Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
Hacknet's hacking style is way more Hollywood style then RL.
As real hacking is more passive and is done over time and requires a lot of knowledge and thinking skills.
Maybe people would then also stop buying those criminally insecure IoT crapboxes. Don't get me started on that junk.
Knowing how to "hack" always also means knowing how to make something more secure and resilient against abuse by malicious actors. Which is a good reason to know more about security. If you're interested, head over to owasp.org. Don't worry, it's a legit page, not some wannabe-shady kiddy sh.t with pictures of hooded figures. Basically it's an info collection on security related stuff. They also have a "damn vulnerable web app" that you can download, put on one of your servers and play around with, they demonstrate all the "cardinal sins" that web developers make over and over and over again (seriously, their "Top 10 security concerns" hasn't changed much since 2003 when they published the first one... people STILL make the same stupid mistakes!).
And yes, learning how to hack means reading a LOT of very dry stuff. Get used to it. ;)
And finally, not that it has to be said: NEVER touch a server you're not allowed to touch. There's always someone who is better than you.
realistic elements:
-in the later missions in both the dlc and main game you have to get into a network through an unpatched machine that you can use as a pivot point to look at the network and find information to help you get further along like email passwords, and the like.
-usage of virtual machines is also realistic as in the game you are supposedly running hacknetOS on a virtual machine which means instead of installing this operation system on your computer you get a program that simulates a computer that you can install an os onto and one of the hacks in the dlc currupts your virtual machine and with some 4th wall breaking stuff you need to go into your game files and fix your vm (hackers use these generally because if they get a virus on the vm they can simply delete it and be fine and not have to worry about getting any viruses on their computer ex ransomware)
-deleting logs you do need to do this if you are ciminal scum and do not wish to be arrested (however this is often not enough)
unrealistic elements
-trace time limits are completely unrealistic as if you are being traced that means the networks administrator has literally seen an ip address with their eyes and have written it down and are calling the authorities to investigate which generally means you are either going to jail very soon, or they are contacting the vpn company you may be useing to get their logs if they have them so that they can track who at what time used their vpn to hack someone. until the network administrator sees the breach then nothing happens you are just in.
-deleting logs: if you delete every single log on a machine it look svery suspicious especially since then there will only be a disconnect log and a computer cannot disconnect without first connecting so that is where they call the police. realisticly you would delete any log that includes your ip address that indicates malicious intent, but at the end of the day they will probibly go through every single ip address that has the state connected if they have a major breach until they find the culpret or give up since there can literally be millions of connected messages depending on what a computer is used for.
-needing to unlock a bunch of ports to hack into something. hacking isn't done by unlocking a bunch of ports all you need is one. if a computer has port 21 open then you simply break into ftp and you are in. you do not need to touch any other port as these aren't locks as they are simply used to communicate to another computer whether that is an immage on a websight to file sharing, or terminal access to your computer from anothe computer
what hacking actually looks like:
you are robbing a bank over the internet is the senario becasue its exciting. you do literally months and months of googleing to find all the information you can about the company and its employees. information you are getting is stuff like howe many kids does the ceo have and what is his wife's name but for literally all employees who may be of interest based off of the management structure that you have figured out through searching for it not to mention trusts and organizations affiliated and websight domaign names and ip addresses. this will help you find out which servers are connected to the overall system and you can knock on some doors to see what computers are vulnerable and which PEOPLE are vulnerable. you may figure out that an employee is interested in getting a kittin and is looking for one in some forums. you pose as someone who has some kittins and email them a picture that has a virus attached that has been build to infect specificly the office computer. she views the picture on here office computer and now you are inside of the network. you now use this connection for to potentially infect the router and just sit there and gather information. you should in this setting be able to get passwords emails and a bunch of information specific to the bank and this information can either get you money, or you can use this to get access to a higher server and it goes on from there. the entire processmay take several months to several years. obviously this entire senario is made up but it gives you an idea of how hacking actually is which is 99.9% information gathering and .1% breaking into computers and obviously do not engage in illegal hacking as you WILL end up in jail and it makes you a complete scumbag or a complete idiot if you are of the activist category.
look up greyhack i think you will find that it is much more realistic, however is definitly lacking due to it being in very early access, but it is designed to be more of a simulator rather than a game and at the very least it aimes to be as reasistic as possible including social engeneering however it is currently a script kitty simulator and will remain one until they allow you to write your own exploits later down the line.
You also don't "unlock ports". Ports are open because some sort of program is listening on it. Ports don't exist in limbo, they are associated with something trying to send or receive data through it. What you can do is send it data that it expects and if you're lucky and it can be abused, attach a fitting payload. What this is is highly dependent on the program listening, not the port. While true that certain ports are generally associated with certain services (80 http, 443 https, 445 cifs, ...), there's not really anything keeping you from running apache with https on port 80.
Provided you don't mind that unsuspecting people get interesting error messages... but maybe that's what you're after.
Aside of that, the social engineering angle is very true. What's actually the biggest security flaw in most systems is the humans and the processes. An authoritarian boss that nobody dares to question is a huge security risk, since any spoofed email pretending to be from him is likely to be executed without questioning. I have no idea how to properly model this in a computer game, though.
What is more realistic? I only know of this, uplink, and Hacker Evolution. Based on that, this is the closest anyone has gotten sadly. Like it's a really good game, but it would be cool if it was a bit more realistic on the remote side of things.
Something you forgot to mention is things like Trojans, RAT, and so on are tools that normally requires the target to install or you to install on their system. Also, hacking isn't graphical. Like I've NEVER seen any tools that looks like what is in this game. Try doing a nmap, and see what graphics you get.
I think the nearest someone might get when it comes to graphics is being on the other side. It's kinda cool to see a given map to see where hacks are coming from. Something like http://map.norsecorp.com/#/ (I thought about making a pi with a small monitor, and just having that on my wall :P )
Try this if the link didn't work. I don't like this much since you have to turn the globe
https://store.steampowered.com/app/605230/Grey_Hack/
Thanks, I will check it out.
Either way, if you want to *really* look into this kind of thing, there's plenty of VMs you can get online that are purposely vulnerable so you can figure out how things work.