New Twitch streamer aggregation implemented (#FuckTwitch) due to Twitch's API issues (more info on my Discord )
Name | Grey Hack | |
Developer | Loading Home | |
Publisher | Loading Home | | |
Tags | Simulation MMO Singleplayer Early Access | | |
Release | 2017-12-14 | |
Steam | € £ $ / % |
News | 400 |
Controls | Keyboard Mouse |
Players online |  32  |
Steam Rating | n/a |
Steam store |  https://store.steampowered.com/app/605230  |
SteamSpy |
Peak CCU Yesterday | |
Owners |  0 .. 20,000 +/-   |
Players - Since release |   +/- |
Players - Last 2 weeks |   +/- |
Average playtime (forever) | 0 |
Average playtime (last 2 weeks) | 0 |
Median playtime (forever) | 0 |
Median playtime (last 2 weeks) | 0 |
Public Linux depots | Grey Hack Linux [515.12 M]
|
LINUX STREAMERS (1)
[Nightly] Update v0.7.2120a - Revamped Exploit System. |
The first iteration of the new exploit system is ready!
You can see more details about the update here.
This system is based on the libraries that are in the operating system.
Now some programs need to have certain libraries installed to work. In next updates this number will be increased.
The main program to start exploring the exploits system is scanlib, which you can find in the hackshops. This program is based on the new metaxploit library. As the vulnerabilities of the programs are patched, scanlib will not be able to scan the new vulnerabilities unless you update the metaxploit library.
You can check the source code of this program in the Manual. The new classes and methods have been added to the Manual too.
All exploits are procedurally generated, as well as their names. At the moment only the option to download the source code is available from hackshops. The download of the compiled version will be added soon.
Currently the system has ready the main vulnerability, buffer overflow, on which exploits and attacks that can be made are based. In the next updates this system will expand to add more modules and therefore more actions as well as other main vulnerabilities besides buffer overflow, such as code injection and more.
In this first iteration of the system there are some parts that are not yet ready and will be completed soon:
- A failed attack attempt leaves no log in the system.
- The Social Engineering part related to the exploits system is not implemented.
Also note that in this version, the npcs do not upload the versions of the updated libraries to the stores although the admins update them on the computers.
As a workaround you can take the updated library of some npc. Also as a temporary method reinstalling the service the library is updated to the latest version if there is one.
As always I am open to feedback and suggestions, happy hacking!
|
[ 2019-05-01 07:02:39 CET ] [ Original post ] |