▶
[Nightly] Update v0.7.3138a
- Added metaxploit.sniffer method. Run it on any device while you are waiting to receive any network information that goes through there. At the moment it captures ssh and ftp credentials. - Added sniffer command in Hackshops in the tools category. - Added metaxploit.sniffer documentation. The information of ScanLan has also been updated in the manual regarding hubs and sniffers. - Now the print command works in real time. - Re-introduced wait method as well as its documentation in CodeEditor and the manual. At the moment it accepts a maximum of 300 seconds. - Added social engineering template "Remote login", to force an npc to login to the indicated service. - Fixed bug in firewall allowing connections when they should be blocked when existing an ALLOW rule with a specific address. - Fixed several bugs in the firewall that could cause erroneous behavior in some local network configurations. - Temporarily disabled the restoration of devices by admins.
[ 2020-05-13 17:09:58 CET ] [ Original post ]
Changelog
- Added metaxploit.sniffer method. Run it on any device while you are waiting to receive any network information that goes through there. At the moment it captures ssh and ftp credentials. - Added sniffer command in Hackshops in the tools category. - Added metaxploit.sniffer documentation. The information of ScanLan has also been updated in the manual regarding hubs and sniffers. - Now the print command works in real time. - Re-introduced wait method as well as its documentation in CodeEditor and the manual. At the moment it accepts a maximum of 300 seconds. - Added social engineering template "Remote login", to force an npc to login to the indicated service. - Fixed bug in firewall allowing connections when they should be blocked when existing an ALLOW rule with a specific address. - Fixed several bugs in the firewall that could cause erroneous behavior in some local network configurations. - Temporarily disabled the restoration of devices by admins.
[ 2020-05-13 17:09:58 CET ] [ Original post ]
Grey Hack
Loading Home
Developer
Loading Home
Publisher
2017-12-14
Release
Game News Posts:
416
🎹🖱️Keyboard + Mouse
Very Positive
(1437 reviews)
The Game includes VR Support
Public Linux Depots:
- Grey Hack Linux [515.12 M]
Grey Hack is a massively multiplayer hacking simulator game.
You're a hacker with full freedom to act as you want on a vast network of computers procedurally created. Each player action influence the world and therefore the other players.
Act for your own benefit, even if it causes collateral damage, help authorities to apprehend criminals or simply keep a low profile and take advantage of the actions of other players.
The interface of the game is similar to a current desktop operating system. The file explorer, the command terminal or text editor are some of the programs that will be available from the start of the game. As you improve your skills you will encounter new utilities may install and use.
In Grey Hack, terminal has a fundamental role, it is also based on actual unix commands and will be an indispensable tool to perform successfully hacking actions.
When you increase your reputation on the network you can choose to join a group of hackers to carry out coordinated attacks or even create your own. Although if you prefer you can choose to go solo.
Keep in mind that a hacker does not have to act economically, so you decide which missions you accept and if you agree with its consequences.
Social engineering is a powerful tool and, in the most difficult cases, can be very helpful. This means that you can try to trick the user of that computer into giving you their credentials, confidential information about another person, etc.
Going to improve your work station will also be important for more and more professional jobs.
You're a hacker with full freedom to act as you want on a vast network of computers procedurally created. Each player action influence the world and therefore the other players.
Act for your own benefit, even if it causes collateral damage, help authorities to apprehend criminals or simply keep a low profile and take advantage of the actions of other players.
The interface of the game is similar to a current desktop operating system. The file explorer, the command terminal or text editor are some of the programs that will be available from the start of the game. As you improve your skills you will encounter new utilities may install and use.
In Grey Hack, terminal has a fundamental role, it is also based on actual unix commands and will be an indispensable tool to perform successfully hacking actions.
General
Explore the network freely to discover its secrets and missions.When you increase your reputation on the network you can choose to join a group of hackers to carry out coordinated attacks or even create your own. Although if you prefer you can choose to go solo.
Keep in mind that a hacker does not have to act economically, so you decide which missions you accept and if you agree with its consequences.
Network
All computers and networks are generated procedurally to create a new experience in each game. According to the type of network the security will vary to the point of making practically impossible the penetration in certain systems according to the experience and ability that you have.Social engineering is a powerful tool and, in the most difficult cases, can be very helpful. This means that you can try to trick the user of that computer into giving you their credentials, confidential information about another person, etc.
Going to improve your work station will also be important for more and more professional jobs.
World
Each computer in the network is used by at least one user. Each user lives consistently in the world; go to work, shop online, etc. You can impact directly or indirectly in the life of these people in function of what you do.Main Features
- Simulator based on real UNIX commands.
- Operative system UI completely customizable.
- Share the same world with hundreds of players.
- Freedom to choose the type of hacker you want to be.
- Network and world generated procedurally.
- Online data persistence, allowing you to continue later in the same world and with the same computer after leaving the game.
MINIMAL SETUP
- OS: Ubuntu 18.04. Ubuntu 20.04 and CentOS 7
- Processor: x64 architecture with SSE2 instruction set supportMemory: 512 MB RAM
- Memory: 512 MB RAM
- Graphics: OpenGL 3.2+. Vulkan capable
- Storage: 545 MB available space
GAMEBILLET
[ 6086 ]
GAMERSGATE
[ 3241 ]
FANATICAL BUNDLES
HUMBLE BUNDLES
by buying games/dlcs from affiliate links you are supporting tuxDB