you like to see? More basics, like the "Coding for absolute beginners" video?
@@greyhackgaming yeah yeah, i'm not an absolute beginner but that would be helpful because i haven't played this game for about 9 months and i became a noob :)
@@retr0484 That's fine, just curious what kind of coding videos the community is interested in
@@greyhackgaming personally id like to see how to make viruses
such a good game. too bad im a noob and cant do anything without videos lol, pretty annoying
Can You make a video on how to Get Remote File ?
Hello i saw that in multiple videos you use script named 'x' i looked a lot of your videos but did not find any where you explained what it is or what it does. Are you planning on making video explaining what it does or you already did and i missed it? (Or its some top secret script and i should get lost)
This is an interesting question. Since the primary channel focus is guides, I have found it hard to justify showing off a tool that players have no access to. So the tools I have showcased thus far have all been attainable, I can imagine a lot of people asking for my x tool if I made a video dedicated to it. But I can consider it if that is something that people want to see.
Much of it is secret, but some is not, so there is certainly material for a video.
I have used it to show some stuff before here:
ruclips.net/video/j-LaRQYpK00/видео.html
ruclips.net/video/XPKQAeBSP4Q/видео.html
And I have also showed some of it when comparing to the other tools I have showcased.
As for what it does, it's pretty much a virtual terminal with a bunch of tools built in.
@@greyhackgaming you can take it as advertising/guide and then sell it on your BTC store or separate it into modules and do how to X. I am trying to make my own virtual terminal and its hard if you dont know the language and the documentation is sparse. I would be interested for example "how to make commands interact with each other" for example from your videos command "cat file : hash" i find that as the hardest thing so far also guide on how to hide progress bar which overrides last line :D
@@slaskos
It will never be sold on the BTCshop, so with that as the premise I am unsure if a video dedicated to it is a good idea, but it is possible. If nothing else I might include more footage of it in other videos.
I would say that building a piping system is a bit more complex even if you know the programming language, thought and planning regarding standardizing input and output handling is needed for every command to be able to pipe into the others. I don't think such systems are within the scope of what I will be making guides on for now.
Usually, players create hacky solutions for piping that only apply to cat | grep | decipher and not in general. Perhaps you want to start there.
Very interesting game! I like it!
Please send youre Theme config file. :D
It's in the description
Can this also be implemented in real life?
No Wpa2 is the standard, i was wardriving a little while ago, scanned every business near me. None of them were using Wep. so i just said fuck it and did a pixie-dust attack using wifite on as many networks as i possibly could, it only worked on one network, i then ran a port scan (laptop wifi was messing up so had to use some app on my phone for the scan) saw that port 80 was open on one of the devices. It was a fucking projector controller page. Didnt really mess around with it too too much only thing i ever did was show some buddies later and freak out a couple of guest by closing it and opening it up. I thought about going back and running a real nmap scan to see if there were anymore ports open and maybe do some pivoting with metasploit if i searchsploit and found a exploitable service (i doubt that there was anything very good on that network). Also i was able to gain access to the company router they left the settings defaulted, so yea i could have been an asshole and fucked with their shit but why do that lol, im also sure i was on a isolated network within the company since there where only like 2 or 3 devices on the network i gained access to, so getting around this would probably be too hard, i dont even think it was a vlan so something like mac flooding wouldn't work here im not sure.
where to download scripts