Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
Say your target is A, you control 3 other nodes named 1, 2, 3. Login to 1 and type shell. Disconnect an do the same on 2 and 3. Then login to A and probe the target. You see a bar "Proxy Detected". On your messages window you should see the 3 shells you opened, click on "overload" and observe how the Proxy bar gets shaded out until the Proxy is "bybased". Continue with sshcrack, porthack & co.
What I'm unsure though is if logfiles have to be deleted. I was wondering the same thing about the log-off entry and only every 5-10 hacks did I clear the logs on the servers I use as overloard shells - btw you can use the same 3 throughout the game, no need to switchem apparently. I did clear the logs on all my targets, so maybe that prevented something, I don't know.
tracking-
shell- proxi program on another computer that can attack another computers for you.