Skip to content

Instantly share code, notes, and snippets.

@Pastillage
Last active July 31, 2018 20:01
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 1 You must be signed in to fork a gist
  • Save Pastillage/60eebb34d18f877edfa887a4c071220b to your computer and use it in GitHub Desktop.
Save Pastillage/60eebb34d18f877edfa887a4c071220b to your computer and use it in GitHub Desktop.

Rules:

All runs revolve around executing porthack on the Heart as fast as possible.

Any%/Cheat%:

  • Looking at your save data and using that info is strictly prohibited.
  • No guessing of randomized variables.
    • (i.e. The Entropy Test Server's Admin password is randomized (non-static), Naix's root gateway's ip is static (always the same).)

Heart%:

  • Looking at your save data and using that info is strictly prohibited.
  • No guessing of randomized variables.
  • Cheater's Stash (1337.1337.1337.1337) & Credit Server (226.187.99.3) are not allowed to be used.

Heart%-secure:

  • Looking at your save data and using that info is strictly prohibited.
  • No guessing of randomized variables.
  • Cheater's Stash (1337.1337.1337.1337) & Credit Server (226.187.99.3) are not allowed to be used.
  • In order to use a passwords or IPs it must have been on-screen prior to using it.
  • No sequence breaks.

Route Heart%-secure

Beginnings:

  • When the terminal unlocks spam "ps" command to quickly see what the process id is for the tutorial.
  • Click on your PC, Click SCAN
  • Click DISCONNECT
  • Click on the new node that appeared.
  • kill [number]
  • remove SecurityTracer & shell your own pc
  • connect to the Viper-Battlestation
  • Porthack > cd bin/ > scp SSHcrack.exe > shell > reply
  • bitwise test PC > sshcrack 22 > porthack > shell > reply
  • P. Anderson's Bedroom PC > sshcrack 22 > porthack > shell > rm log/* > reply
  • Overload + SSH Hack on Entropy Test Server
  • cd home, scp E > shell > reply
  • Slash-bot > Overload > SSH 22 > porthack
  • cd M > rm co.s > reply
  • Visit the entropy asset server > download FTP > reply
  • Entropy Contract Database > Login > Accept > Point Clicker

Entropy:

  • Node > FTP & SSH > porthack > cd PointClicker/Saves > rm Mengsk.pcsav > reply

  • Accept: The famous Counter-Hack

  • Node > Overload > FTP & SSH > porthack > cd /home/WORKSPACE/ > rm SECURE_MAILLIST.dec > reply

  • Accept: Back to School

  • Node > Overload > SSH > porthack > cd /home/MH_STAFF > cat pw_memo.log > reply ******* (7 stars)

  • Open eOS Device Scanning Mail click on the node & open the forwarded mail (alpine password requirement)

  • go to entropy asset server > cd /bin/ > scp eosDeviceScan.exe > go to linked node

  • FTP & SSH > porthack > eosDeviceScan > go to found node

  • login admin/alpine > cd /eos/mail/ > cat jjstacks@jmail.com.act > reply with tintin7

  • Accept: X-C Project

  • Node > overload > SSH > porthack > cd X/Personal/ > cat Penetrator_mk1.spec > reply with 4991

  • Naix time

  • Open Agression must be punished mail and put the node on your map.

  • go to the asset server and close 1 shell to have 4 active shells.

  • Node > overload x4 > close 2 shells > FTP > SMTP > SSH > Porthack > cd /home/ > rm M

  • Reply to the "Agression must be punished mail"

  • go to your own pc and moniter the /log/ activate trap at the right time.

  • Node > overload > FTP & SMTP > SSH > Porthack > cd /home/loot/ > cat Macrosoft_dox.txt > reply with 168.61.82.246

*(Keep analyzing untill there's no more random characters) (NOTE: You can perform hacks while solving, optimize this properly for the fastest time)

  • CSEC Gauntlet 1 > analyze firewall* and solve it > solve KRAKEN > FTP & SSH > Porthack > cd /home/Test > cat CONTINUE.txt > shell > scan

  • CSEC Gauntlet 2 > overload > FTP & SSH > Porthack > cd /home/Test > cat CONTINUE.txt > shell > scan

  • CSEC Gauntlet 3 > overload & analyze > solve KUNKKA > close 2 shells > FTP & SMTP > SSH > Porthack > cd /home/Gfit > scp WebServerWorm.exe > click on the Test folder > open invitation passwors > reply to email with ABX07cc9

  • close shells until you have 2 shells.

  • cfc node > WebServerWorm & SMTP > scan > SSH & FTP & WEB > SMTP > Porthack > scan

  • Node > Analyze > Solve Chicken > WebServerWorm & SMTP > Porthack > cd /home/Ordering/ > scp Seasoning_Order_Placement_Template_Pt1 & 2.docx > shell

  • Drop server > upload /home/Seasoning_Order_Placement_Template_Pt1.docx & 2 > reply to mail.

CSEC:

  • Go to CSEC asset server > Download the Sequencer & SQL_Mem_Corrupter > shell

  • Login to CSEC > Accept: Investigate a medical record

  • Node, Overload, Firewall (MEDICATE), FTP & SQL -> WebServerWorm & SMTP, PortHack, Access Records: Jonas Sandburg, Mail to: gila@jmail.com, done.

  • Close 2 shells, you won't need to overload any proxies for a while.

  • Accept: Teach an old dog new tricks [Int.Academic]

  • Teach an old dog new tricks [Int.Academic] [solve ACADEMIC] (John Stalvern // Manchester University // Masters in Digital Security // 4)

(NOTE: You can perform hacks while solving, optimize this properly for the fastest time)

  • Node, analyze > Solve Academic, FTP & SQL -> WebServerWorm & SMTP, Porthack, Search: John Stal, EDIT: Masters in Digital Security -> Done.

  • Accept: Locate or create decryption software

  • Node, WebServerWorm & SQL_MemCorrupt, analyze -> solve ENCRYPT, porthack, scan > Next Node

  • FTP & SQL -> Web & SMTP -> SSH, porthack, cd Staff/A.Carey/ > scp decypher.exe > Crossroads Servers > porthack

  • Decypher encrypt_source.dec (/home), scp encrypt_source.cs > CSEC Public Drop Server

  • Upload /home/encrypt_source.cs > reply

  • Accept: Check out a suspicious server > click on the linked node > insta reply

  • Accept: Track an encrypted file

  • Node, FTP & WEB & SSH > porthack, cd /home/work/ > scp DECHead.exe -> Reply -> Part 2 (* autocomplete on DECH)

  • Crossroad Server, DECHead CSEC_encode_1.dec, connect 168.61.82.245

  • FTP & Web -> SQL, porthack, cd WORKLOG > cat 3345633.log -> reply with: beepbeep

  • Accept: Wipe Clean an academic record > login > search: Jacob Stev > delete record > reply

  • Accept: Help an aspiring writer

  • Crossroads -> DECHead T2_Screenplay.dec -> scp FOF_Screenplay.doc > connect 37.187.27.55 (might be random)

  • SMTP & SSH > analyze > solve DANGER -> porthack -> upload home/FOF_Screenplay.doc > Done

  • Accept: Project Junebug

  • Universal Medical -> SOLVE MEDICATE, FTP & SQL -> WEB & SMTP -> Search Elliot White -> connect 66.96.147.84

  • open #0E0015_-_Pacemaker_v2.44 Firmware and Patching > 111.105.22.1 is the revealed ip.

  • SSH & Web & FTP -> SMTP -> analyze > Solve Biogel -> porthack > scan ->

  • Go to scanned node -> solve BIOGEL -> SSH & Web & FTP -> SMTP, porthack, scp KBT_PortTest.exe (/Production/Output/) connect 111.105.22.1

  • SSH & Web & FTP -> SMTP, porthack, scp PacemakerFirmware_Cycle_Test.dll (/projects/KellisBT/Tests/) -> cat Eidolon_Security_Notes.txt (/projects/Internal/)

  • connect 202.6.141.219 > KBTPortTest, porthack, cd /KBT_Pacemaker/ > upload home/PackemakerFirmware_Cycle_Test.dll > login EAdmin, tens86, activate PaceMakerFirmWare_Cycle_Test.dll > reply (Wait for heartrate to reach 0)

Bit:

  • CSEC Asset Server -> cd bin/TK/ -> decypher TraceKill.dec dx122DX -> shell > scp TraceKill.exe -> Reply.

  • shell any other server

  • Node -> Overload > -> SSH & SMTP -> Web & SQL -> Porthack -> cd /home/work/ -> DECHead hn_repo_archive.dec -> ip gained: 156.151.59.35 -> reply IP.

  • Node -> SSH & SMTP -> Web & SQL -> Porthack -> scan -> goto workstationCore

  • SQL_MemCorrupt 1433 -> porthack -> TraceKill -> scan -> goto workstation_008

  • Overload -> solve WSP9KJ -> SSH & KBTPortTest -> WebServerWorm -> PortHack -> TraceKill -> Prometheus.txt (WORKSTATION/store/) > StoreServIPs.txt -> connect 156.151.1.1

  • Login: admin / d88vAnnX -> eosDeviceScan -> Goto Entech01's ePhone -> You will get a new mail.

  • Login admin / alpine (Entech01's ePhone) -> cat nstanford@entech.com.act (/eos/mail/) -> Goto Mail Server.

  • Login nstanford / murloc33 -> Open Re: Romulus passwd -> goto Romulus (connect 156.151.1.12).

  • Login admin / h7ggNKl2 -> cat Contractor_Server.doc (/STORE/Contractors/) -> Reply the password: ax889msjA (Is this randomised?)

  • Entech External Contract Relay Server (Good luck finding it / 156.151.59.35?) -> admin / ax889msjA -> decypher heart.dec divingsparrow (/Contractors/Bit/) -> Goto: EnTech Email Server

  • login rc / byC89kMMe -> open mail: RE: Mainframe Access Emergency -> admin/v19328hQ9 -> reply to mail.

  • Sequencer -> Activate

  • KBTPortTest 104

  • Overload

  • Analyze

  • Solve EMMETPLACE

  • Close Shells

  • FTP 21 & Web 80 & SSH 22 > SMTP 25 > SQL 1433 > porthack

  • dir -> open up archive/hacknet type: rm 2 * -> rm 0 * -> rm 1 * -> dc -> reply.

  • Wait for bit mail -> Node -> porthack -> TIME! when console locks up (keep mouse over it).

Completion:

  • Node -> TIME! when console locks up.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment