Hacker Simulator

Hacker Simulator

Not enough ratings
Quick Guide Commands/Tools/Basic
By DNR Мистер яд
---

# **Hacker Game Quick Guide**

---

## **1. Computer/ServerSide Access**

### **v4 Privilege Escalation**
*(Combination of V1 or V2 - Newest Version)*
*(Note: Does not work on FTP/SSH server side)*

**Commands:**
- `nmap [ip-address]`
*Scans the network for vulnerabilities (SMB/HTTP/FTP/SSH), provides version of exploit.*
- V1 or V2 exploit access
- `scanprivilege`
- `exploitprivilege [dictionary]`
*Dictionaries: environment, os, kernel, path, passwd, sudo, cron*

---

### **v3 ServerSide Access (FTP/SSH)**
*Note: Navigation Commands*
- **FTP**: `dir`, `close/disconnect`, `quit`
- **SSH**: `ls`, `close/disconnect`, `exit`

**Commands:**
- `nmap [ip-address]`
*Scans the network for vulnerabilities (FTP/SSH), provides version of exploit.*
- `ripperjack [ip-address] [ftp or ssh] [dictionary]`
*Dictionaries: reverse, phantom, diablo, blade*

---

### **v2 Personal Computer (SMB/HTTP)**

**Commands:**
- `nmap [ip-address]`
*Scans the network for vulnerabilities (SMB/HTTP/FTP/SSH), provides version of exploit.*
- `exploit_http_249 [ip-address]`
- `exploit_smb_249 [ip-address]`

---

### **v1 Personal Computer (SMB/HTTP) (Older Version)**

**Commands:**
- `nmap [ip-address]`
*Scans the network for vulnerabilities (SMB/HTTP/FTP/SSH), provides version of exploit.*
- `httpoverflow [Exploit#] [ip-address]`
- `smbeternal [Exploit#] [ip-address]`

---

---

## **2. Comet**

### **Commands:**

1. **Company Profile on Linkout**
`linkout [website]`
*Retrieve company profile information.*

2. **Note Employees (Phishing)**
*Profile employees for phishing attacks.*

3. **VPN Access**
`vpn [vpn-file]`
*Connect to a VPN using a provided file.*

4. **Access Company "Access" File**
`access [access-file]`
*Log into a network’s access control software using the access file.*

5. **Use Company VPN**
*Connect to the company’s VPN to gain access to their network.*

6. **LAN Scanner Tool**
*View network topology.*

7. **Switch Machines**
`switch [machine-ip-address]`
*Connect to a specific machine in the network.*

**Note:**
`serversniffer` - *Listen for any connections to the machine you are connected to.*

---

---

## **3. Tools**

### **Nmap**

**Command:**
- `nmap [ip-address]`
*Scans the network for vulnerabilities (SMB/HTTP/FTP/SSH), provides version of exploit.*

---

### **Monitoring Tools**

**Commands:**
- `netcat`
*Listen for phishing reverse shells (malware).*

- `tracermonitor`
*Listen for passive tracing devices.*

- `skimmermonitor`
*Listen for data captured by skimmers (credit card scams).*

- `keyloggermonitor`
*Listen for data captured by keyloggers (credit card scams).*

- `serversniffer`
*Listen for any connection to the machine you're connected to.*

---

### **Cracking (Decrypt File)**

**Command:**
- `decrypt [file-name]`
*Enter hex combinations to decrypt the file.*
Example: `decrypt ex. [O5:7I:89:4F:8H:B8:J7]`
*Combination: `[89:4F:B8]`*

---

### **Card Skimming (Skimmermonitor) (Credit Card Scam)**

**Command:**
- `cardwriter cc_[%#10%]_dump.txt`
*Used for credit card scams.*

---

---

## **4. Jobs**

### **Malware**

**Commands:**

1. Combination to V1, V2, or V3 in Computer/Server Access

**Personal Computer (SMB/HTTP):**
- `upload malware/[Owner's_Name]_malware [downloads]`
*Owner's name will be the contact's name.*

**ServerSide (FTP/SSH):**
- `put malware/[Owner's_Name]_malware [downloads]`
*Owner's name will be the contact's name.*

---

### **Text Files (TXT)**
*Extract information such as address, phone number, SSN, DL ID:*

**Commands:**
- `\\grab file`
*Quick grab of relevant data.*

- `cat [folder]/[file.txt]`
*View file content.*

- `get [folder]/[file.txt]`
*Download file content.*

---

### **Keylogging**

**Command:**
- `(keyloggermonitor)`
*Used for keylogging and credit card scams.*

**Personal Computer (SMB/HTTP):**
- `upload keylogger/keylogger.exe [downloads]`

**ServerSide (FTP/SSH):**
- `put keylogger/keylogger.exe [downloads]`

---

---
   
Award
Favorite
Favorited
Unfavorite