Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
The way I understand it, the ssh cmd is also a hacking tool which gives you the ability to open a shell on someones computer if you have their login credentials.
Like if I could open a shell on your real computer from my real computer if I have your login details.
As for the log, since you are opening a shell on someones server it makes sense that opening the shell is logged.
i mean there are t2 types of connecting to IP via terminal, which does not use force, ssh and ftp.
even the ssh is not forcing entry it is a shell operation?
I was think about that if i keep leaving shell logs behind it will eventually find me. As one would know that someone had access in shell and that is suspicious, even if i erase the log routed to my IP.
I mean this, i bounce around, for each machine i bounce it will leave 3 logs behind.
The first is the connecting to the machine IP it is connecting from.
Second will be the shell operation from this same IP of origin.
third will be the exit.
This will occur for every machine, even if i delete the routed log from the first machine connected to, the other machines will have traces that indicates suspecious activity. So it will be clear that someone is using bouncing and erasing their tracks. My concern is that to not let that suspicious start in the first place, if i could connect without leaving traces of shell behind.
I can do that going into every log file to erase this. But it is very time consuming.
So the question is, should i worry about it? or just deleting the traces from the first machine i am connecting to will do the trick? (i'm playing single player yet) Also i do not know what really matters, i mean how good is the game about tracking us? and for multiplayer what changes?
I believe opening a shell in itself is a use of "force", it is the same with shellmail. shellmail also uses username and password but that is also using "force" because it opens a shell.
Your bounce logs will be suspicious yes, BUT it depends on where you leave them. If you leave shell/bounce logs on a rented server there is nothing to worry about because there are no admins on rented servers - so nobody will trace those logs.
If you leave shell/bounce logs on npc servers, then you should be worried because the admins on those servers might trace you.
To be safe: Use rented servers to bounce. That way you only need to delete the shell log on the npc server you hacked and nowhere else.
I thought it was a simple way to connect to a machine.
As it will only stablish connection and does nothing else, does not make sense to use shell.
I am not expert, and i don't even know what exatly is ssh or how it really works. But as far the game have showed me, simply using ssh is like using ftp, so much for that is the fact that all machines have this .exe command as part of the system.
Not like the other hackers tools which iindeed exploit weakness of system to invade.
So if it is a command part of the system it does not need to use shell to bypass anything. Its just a simple connection.
What would make more sense. To use shell to bypass security , retrive the pass word then come back with a normal connection which will not use shell, this way it will not log anything suspicious.
using rented servers to bounce? not sure about this.
bouncing is just a way to slowdown active tracking. So to cut out the passive rtacking all you need to do is to clean your tracks in any machine on the bouncing chain, preferably the first machine you start bouncing. If you mean to have a rented server to be the first machine so yes that would be more apropriated as you are the admin of that server so you have free access to it for deleting any information that would link you to the hacking act you'v done. And that would be just routed information which links your machine with the the third machine.
Like this, lest start with my machine then the rented server then the next machine from the bouncing list up to the target machine.
The routed information on the server will contain the my machine IP linked/routed to the next machine from the server. If i delete that. you cant tell who was responsable for the bouncing your are tracking.
If you leave stuff on your rented server it can be tracked back to you if you leave there the routed information! If other hacker enters this server tracking you and see the routed info you are done.
example show what and who hold what:
All hacking tools you have to download except for the wireless ones which is already in your machine to start the game. Which by the way should not anymore as the game gives you a gift wireless connection credencials to start the game. In this matter i don't know what it should be, either you give the gift and make the hacking wireless program online to be downloaded. OR you don't give any gift and let those program on the machine to start. I personally liked when there was no gift at all and you have to start the game by making your first hack in one of the wireless connections.
So i have looked up the ssh, it stands for secure shell, so i guess that mean i will open a shell whenever i make connections with this method.
Now my question is, is that much suspicious to make ssh connection?
And because it opens a "shell", and the admins trace shell logs, a ssh connection will be suspicious.
ssh = secure shell
And yes it will be suspicious if admin find out logs of shell access as the only ones supposed to do that is the admin himself, and he will know that if it was not him it was obviously someone else.
Now, cracking password, or bypassing security is an agressive act and therefore a hacking action without a doubt. As much as ssh connection is not a hacking action but if you are not the admin and comit such act so the act becomes hacking, but that does not make the tool ssh a hacking tool.
I'm not arguing. I am telling you now what i had figured out. As the answer here were not satisfying.
I had no clue before when i posted this thread. Now i get it. There is no arguing here unless you can't understand what i am saying. Either way there is nothing to argue, if you don't belive me so go do your search for yourself. If you want to belive ssh is a hacking tool be my guest you can think whatever you want it won't change the facts. But it is funny to think that someone would think of himself a hacker just because he stablish a ssh connection, such a hacker huh.
If you feel that your questions have been answered that is good enough for me! :)
Yes. you made a ssh connection (shell connection) and so it is recorded in the log.
In the game when using an exploit, it accesses a shell due to a vulnerability in the remote machine and registers as shell in the system log. If you connect directly by ssh you also get a shell and therefore register in the same way.
No, as I indicated above, the connection is registered as a shell regardless of who makes the connection.
If in previous versions of the game the log was not recorded that way it would be due to a bug, but it is the intended behavior.
Regards.
But very nice to have a dev clearing things out.
thank you.
As a later post of mine, i did tell i was wrong and sure was confused.
later i learned that SSH stands for secure shell. So it will open a shell regardless.
This thread should be closed.
So if you connect to another Computer it doesn't log a crack in security, it registers a connection with another computer opening a Shell (Program) remotely.
So if you connect to a computer it will log the connection and in order for you to do something with a connection you need to open a shell, otherwise it could've also just been a random website establishing a connection.
But because websites only establish connections a Shell is suspicious. I hope this answers all the questions.
Also if you want to leave no traces delete the /var folder from every computer you made a connection with.