Grey Hack

Grey Hack

Zentaki Nov 17, 2018 @ 6:07am
Shell connection
Is it supposed to be shell connection when i am just connecting via ssh normally using the user and password?

I remember connecting somewhere without appearing the shell connecting in the log file.

As i could understand shell connecting only should appear when we break/bypass the computer security.
For normal connection it should not appear shell.

So i am really confused now, as i am pretty sure i did connect more than once in some point of the game development, which if i connect using credentials it would only register in the log my IP connection and the exit, it will not resgister shell operation.

I have now noticed that does not matter how you connect it will always register shell operation.

If this is wrong it is a game breaking, unless the game does not track IP which used shell operation and is ignored.
Last edited by Zentaki; Nov 17, 2018 @ 6:08am
< >
Showing 1-11 of 11 comments
3nigma Nov 17, 2018 @ 6:34am 
Good question!

The way I understand it, the ssh cmd is also a hacking tool which gives you the ability to open a shell on someones computer if you have their login credentials.

Like if I could open a shell on your real computer from my real computer if I have your login details.

As for the log, since you are opening a shell on someones server it makes sense that opening the shell is logged.
Zentaki Nov 17, 2018 @ 8:56am 
Originally posted by 3nigma:
Good question!

The way I understand it, the ssh cmd is also a hacking tool which gives you the ability to open a shell on someones computer if you have their login credentials.

Like if I could open a shell on your real computer from my real computer if I have your login details.

As for the log, since you are opening a shell on someones server it makes sense that opening the shell is logged.
So all ssh realated will open a shell?
i mean there are t2 types of connecting to IP via terminal, which does not use force, ssh and ftp.

even the ssh is not forcing entry it is a shell operation?

I was think about that if i keep leaving shell logs behind it will eventually find me. As one would know that someone had access in shell and that is suspicious, even if i erase the log routed to my IP.

I mean this, i bounce around, for each machine i bounce it will leave 3 logs behind.
The first is the connecting to the machine IP it is connecting from.
Second will be the shell operation from this same IP of origin.
third will be the exit.

This will occur for every machine, even if i delete the routed log from the first machine connected to, the other machines will have traces that indicates suspecious activity. So it will be clear that someone is using bouncing and erasing their tracks. My concern is that to not let that suspicious start in the first place, if i could connect without leaving traces of shell behind.

I can do that going into every log file to erase this. But it is very time consuming.

So the question is, should i worry about it? or just deleting the traces from the first machine i am connecting to will do the trick? (i'm playing single player yet) Also i do not know what really matters, i mean how good is the game about tracking us? and for multiplayer what changes?
Last edited by Zentaki; Nov 17, 2018 @ 8:57am
3nigma Nov 17, 2018 @ 9:18am 
Originally posted by Zentaki:
So all ssh realated will open a shell?
i mean there are t2 types of connecting to IP via terminal, which does not use force, ssh and ftp.

even the ssh is not forcing entry it is a shell operation?

I was think about that if i keep leaving shell logs behind it will eventually find me. As one would know that someone had access in shell and that is suspicious, even if i erase the log routed to my IP.

I mean this, i bounce around, for each machine i bounce it will leave 3 logs behind.
The first is the connecting to the machine IP it is connecting from.
Second will be the shell operation from this same IP of origin.
third will be the exit.

This will occur for every machine, even if i delete the routed log from the first machine connected to, the other machines will have traces that indicates suspecious activity. So it will be clear that someone is using bouncing and erasing their tracks. My concern is that to not let that suspicious start in the first place, if i could connect without leaving traces of shell behind.

I can do that going into every log file to erase this. But it is very time consuming.

So the question is, should i worry about it? or just deleting the traces from the first machine i am connecting to will do the trick? (i'm playing single player yet) Also i do not know what really matters, i mean how good is the game about tracking us? and for multiplayer what changes?

I believe opening a shell in itself is a use of "force", it is the same with shellmail. shellmail also uses username and password but that is also using "force" because it opens a shell.

Your bounce logs will be suspicious yes, BUT it depends on where you leave them. If you leave shell/bounce logs on a rented server there is nothing to worry about because there are no admins on rented servers - so nobody will trace those logs.

If you leave shell/bounce logs on npc servers, then you should be worried because the admins on those servers might trace you.

To be safe: Use rented servers to bounce. That way you only need to delete the shell log on the npc server you hacked and nowhere else.

Zentaki Nov 17, 2018 @ 3:40pm 
So ssh is a forcefull act?
I thought it was a simple way to connect to a machine.
As it will only stablish connection and does nothing else, does not make sense to use shell.
I am not expert, and i don't even know what exatly is ssh or how it really works. But as far the game have showed me, simply using ssh is like using ftp, so much for that is the fact that all machines have this .exe command as part of the system.

Not like the other hackers tools which iindeed exploit weakness of system to invade.

So if it is a command part of the system it does not need to use shell to bypass anything. Its just a simple connection.

What would make more sense. To use shell to bypass security , retrive the pass word then come back with a normal connection which will not use shell, this way it will not log anything suspicious.

using rented servers to bounce? not sure about this.

bouncing is just a way to slowdown active tracking. So to cut out the passive rtacking all you need to do is to clean your tracks in any machine on the bouncing chain, preferably the first machine you start bouncing. If you mean to have a rented server to be the first machine so yes that would be more apropriated as you are the admin of that server so you have free access to it for deleting any information that would link you to the hacking act you'v done. And that would be just routed information which links your machine with the the third machine.

Like this, lest start with my machine then the rented server then the next machine from the bouncing list up to the target machine.
The routed information on the server will contain the my machine IP linked/routed to the next machine from the server. If i delete that. you cant tell who was responsable for the bouncing your are tracking.

If you leave stuff on your rented server it can be tracked back to you if you leave there the routed information! If other hacker enters this server tracking you and see the routed info you are done.

example show what and who hold what:
your machine IP 654>>> rented server IP 321 >>>>> bounce1...IP 987 connection to IP321 IP 654 routed to IP 987 connection from IP 321 connection from 654
Last edited by Zentaki; Nov 17, 2018 @ 3:41pm
Zentaki Nov 17, 2018 @ 3:54pm 
Originally posted by 3nigma:
the ssh cmd is also a hacking tool which gives you the ability to open a shell on someones computer if you have their login credentials.
Well it is not a hacking tool. It is just a command to connect , all machines have this as part of the system. Like FTP. It is definitely not a hacking tool.
All hacking tools you have to download except for the wireless ones which is already in your machine to start the game. Which by the way should not anymore as the game gives you a gift wireless connection credencials to start the game. In this matter i don't know what it should be, either you give the gift and make the hacking wireless program online to be downloaded. OR you don't give any gift and let those program on the machine to start. I personally liked when there was no gift at all and you have to start the game by making your first hack in one of the wireless connections.

So i have looked up the ssh, it stands for secure shell, so i guess that mean i will open a shell whenever i make connections with this method.
Now my question is, is that much suspicious to make ssh connection?

Last edited by Zentaki; Nov 17, 2018 @ 3:59pm
3nigma Nov 17, 2018 @ 6:25pm 
I am not entirely sure what you are trying to argue here. But if you read about ssh in the manual you will see that it is a hacking tool that uses a backdoor on ssh servers :)

And because it opens a "shell", and the admins trace shell logs, a ssh connection will be suspicious.
Zentaki Nov 17, 2018 @ 6:52pm 
Originally posted by 3nigma:
I am not entirely sure what you are trying to argue here. But if you read about ssh in the manual you will see that it is a hacking tool that uses a backdoor on ssh servers :)

And because it opens a "shell", and the admins trace shell logs, a ssh connection will be suspicious.
Just because it is meant to use a back door to connect to a machine remotely it does not mean it is a hacking tool. Its just a feature where the target machine has it on/off.
ssh = secure shell
And yes it will be suspicious if admin find out logs of shell access as the only ones supposed to do that is the admin himself, and he will know that if it was not him it was obviously someone else.
Now, cracking password, or bypassing security is an agressive act and therefore a hacking action without a doubt. As much as ssh connection is not a hacking action but if you are not the admin and comit such act so the act becomes hacking, but that does not make the tool ssh a hacking tool.

I'm not arguing. I am telling you now what i had figured out. As the answer here were not satisfying.
I had no clue before when i posted this thread. Now i get it. There is no arguing here unless you can't understand what i am saying. Either way there is nothing to argue, if you don't belive me so go do your search for yourself. If you want to belive ssh is a hacking tool be my guest you can think whatever you want it won't change the facts. But it is funny to think that someone would think of himself a hacker just because he stablish a ssh connection, such a hacker huh.
Last edited by Zentaki; Nov 17, 2018 @ 6:54pm
3nigma Nov 17, 2018 @ 7:25pm 
I wont argue with you.
If you feel that your questions have been answered that is good enough for me! :)
Kurouzu  [developer] Nov 17, 2018 @ 8:15pm 
Originally posted by Zentaki:
Is it supposed to be shell connection when i am just connecting via ssh normally using the user and password?

Yes. you made a ssh connection (shell connection) and so it is recorded in the log.

In the game when using an exploit, it accesses a shell due to a vulnerability in the remote machine and registers as shell in the system log. If you connect directly by ssh you also get a shell and therefore register in the same way.

Originally posted by Zentaki:
As i could understand shell connecting only should appear when we break/bypass the computer security.
For normal connection it should not appear shell.

No, as I indicated above, the connection is registered as a shell regardless of who makes the connection.

If in previous versions of the game the log was not recorded that way it would be due to a bug, but it is the intended behavior.

Regards.
Last edited by Kurouzu; Nov 17, 2018 @ 8:19pm
Zentaki Nov 18, 2018 @ 5:57am 
Originally posted by KuRouZu:
Originally posted by Zentaki:
Is it supposed to be shell connection when i am just connecting via ssh normally using the user and password?

Yes. you made a ssh connection (shell connection) and so it is recorded in the log.

In the game when using an exploit, it accesses a shell due to a vulnerability in the remote machine and registers as shell in the system log. If you connect directly by ssh you also get a shell and therefore register in the same way.

Originally posted by Zentaki:
As i could understand shell connecting only should appear when we break/bypass the computer security.
For normal connection it should not appear shell.

No, as I indicated above, the connection is registered as a shell regardless of who makes the connection.

If in previous versions of the game the log was not recorded that way it would be due to a bug, but it is the intended behavior.

Regards.
Yes, i had figure it out by the time you responded.
But very nice to have a dev clearing things out.
thank you.

As a later post of mine, i did tell i was wrong and sure was confused.
later i learned that SSH stands for secure shell. So it will open a shell regardless.
This thread should be closed.
Phantom Jan 14 @ 9:27am 
I know it has been 7 years but just to clear out any confusion, every program is a shell, your terminal, your FileExplorer and everything else.
So if you connect to another Computer it doesn't log a crack in security, it registers a connection with another computer opening a Shell (Program) remotely.
So if you connect to a computer it will log the connection and in order for you to do something with a connection you need to open a shell, otherwise it could've also just been a random website establishing a connection.
But because websites only establish connections a Shell is suspicious. I hope this answers all the questions.

Also if you want to leave no traces delete the /var folder from every computer you made a connection with.
< >
Showing 1-11 of 11 comments
Per page: 1530 50