Hello everyone! As you may have noticed, the code for the public version has been closed for a while, which means that no more updates will be published for the public branch of the game (except for serious bugs that may appear) since I have completely focused on the development of the Nightly Build. This nightly build is special as it will be the last one before entering the beta version of the game and therefore carries significantly more content than other nightly builds from the past. I preferred not to split this nightly build into two or more parts, since that would entail extra time for fixing regression bugs after each merge, which always tends to take several months, so this time it is preferable to introduce all the planned features in the same nightly to fix all those regressions at once and thus save some time. As this nightly is going to take me more time to develop than what is usually normal, this time I am going to publish updates (Developer Previews) about the state of the development regularly to keep you informed about which feature I am working on at those moments. This time, being the first update, I still do not want to go into many details since I am working on several features at once and there are certain parts of the design that I want to finish defining first, but I can tell you broadly what the new attack vector will entail. The new attack vector, which will complement the current buffer overflow, is being designed with multiplayer mode in mind, specifically for PvP mode. It involves 0-day-exploit attacks combined with code injection, which along with buffer overflow will allow for a more dynamic and balanced PvP between attack and defense, especially among more veteran players. The 0-day-exploit attack will consist of several phases, requiring in the first of them that players collaborate with each other in order to advance. Upon reaching a certain level, players will be able to obtain limited pieces of information (rumors) which, upon completion, will lead them to a specific network to continue with the discovery of the exploit. This will encourage collaboration among guild members to obtain this privileged information before another group, whether their intention is to attack or protect a specific network or server. Once this information is obtained, players will still need to do research work to discover and deal with the engineers who have worked on the library that may contain the undiscovered exploit, thus being able to move on to the next step of the attack which will then be more technical for the player. In the next phases, the player will need to create specific code, which will vary depending on the vulnerability of the 0-day-exploit to continue the attack. Therefore, as an exception in the game, this time players without programming knowledge trying to discover the vulnerability will be at a disadvantage compared to players who know how to program. Hence, exploits of this type of vulnerability will not be generated in stores, unlike the current buffer overflow. Although players without programming knowledge can always use them once they are discovered and published by other players. What I have described would be the first phases of the attack explained in a general way, the attack does not end there. There are also parts that I am currently exploring such as the introduction of an API that can only be accessed temporarily depending on various factors, or the introduction of additional, smaller attack vectors to help with the balancing of this new system. In the upcoming dev previews, we will be exploring other parts of the nightly that are also being designed, as well as more details about this new vector attack. More news soon!
[ 2024-04-15 22:34:30 CET ] [ Original post ]
- Grey Hack Linux [515.12 M]
You're a hacker with full freedom to act as you want on a vast network of computers procedurally created. Each player action influence the world and therefore the other players.
Act for your own benefit, even if it causes collateral damage, help authorities to apprehend criminals or simply keep a low profile and take advantage of the actions of other players.
The interface of the game is similar to a current desktop operating system. The file explorer, the command terminal or text editor are some of the programs that will be available from the start of the game. As you improve your skills you will encounter new utilities may install and use.
In Grey Hack, terminal has a fundamental role, it is also based on actual unix commands and will be an indispensable tool to perform successfully hacking actions.
General
Explore the network freely to discover its secrets and missions.When you increase your reputation on the network you can choose to join a group of hackers to carry out coordinated attacks or even create your own. Although if you prefer you can choose to go solo.
Keep in mind that a hacker does not have to act economically, so you decide which missions you accept and if you agree with its consequences.
Network
All computers and networks are generated procedurally to create a new experience in each game. According to the type of network the security will vary to the point of making practically impossible the penetration in certain systems according to the experience and ability that you have.Social engineering is a powerful tool and, in the most difficult cases, can be very helpful. This means that you can try to trick the user of that computer into giving you their credentials, confidential information about another person, etc.
Going to improve your work station will also be important for more and more professional jobs.
World
Each computer in the network is used by at least one user. Each user lives consistently in the world; go to work, shop online, etc. You can impact directly or indirectly in the life of these people in function of what you do.Main Features
- Simulator based on real UNIX commands.
- Operative system UI completely customizable.
- Share the same world with hundreds of players.
- Freedom to choose the type of hacker you want to be.
- Network and world generated procedurally.
- Online data persistence, allowing you to continue later in the same world and with the same computer after leaving the game.
- OS: Ubuntu 18.04. Ubuntu 20.04 and CentOS 7
- Processor: x64 architecture with SSE2 instruction set supportMemory: 512 MB RAM
- Memory: 512 MB RAM
- Graphics: OpenGL 3.2+. Vulkan capable
- Storage: 545 MB available space
[ 6086 ]
[ 3241 ]