Hacknet

Hacknet

View Stats:
astralvoid1 Aug 25, 2018 @ 3:05pm
Hacknet vs real hacking
I've been playing this game for a while now and I have to say I'm loving it. I'm also a new linux user and I've been seeing some of the commands from cmd in this game. I've been wondering though, for people who have any real hacking experience, is this game anywhere close to the real thing?
Thanks
< >
Showing 1-11 of 11 comments
Azure Zero Aug 25, 2018 @ 5:46pm 
parts are close, parts are not close.

Hacknet's hacking style is way more Hollywood style then RL.
As real hacking is more passive and is done over time and requires a lot of knowledge and thinking skills.
thePalindrome Aug 29, 2018 @ 5:20am 
Anothing thing to note is that the hacknet shell doesn't *really* act like bash in a lot of ways (way back when absolute paths weren't allowed, which made things "fun" )
Fly Oct 14, 2018 @ 3:05pm 
No. Sorry, but no. It's actually sad that nobody bothered to write a game about "real" hacking yet. I wish more people knew a thing or two about security in general and network security in particular, it would certainly mean fewer insecure boxes littering the internet, making my work unnecessary hard.

Maybe people would then also stop buying those criminally insecure IoT crapboxes. Don't get me started on that junk.

Knowing how to "hack" always also means knowing how to make something more secure and resilient against abuse by malicious actors. Which is a good reason to know more about security. If you're interested, head over to owasp.org. Don't worry, it's a legit page, not some wannabe-shady kiddy sh.t with pictures of hooded figures. Basically it's an info collection on security related stuff. They also have a "damn vulnerable web app" that you can download, put on one of your servers and play around with, they demonstrate all the "cardinal sins" that web developers make over and over and over again (seriously, their "Top 10 security concerns" hasn't changed much since 2003 when they published the first one... people STILL make the same stupid mistakes!).

And yes, learning how to hack means reading a LOT of very dry stuff. Get used to it. ;)

And finally, not that it has to be said: NEVER touch a server you're not allowed to touch. There's always someone who is better than you.
unknown Oct 14, 2018 @ 11:36pm 
When it was released it was the most realistic (not necessarly anymore) however that doesn't mean it is reality based.

realistic elements:
-in the later missions in both the dlc and main game you have to get into a network through an unpatched machine that you can use as a pivot point to look at the network and find information to help you get further along like email passwords, and the like.
-usage of virtual machines is also realistic as in the game you are supposedly running hacknetOS on a virtual machine which means instead of installing this operation system on your computer you get a program that simulates a computer that you can install an os onto and one of the hacks in the dlc currupts your virtual machine and with some 4th wall breaking stuff you need to go into your game files and fix your vm (hackers use these generally because if they get a virus on the vm they can simply delete it and be fine and not have to worry about getting any viruses on their computer ex ransomware)
-deleting logs you do need to do this if you are ciminal scum and do not wish to be arrested (however this is often not enough)

unrealistic elements
-trace time limits are completely unrealistic as if you are being traced that means the networks administrator has literally seen an ip address with their eyes and have written it down and are calling the authorities to investigate which generally means you are either going to jail very soon, or they are contacting the vpn company you may be useing to get their logs if they have them so that they can track who at what time used their vpn to hack someone. until the network administrator sees the breach then nothing happens you are just in.
-deleting logs: if you delete every single log on a machine it look svery suspicious especially since then there will only be a disconnect log and a computer cannot disconnect without first connecting so that is where they call the police. realisticly you would delete any log that includes your ip address that indicates malicious intent, but at the end of the day they will probibly go through every single ip address that has the state connected if they have a major breach until they find the culpret or give up since there can literally be millions of connected messages depending on what a computer is used for.
-needing to unlock a bunch of ports to hack into something. hacking isn't done by unlocking a bunch of ports all you need is one. if a computer has port 21 open then you simply break into ftp and you are in. you do not need to touch any other port as these aren't locks as they are simply used to communicate to another computer whether that is an immage on a websight to file sharing, or terminal access to your computer from anothe computer

what hacking actually looks like:
you are robbing a bank over the internet is the senario becasue its exciting. you do literally months and months of googleing to find all the information you can about the company and its employees. information you are getting is stuff like howe many kids does the ceo have and what is his wife's name but for literally all employees who may be of interest based off of the management structure that you have figured out through searching for it not to mention trusts and organizations affiliated and websight domaign names and ip addresses. this will help you find out which servers are connected to the overall system and you can knock on some doors to see what computers are vulnerable and which PEOPLE are vulnerable. you may figure out that an employee is interested in getting a kittin and is looking for one in some forums. you pose as someone who has some kittins and email them a picture that has a virus attached that has been build to infect specificly the office computer. she views the picture on here office computer and now you are inside of the network. you now use this connection for to potentially infect the router and just sit there and gather information. you should in this setting be able to get passwords emails and a bunch of information specific to the bank and this information can either get you money, or you can use this to get access to a higher server and it goes on from there. the entire processmay take several months to several years. obviously this entire senario is made up but it gives you an idea of how hacking actually is which is 99.9% information gathering and .1% breaking into computers and obviously do not engage in illegal hacking as you WILL end up in jail and it makes you a complete scumbag or a complete idiot if you are of the activist category.

Originally posted by Fly:
No. Sorry, but no. It's actually sad that nobody bothered to write a game about "real" hacking yet. I wish more people knew a thing or two about security in general and network security in particular, it would certainly mean fewer insecure boxes littering the internet, making my work unnecessary hard.

Maybe people would then also stop buying those criminally insecure IoT crapboxes. Don't get me started on that junk.

Knowing how to "hack" always also means knowing how to make something more secure and resilient against abuse by malicious actors. Which is a good reason to know more about security. If you're interested, head over to owasp.org. Don't worry, it's a legit page, not some wannabe-shady kiddy sh.t with pictures of hooded figures. Basically it's an info collection on security related stuff. They also have a "damn vulnerable web app" that you can download, put on one of your servers and play around with, they demonstrate all the "cardinal sins" that web developers make over and over and over again (seriously, their "Top 10 security concerns" hasn't changed much since 2003 when they published the first one... people STILL make the same stupid mistakes!).

And yes, learning how to hack means reading a LOT of very dry stuff. Get used to it. ;)

And finally, not that it has to be said: NEVER touch a server you're not allowed to touch. There's always someone who is better than you.
look up greyhack i think you will find that it is much more realistic, however is definitly lacking due to it being in very early access, but it is designed to be more of a simulator rather than a game and at the very least it aimes to be as reasistic as possible including social engeneering however it is currently a script kitty simulator and will remain one until they allow you to write your own exploits later down the line.
Last edited by unknown; Oct 14, 2018 @ 11:38pm
Fly Oct 15, 2018 @ 2:08pm 
Little addendum: Deleting logs is usually very useless, at least with servers worth hacking. Splunk and other logging server solutions usually ensure that you can delete whatever you like with no effect since the logs are already sync'ed to another server. And trying to hack that logging server is usually a fruitless endeavor, since they, of course, tend to be pretty well guarded, with only the log syncing jobs being accepted, append-only. In other words, you cannot delete anything on these servers.

You also don't "unlock ports". Ports are open because some sort of program is listening on it. Ports don't exist in limbo, they are associated with something trying to send or receive data through it. What you can do is send it data that it expects and if you're lucky and it can be abused, attach a fitting payload. What this is is highly dependent on the program listening, not the port. While true that certain ports are generally associated with certain services (80 http, 443 https, 445 cifs, ...), there's not really anything keeping you from running apache with https on port 80.

Provided you don't mind that unsuspecting people get interesting error messages... but maybe that's what you're after.

Aside of that, the social engineering angle is very true. What's actually the biggest security flaw in most systems is the humans and the processes. An authoritarian boss that nobody dares to question is a huge security risk, since any spoofed email pretending to be from him is likely to be executed without questioning. I have no idea how to properly model this in a computer game, though.
Last edited by Fly; Oct 15, 2018 @ 2:09pm
crua9 Nov 3, 2018 @ 10:53pm 
Originally posted by anonymous:
When it was released it was the most realistic (not necessarly anymore)

What is more realistic? I only know of this, uplink, and Hacker Evolution. Based on that, this is the closest anyone has gotten sadly. Like it's a really good game, but it would be cool if it was a bit more realistic on the remote side of things.

Something you forgot to mention is things like Trojans, RAT, and so on are tools that normally requires the target to install or you to install on their system. Also, hacking isn't graphical. Like I've NEVER seen any tools that looks like what is in this game. Try doing a nmap, and see what graphics you get.
I think the nearest someone might get when it comes to graphics is being on the other side. It's kinda cool to see a given map to see where hacks are coming from. Something like http://map.norsecorp.com/#/ (I thought about making a pi with a small monitor, and just having that on my wall :P )

Try this if the link didn't work. I don't like this much since you have to turn the globe
unknown Nov 3, 2018 @ 11:31pm 
Originally posted by crua9:
Originally posted by anonymous:
When it was released it was the most realistic (not necessarly anymore)

What is more realistic? I only know of this, uplink, and Hacker Evolution. Based on that, this is the closest anyone has gotten sadly. Like it's a really good game, but it would be cool if it was a bit more realistic on the remote side of things.

Something you forgot to mention is things like Trojans, RAT, and so on are tools that normally requires the target to install or you to install on their system. Also, hacking isn't graphical. Like I've NEVER seen any tools that looks like what is in this game. Try doing a nmap, and see what graphics you get.
I think the nearest someone might get when it comes to graphics is being on the other side. It's kinda cool to see a given map to see where hacks are coming from. Something like http://map.norsecorp.com/#/ (I thought about making a pi with a small monitor, and just having that on my wall :P )

Try this if the link didn't work. I don't like this much since you have to turn the globe
grey hack is more realistic and bordering on a full fledged simulator, however it is in the very early stages of development as an early acess game, but check it out if you like although if you want a finished game id wait as its pretty early in development and i do not expect it to be out of early access for about a year to a year and a half....i would say stick with hacknet for now
https://store.steampowered.com/app/605230/Grey_Hack/
Last edited by unknown; Nov 3, 2018 @ 11:36pm
crua9 Nov 4, 2018 @ 2:00am 
Originally posted by anonymous:
Originally posted by crua9:

What is more realistic? I only know of this, uplink, and Hacker Evolution. Based on that, this is the closest anyone has gotten sadly. Like it's a really good game, but it would be cool if it was a bit more realistic on the remote side of things.

Something you forgot to mention is things like Trojans, RAT, and so on are tools that normally requires the target to install or you to install on their system. Also, hacking isn't graphical. Like I've NEVER seen any tools that looks like what is in this game. Try doing a nmap, and see what graphics you get.
I think the nearest someone might get when it comes to graphics is being on the other side. It's kinda cool to see a given map to see where hacks are coming from. Something like http://map.norsecorp.com/#/ (I thought about making a pi with a small monitor, and just having that on my wall :P )

Try this if the link didn't work. I don't like this much since you have to turn the globe
grey hack is more realistic and bordering on a full fledged simulator, however it is in the very early stages of development as an early acess game, but check it out if you like although if you want a finished game id wait as its pretty early in development and i do not expect it to be out of early access for about a year to a year and a half....i would say stick with hacknet for now
https://store.steampowered.com/app/605230/Grey_Hack/

Thanks, I will check it out.
hip Nov 4, 2018 @ 9:12am 
thats not how real life works
thePalindrome Nov 4, 2018 @ 9:28am 
Yeah, looking at it it's closer, but has a bunch of weirdness (for example, .exes everywhere despite being a *nix system, and the log viewer is... not really how that works).

Either way, if you want to *really* look into this kind of thing, there's plenty of VMs you can get online that are purposely vulnerable so you can figure out how things work.
unknown Nov 4, 2018 @ 12:05pm 
Originally posted by thePalindrome:
Yeah, looking at it it's closer, but has a bunch of weirdness (for example, .exes everywhere despite being a *nix system, and the log viewer is... not really how that works).

Either way, if you want to *really* look into this kind of thing, there's plenty of VMs you can get online that are purposely vulnerable so you can figure out how things work.
there are definily some wierd inaccuracies and i definitly opt for vulnhub challenges as those can be really fun. i remeber attemtping a hunger games themed one that had some baiting going on where if you hacked the program in a certain way it counter hacked you system whcih was very fun
< >
Showing 1-11 of 11 comments
Per page: 1530 50

Date Posted: Aug 25, 2018 @ 3:05pm
Posts: 11