TUXDB - LINUX GAMING AGGREGATE
 NEWS TOP_PLAYED GAMES ITCH.IO CALENDAR CHAT WINE SteamDeck
 STREAMERS CREATORS CROWDFUNDING DEALS WEBSITES ABOUT
 PODCASTS REDDIT 

 

SUPPORT TUXDB ON KO-FI

MENU

ON SALE

New Twitch streamer aggregation implemented (#FuckTwitch) due to Twitch's API issues (more info on my Discord )


Name

 Grey Hack 

 

Developer

 Loading Home 

 

Publisher

 Loading Home 

 

Tags

 

Simulation 

 

MMO 

 

Singleplayer 

 

 Early Access 

Release

 2017-12-14 

 

Steam

 € £ $ / % 

 

News

 400 

 

Controls

 Keyboard 

 

 Mouse 

 

Players online

 32 

 

Steam Rating

 n/a 

Steam store

 https://store.steampowered.com/app/605230 

 

SteamSpy

Peak CCU Yesterday

  

Owners

 0 .. 20,000 +/-  

 

Players - Since release

  +/-  

Players - Last 2 weeks

  +/-  

Average playtime (forever)

 0  

Average playtime (last 2 weeks)

 0 

Median playtime (forever)

 0 

Median playtime (last 2 weeks)

 0 

Public Linux depots

 Grey Hack Linux [515.12 M] 




LINUX STREAMERS (1)
tontonayo




Nightly build: Sneak Preview

Hi people!
I would like to share with you the latest news about the development.

As some of you know, for some time the development has been focused on the nightly build, therefore the public version will not receive updates for a while until the development of the nightly build ends and merges as usual.

Unlike previous nightly builds, this time all the features planned for this development cycle will be included before opening it for public testing.

Here are some details of what you will find in the next nightly build:

[h3]Player custom networks[/h3]


Now rented servers are expanded to rented networks!
By renting a server, new devices can be added to the network, such as routers, switches, hubs or more servers to improve the security of your network, in addition to being able to add firewalls.

With the new ConfigLan tool, you will be able to remotely manage your networks, as well as reset them to their original state if for some reason you have lost the possibility of re-entering the network, either due to a configuration error or a hack.

[h3]Sniffers[/h3]


With the introduction of sniffers, players can capture the passwords of npcs and other players.

Now the ssh and ftp services allow an encrypted connection, causing sniffers to only capture encrypted passwords. Although ssh and ftp have a default encryption method, it is easily creackable, since the source code is available for study in the Manual.

Therefore players can program their own encryption system to be used with these services, so that other players can try to crack the encryption system to obtain the password.

This mechanic will consist of two scripts that will have to be installed on the server, Encode and Decode. Where sniffers can also capture the source code from Encode, but not from Decode.
As you can imagine, sniffers and encrypted connections will have more prominence in Multiplayer mode than in Single Player mode.

[h3]New devices[/h3]


In addition to anticipated devices, such as printers or smartphones, security cameras have also been added, adding one more attack vector.
In some networks you will find security cameras installed, usually in companies, that can show the interior of these buildings. If you look closely at the environment you may find useful information.

The cameras are accessible through the browser, since they use an http server to make the connection, although they require a password to access.

[h3]New hacking techniques[/h3]

New APIs will be added to the metaxploit library to allow reverse shells. That is, the victim connects to you, instead of you to the victim. This technique allows access to computers that do not have any service installed.

Reverse shells implicitly include the use of a Trojan, since to perform a reverse shell, you must first get the victim to execute your code through social engineering, and this code will install a local service that will connect to your IP as soon as possible, giving you access to a shell.

Keep in mind that you will have to have a publicly accessible service, such as ssh, for this technique to work, making you vulnerable to attacks from others.

More news soon!


[ 2020-10-09 21:22:36 CET ] [ Original post ]