Hacker Revolution: Reinsertion Demo

Hacker Revolution: Reinsertion Demo Hacker Revolution: Reinsertion Demo Hacker Revolution: Reinsertion Demo Hacker Revolution: Reinsertion Demo

Hacker Evolution is a console oriented hacking simulator game. It's key feature is the built-in scripting language and the complexity of it's features. Graphical elements that have never been seen before, combined with the flexibility of the scripting language, result in a complex world, that is very close to reality.

The game takes place in a virtual world. The concept of missions and levels is eliminated. The entire world advances and evolves, based on the users actions. Predicting what will happen next, will be almost impossible. The game will be neverending. Shortly after the release of the single player version, and online version will shortly be made available. Play online. Against real people.

Text file description:

-------------------------------------------------------------------------------------
How to set up and use bounced links:
To add a host to the bounced link, simply click on it.
To remove a host from the bounce, click on it again.
Add as many hosts as you wish, a larger bounce link means increased trace time.
The bounced links can be a powerfull tool if used right, or just a waste of resources
if you aren't carefull!
Notes :
- You can bounce through a host for a maximum of 3 times. After that, the host
  is removed from the bounced link.
- Every host in the bounced list must be hacked, otherwise you won't be able
  to connect using the bounced link.
- The tracetime is multiplied by the number of hosts in the bounced links, plus 1.
- You can't add or remove hosts to/from the bounce linked, while you are connected.
-------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------
Console commands
HELP                  - Displays a list of commands and their meaning.
LS (or DIR)           - Displays a list of files on the current server, or the localhost
CAT filename          - Displays the contents of a file
DELETE filename       - Deletes a file
SCAN                  - Scans a host for open ports (Example : scan server.com)
CONNECT SERVER [PORT] - Connects to a server on a given port.
                        Example : connect server.com 65
                        If no port is specified, the connection defaults to port 80.
LOGOUT                - disconnects from a server.
DOWNLOAD filename     - downloads a file from a server
UPLOAD   filename     - uploads a file to a server
EXEC exploit server   - executes an exploit on a given server
CLEAR                 - clears the command console window
CRACK SERVER [PORT]   - Cracks the password for a service, running on a specified port.
DECRYPT               - Decrypts the encryption key of a server.
TRANSFER              - Transfer money from a server
ABORT                 - Abort an ongoing transfer, download, crack, etc.
CONFIG                - Displays the current hardware configuration
UPGRADE               - Upgrades your hardware/software
DOWNGRADE             - Sell your hardware for 90% of it's value
LOGIN                 - Connects to a server if the password is known
BOUNCEHELP            - Displays help on using bounced links
BOUNCEINFO            - Displays information on the current bounced link setup
BOUNCE                - Add/remove a server to/from the bounce link setup
KILLTRACE             - Will reduce your global trace level by 10%, for a price of $500
Shortcut keys :
F1  - Shows quickhelp screen
F2  - Displays the level objectives
F3  - Displays the level overview
ESC - Exit the game
Press the [PageUp] and [PageDown] keys to scroll through the help screen.
------------------------------------------------------------------------------------------------Quick help :
F1    - Shows this help screen
F2    - Displays the level objectives
F3    - Displays the level overview
PAUSE - Pauses the game
PgUp  - scroll up in the console window
PgDn  - scroll down in the console window
TAB   - command/hostname autocompletion
F4    - Jump to the next track in the playlist
F11   - Reduce music volume
F12   - Increase music volume
You can adjust the sound effects volume from the Options menu of the game.
You can right-click on a host on the visual map, to perform a scan.
root@dot-hackers.net
Fresh stuff available!
---------------------------------------
Visit our website, for some fresh files
and content.
Admin/admin@hacker-evolution.com
Welcome
Welcome to the Hacker Evolution
tutorial mission.
You can press :
/color 192 192 192 F1 - for quick help
/color 192 192 192 F2 - for level objectives
/color 192 192 192 F3 - for level overview
You can type :
/color 192 192 192 HELP
in the console for a list of
available commands.
Admin/admin@hacker-evolution.com
First objective
Your first objective is to hack into
/color 192 192 192 [core.hacker-evolution.com]
For this, you can use the CRACK
command. Type :
/color 192 192 192 crack core.hacker-evolution.com
in your console, and wait until
the password is cracked.Admin/admin@hacker-evolution.com
atm.hacker-evolution.com
Before attempting to connect to :
atm.hacker-evolution.com,
you will notice that this host has an
encryption key, which you must decrypt,
before being able to connect.
Type :
/color 192 192 192 decrypt atm.hacker-evolution.com
in your console to decrypt its
encryption key.
Please wait until the decryption
process is completed.Admin/admin@hacker-evolution.com
atm.hacker-evolution.com
Excellent! You have now gained
access to : atm.hacker-evolution.com
Type :
/color 192 192 192 connect atm.hacker-evolution.com
to connect to it, then type :
/color 192 192 192 transfer 1000
to transfer $1000 to your account.Admin/admin@hacker-evolution.com
Next objective
Your next objective is to get $1000 in
your account balance.
You can obtain the money from the
following server :
/color 192 192 192 atm.hacker-evolution.com
This server is hidden on the visual map.
Type :
/color 192 192 192 scan atm.hacker-evolution.com
to reveal it.
Admin/admin@hacker-evolution.com
Connection configuration
To retrieve the connection configuration
file from [atm.hacker-evolution.com],
use the [download] command, like this :
/color 192 192 192 download connect.config
TIP : You can type ls, when connected
to a server, to see a listing of all
files.Admin/admin@hacker-evolution.com
hacker-evolution.com FTP
Now that you have the exploit on hand,
use it to hack the FTP service on
hacker-evolution.com
Type:
/color 192 192 192 exec heftpd.exploit hacker-evolution.com
Admin/admin@hacker-evolution.com
hacker-evolution.com FTP
Your next objective is to hack the FTP
service running on port 21 on:
hacker-evolution.com
You can achieve this by using an
exploit instead of the crack command.
For this, connect to
/color 192 192 192 core.hacker-evolution.com
and download the [heftpd.exploit] file.
Admin/admin@hacker-evolution.com
sec.hacker-evolution.com
Your next goal is to hack into the
sec.hacker-evolution.com server.
If you are going to simply use the CRACK
command, you will get traced and lose
the level.
To increase your tracetime, you must use
a bounced link. Click on all available
hosts on the targetmap, to add them to
the bounced link (except your target).
Then you can use the crack command to
succesfully complete this objective.
Admin/admin@hacker-evolution.com
Hack into user.hacker-evolution.com
Your next goal is to hack into the
user.hacker-evolution.com server.
Use the scan command to reveal the host
on the map.
Next, find the password for the host.
You will find the password in the
/color 192 192 192 passwd
file on core.hacker-evolution.com
Download the file to find the password.
Admin/admin@hacker-evolution.com
Hack into user.hacker-evolution.com
Now that you have the password, use the
LOGIN command to hack the host.
To do this, type :
/color 192 192 192 login user.hacker-evolution.com pass945
Admin/admin@hacker-evolution.com
Reduce your trace level below 50%
Your next objective is to reduce your
trace level below 50%.
For this, you can use the
/color 192 192 192 KILLTRACE
command.
Note : You will need $500, to reduce your
trace level by 10%. If you need money,
you can get it from :
/color 192 192 192 atm.hacker-evolution.com
Tip : Setup a bounced link before
transfering money.4
hemusic-djvelocity-nanobyte.mp3
hemusic-djvelocity-plasma.mp3
hemusic-djvelocity-particle.mp3
hemusic-djvelocity-twilight.mp3
1
hemusic-avenue5-wish-and-hope-dhmod.mp31
hemusic-djvelocity-conceptual-design.mp3255 204 15 // This is the color for the hostnames on the visual map, through wich the player can bounce
210 210 210 // This is the color for the hostnames on the visual map (default)
171 128 15 // Targetmap and status texts color
220 220 220 // Transfer/crack/decrypt/upload/download progress text color
210 164 15 // Bounced link line color
192 192 192 // Command prompt text color
255 204 15 // Window text colorHacker Evolution End User License Agreement (EULA)
This exosyphen studios End-User License Agreement ("EULA") is a legal agreement between you (either an individual or organization) and exosyphen studios for Hacker Evolution, which includes this computer software and its associated printed and online documentation ("SOFTWARE PRODUCT"). By installing, downloading, copying, accessing, or otherwise using any portion of the SOFTWARE PRODUCT, you agree to be bound by the terms of this EULA. You further agree that the EULA is the complete and exclusive statement of agreement between exosyphen studios and you and that this EULA supersedes any oral or written proposal, agreement or other communication relating to the subject matter of this EULA. You assume full responsibility for the use of the SOFTWARE PRODUCT and agree to use the software legally and responsibly. Romanian laws shall govern this EULA. This EULA is deemed entered into at Cluj-Napoca, Romani by all parties. If any provision of this EULA is declared unenforceable in any jurisdiction, then such provision shall be deemed to be severable from this EULA and shall not affect the remainder thereof.
SOFTWARE PRODUCT LICENSE
Copyright laws and international copyright treaties, as well as other intellectual property laws and treaties protect the SOFTWARE PRODUCT. The SOFTWARE PRODUCT is licensed, not sold and is wholly owned by exosyphen studios
GRANT OF LICENSE
exosyphen studios reserves all rights not expressly granted below:
USAGE
You may install one copy of the SOFTWARE PRODUCT on a single computer or workstation ("COMPUTER"). The primary user of the COMPUTER on which the SOFTWARE PRODUCT is installed may install a second copy for his or her exclusive use on a portable OR home computer (but not both) provided that the software is not run simultaneously on both computers.
MULTIPLE USERS
If this license is a multiple user license, you may install the SOFTWARE PRODUCT on as many COMPUTERS as you have licenses. You may also make an equivalent of secondary copies for portable computer use as specified in the USAGE section above.
NETWORK INSTALLATION
You may store or install a copy of the SOFTWARE PRODUCT on a storage device, such as a network server, used only to install the SOFTWARE PRODUCT on your other COMPUTERS over an internal network; however, you must acquire and dedicate a license for each separate COMPUTER on which the SOFTWARE PRODUCT is RUN from the storage device. A license for the SOFTWARE PRODUCT may not be shared or used concurrently on different COMPUTERS.
BACKUP COPY.
After installation of one copy of the SOFTWARE PRODUCT pursuant to this EULA, you may keep the original media on which exosyphen studios provided the SOFTWARE PRODUCT solely for backup or archival purposes. You may make one copy of the SOFTWARE PRODUCT solely for backup or archival purposes. Except as expressly provided in this EULA, you may not otherwise make copies of the SOFTWARE PRODUCT or the printed materials accompanying the SOFTWARE PRODUCT.
SPECIFIC LIMITATIONS AND EXCLUSIONS
REVERSE ENGINEERING
You may not reverse engineer, debug, decompile, or disassemble the SOFTWARE PRODUCT, except and only to the extent that applicable law expressly permits such activity.
DERIVATIVE WORKS
You may not create derivative works based upon the SOFTWARE PRODUCT.
RENTAL
You may not rent, lease, or lend the SOFTWARE PRODUCT.
TRADEMARKS
This EULA does not grant you any right to use any trademarks or service marks of exosyphen studios
EXPORT
You acknowledge that the laws and regulations of the United States restrict the export and re-export of the SOFTWARE PRODUCT to restricted countries and agree not to export or re-export the SOFTWARE PRODUCT to restricted countries without the appropriate approval of the United States government.
LICENSE TRANSFER
The initial licensee of the SOFTWARE PRODUCT may make a one-time permanent transfer of this EULA and SOFTWARE PRODUCT only directly to an end user. This transfer must include all of the SOFTWARE PRODUCT (including all component parts, the media and printed materials, any upgrades, this EULA). Such transfer may not be by way of consignment or any other indirect transfer. The transferee of such one-time transfer must agree to comply with the terms of this EULA, including the obligation not to further transfer this EULA and SOFTWARE PRODUCT. The previous licensee of this SOFTWARE PRODUCT must notify exosyphen studios in writing of this transfer.
TERMINATION
Without prejudice to any other rights, exosyphen studios may terminate this EULA if you fail to comply with the terms and conditions of this EULA. In such event, you must destroy all copies of the SOFTWARE PRODUCT and all of its component parts.
exosyphen studiosS COPYRIGHTS
exosyphen studios owns all title and copyrights in and to the SOFTWARE PRODUCT, the accompanying documentation and any copies of the SOFTWARE PRODUCT.
COPYRIGHTS OF OTHERS
This software is designed to help you capture, edit, create and document (USE) material in which you own the copyright, which you have permission from the applicable copyright holder or which there is no copyright. This EULA grants you no rights to USE materials owned by other copyright holders. USING materials owned by other copyright holders without their permission may be a violation of copyright laws and may subject you to payment of damages and/or other remedies. In you are uncertain about your rights you should contact your legal advisor.
LIMITED WARRANTY
exosyphen studios warrants that the SOFTWARE PRODUCT will perform substantially in accordance with the accompanying written materials for a period of 90 days from the date of purchase. exosyphen studios will make a commercially reasonable effort within 90 days to solve any problem issues.
LIMITATION OF REMEDIES
exosyphen studioss entire liability and your exclusive remedy shall be, at exosyphen studioss option, either (a) return of the price paid not including shipping and handling within 90 days or (b) repair or replacement of the SOFTWARE PRODUCT within 90 days. This Limited Warranty is void if failure of the SOFTWARE PRODUCT has resulted from accident, abuse, or misapplication. Any replacement SOFTWARE PRODUCT will be warranted for the remainder of the original warranty period.
LIMITATION OF LIABILITY
To the maximum extent permitted by applicable law, in no event shall exosyphen studios or its suppliers be liable for any special, incidental, indirect, or consequential damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of savings, loss of business information, or any other loss) arising out of the use of or inability to use the SOFTWARE PRODUCT, even if exosyphen studios has been advised of the possibility of such damages. In any case, exosyphen studioss entire liability under any provision of this EULA shall be limited to the amount actually paid by you for the SOFTWARE PRODUCT. 

File information

File name: hackerevolution-reinsertiondemo-setup.exe

File size: 33.6 MB

Mime type: application/x-dosexec; charset=binary