Beginnings:
- connect 226.187.99.3, porthack, download hacks, shell.
- remove SecurityTracer & shell your own pc
- connect 199.59.149.230
Entropy:
Point Clicker
- Node > SMTP & SSH > porthack > cd PointClicker/Saves > rm Mengsk.pcsav > shell > reply
X-C Project
- reply with: 4991
Back to School
- Reply with: ******* (7 times a *)
Random Mail Mission
- Go to Entropy asset server and download eosDeviceScan from /bin/ > shell
- Open mail eOS Device Scanning > reply with tintin7
Smash N' Grab
- reply with: warsix22
Naix
- Node > overload x4 > close 2 shells > FTP > WEB > SSH > Porthack > cd /home/ > rm M
Naix Skip
- Go to main menu and continue (No manual saving required)
- reply to mail
- reply to next mail with: 168.61.82.246
CSEC Intro
- reply with: ABX07cc9
- connect 202.7.177.65
- solve chicken > Web & SMTP > porthack > /home/Ordering/ > scp SP1 > "up" change 1 to 2 > public drop server
- upload both > reply
CSEC:
Locate or Create Decryption Software
- connect 101.0.89.154
- SSH & FTP & WEB, SQL & SMTP, porthack, scp decypher.exe (Staff/A.Carey/) -> Crossroads Servers
- porthack in,
- Deycpher encrypt_source.dec
- Decypher C_EXE_contact.dec quinnoq
- scp encrypt_source.cs
- scp C_EXE_contact.txt
- scp FOF_Screenplay.doc
- goto CSEC Public Drop Server
- upload home/encrypt_source.cs
- upload home/C_EXE_contact.txt
- reply to mail
Track an Encrypted File
- Node, FTP, WEB, SSH, porthack, scp DECHead.exe (/home/work/) -> reply (* autocomplete on DECH)
- reply with: beepbeep
Help an Aspiring Writer
- connect 37.187.27.55
- solve DANGER
- SMTP & SSH
- porthack
- cd home/scripts/
- upload home/FOF_Screenplay.doc -> reply
Check out suspicious Server
- insta-complete
Compromise an eOS Device
- reply with: AAX1BB7
Decrypt a secure transmision
- insta-complete
Bit's Disapearance
- connect 108.160.165.139 (Admin/prince static?)
- Overload, Solve breezer
- FTP & WEB & SSH
- SMTP & SQL (close shells)
- porthack
- CSEC Public Drop Server
- upload home/READ_all_hackers.txt
Project Junebug
- connect 111.105.22.1
- SSH & Web & FTP -> SMTP, porthack, cd /projects/KellisBT/Tests/ > scp PacemakerFirmware_Cycle_Test.dll -> connect 202.6.141.219
- KBTPortTest 104, porthack, cd /KBT_Pacemaker/ -> upload home/PackemakerFirmware_Cycle_Test.dll -> login EAdmin, tens86, activate PaceMakerFirmWare_Cycle_Test.dll -> Reply (Wait for heartrate to reach 0)
Bit:
-
CSEC Asset Server -> cd bin/TK/ -> decypher TraceKill.dec dx122DX (in the meantime download Sequencer) -> scp TraceKill.exe -> Reply.
-
reply with 156.151.59.35
-
connect 156.151.1.1
-
Login: admin / d88vAnnX -> eosDeviceScan -> scan -> Goto Entech01's ePhone -> You will get a new mail.
-
connect 156.151.1.12 > Login admin / h7ggNKl2 >
-
reply with ax889msjA (skipable?)
-
Entech Mail Server > login rc / byC89kMMe -> open mail: RE: Mainframe Access Emergency -> admin/v19328hQ9 -> reply to mail.
-
Sequencer -> Activate
-
KBTPortTest 104
-
Overload
-
Solve EMMETPLACE
-
Close Shells
-
FTP 21 & Web 80 & SSH 22 > SMTP 25 > SQL 1433 > porthack
-
dir -> open up archive/hacknet type: rm 2 * -> rm 0 * -> rm 1 * -> dc -> reply.
-
Wait for bit mail -> Node -> porthack -> TIME! when console locks up (keep mouse over it).