This shows you the differences between two versions of the page.
— | en:softwares [2019/10/06 05:26] (current) – created - external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | **Softwares** use your system to perform specific functions. These functions varies according to the software type, and are listed below. | ||
+ | Softwares also have a corresponding size, version and RAM usage. If a software is said researchable, | ||
+ | |||
+ | ======Software types====== | ||
+ | |||
+ | ===== Cracker ===== | ||
+ | Crackers are needed to the execution of the main method of attack, known as [[en: | ||
+ | |||
+ | In order to [[en: | ||
+ | |||
+ | They are also responsible for your [[en: | ||
+ | |||
+ | ^ Cracker Version | ||
+ | | < 3.0 | | ||
+ | | ≥ 3.0 and < 6.0 | ||
+ | | | ||
+ | |||
+ | Another important role of the Cracker is played at the [[en: | ||
+ | |||
+ | ===== Password Hashing ===== | ||
+ | Password Hashing is the main - and only - option to defend against [[en: | ||
+ | |||
+ | ===== Port Scanner ===== | ||
+ | Port Scanners are needed in order to perform an [[en: | ||
+ | |||
+ | Port Scanners are not researchable. | ||
+ | |||
+ | ===== Exploits ===== | ||
+ | At least one running exploit is needed in order to perform an [[en: | ||
+ | |||
+ | * **FTP Exploit** - When running an FTP exploit, the user can //only// Download and Upload softwares. Installing or executing softwares is not permitted. | ||
+ | |||
+ | * **SSH Exploit** - When running an SSH exploit, the user can perform any action, //except// Downloading and Uploading softwares. | ||
+ | |||
+ | Any exploit can view and edit the log file. | ||
+ | |||
+ | If both FTP and SSH exploits are used in the same attack, the user gains full, root access. | ||
+ | |||
+ | In order to keep a connection with the victim, the exploit(s) must be running and they need to meet the [[en: | ||
+ | |||
+ | ===== Firewall ===== | ||
+ | A firewall software is used to defend the user against [[en: | ||
+ | |||
+ | Firewall is also a defense to [[en: | ||
+ | |||
+ | If the user completed the [[en: | ||
+ | |||
+ | ===== Hider ===== | ||
+ | The hider software is used to, uh, hide softwares. | ||
+ | |||
+ | You are not allowed to hide running softwares. | ||
+ | |||
+ | ===== Seeker ===== | ||
+ | The seekers softwares is needed if you want to view hidden softwares. Of course this will only work if your seeker version is greater than or equal to the version the software was hid. | ||
+ | |||
+ | In order to install/ | ||
+ | |||
+ | ===== Spam Virus ===== | ||
+ | The spam virus, when installed on the victim, will generate money to you by sending spams over the Internet. In order to collect it's money, you must have a [[en: | ||
+ | |||
+ | The amount of money given by a spam virus is directly dependent to the victim' | ||
+ | |||
+ | ===== Warez Virus ===== | ||
+ | The warez virus, when installed on the victim, will generate money to you by sending warez over the Internet. A [[en: | ||
+ | |||
+ | It requires an additional software, though: the Torrent. You need to have a running Torrent in //your// software list. | ||
+ | |||
+ | Generated amount of warez is dependent of the victim' | ||
+ | |||
+ | ===== Miner Virus ===== | ||
+ | The miner virus will use the victim' | ||
+ | |||
+ | Roughly, it generates about 0.00010417 BTC per MHz per hour. | ||
+ | |||
+ | ===== Torrent ===== | ||
+ | Torrent is the software you will use to sell warez. It is needed in order to generate money from Warez viruses. | ||
+ | |||
+ | Torrents are not researchable. You can view the list and price of torrents at the [[en: | ||
+ | |||
+ | ===== Virus Collector ===== | ||
+ | The Virus Collector is needed in order to collect money from [[en: | ||
+ | |||
+ | The collector version offers a bonus that is multiplied to the sum of collected money. A 1.0 collector will generate 1% bonus. A 2.0 collector will generate 2% bonus, and so on. | ||
+ | |||
+ | ===== DDoS Virus ===== | ||
+ | The DDoS virus is needed in order to perform a DDoS action. The resulting DDoS power directly depends of the victim' | ||
+ | |||
+ | DDoS virus does not generates money. | ||
+ | |||
+ | ===== DDoS Breaker ===== | ||
+ | The DDoS Breaker is needed to complete a DDoS attack. | ||
+ | |||
+ | ===== Anti-Virus ===== | ||
+ | Anti-Virus is used to deleted installed virus. It will only delete //visible// viruses with version smaller than or equal to the anti-virus. | ||
+ | |||
+ | ===== Nmap ===== | ||
+ | The Nmap scans the network, looking for any connected IPs. | ||
+ | |||
+ | You can protect your IP from being discovered by having a firewall with version greater than the Nmap version. | ||
+ | ===== Hardware Analyzer ===== | ||
+ | The Hardware Analyzer will scan the victim' | ||
+ | |||
+ | The Analyzer accuracy depends on it's version. | ||
+ | |||
+ | ^ Analyzer Version | ||
+ | | | ||
+ | | 2.0 | ||
+ | | | ||
+ | |||
+ | The Analyzer is not researchable. | ||
+ | |||
+ | ===== Wallet.exe ===== | ||
+ | The Wallet is created automatically when you have a Bitcoin account. It stores your //public// information, | ||
+ | |||
+ | The wallet private key is only listed when a money collect is made (using at least one Miner Virus) or when someone connects to the [[en: | ||
+ | |||
+ | The wallet is not researchable. | ||
+ | |||
+ | ===== Webserver.exe ===== | ||
+ | The webserver software allows the user to run an HTTP server on his IP, with custom text. This mean that anyone accessing his/her IP will see the text written by the user. | ||
+ | |||
+ | This functionality is available only to premium users. This software won't work on [[en: | ||
+ | |||
+ | The web server is not researchable. | ||
+ | |||
+ | ===== Riddle.exe ===== | ||
+ | The riddle software exists only on [[en: | ||
+ | |||
+ | The riddle can be executed with FTP exploit. | ||
+ | |||
+ | You can not download the riddle. Actually, you can't do anything to it. | ||
+ | |||
+ | ===== Doom ===== | ||
+ | The Doom, also referred to as Doom Virus, is the storyline software. When installed, it will automatically propagate to **any** user who connects to the correspondent IP. | ||
+ | |||
+ | Doom virus are not recognized by Anti-Virus. The only way to kill a doom, and therefore stop the doom attack, is by DDoSing whoever launched the virus //until// the launcher' | ||
+ | |||
+ | ====== Software version ====== | ||
+ | The version of as software defines how powerful it is. For example, a 3.0 Cracker is more powerful than a 2.5 Password Hashing, and therefore it would be possible to successfully hack someone using this setup. | ||
+ | |||
+ | ====== Software size ====== | ||
+ | Every software have a corresponding size. The size, measured in MB or GB, defines how heavy it is. It also imposes limitations as whether the user can store it or not, since he must have enough available space on disk (HDD). | ||
+ | |||
+ | The software size is directly responsible for the duration of processes such as Download, Upload, Install, Kill, Delete, Hide and Seek. | ||
+ | |||
+ | ====== Software RAM usage ====== | ||
+ | Every software have a corresponding RAM usage. The sum of all running software' | ||
+ | |||
+ | ====== Software License ====== | ||
+ | Softwares are licensed to someone. By default, if you downloaded the software from someone, you will not be the owner of the software nor you will be able to see who owns it. | ||
+ | |||
+ | However, if the software is in //your// hard-drive and if the software is researchable, | ||
+ | |||
+ | Purchasing the software license is needed in order to research the software. Any software researched by you will automatically be licensed to you. |