Logged in as Nobody

Vote for Us

Epitaph Help

Categories

Concepts Creator Commands Creator Tutorials Games Innate Commands Known Commands
Lord Npc Objects Playtesters Rooms Rules

Ssh - Mastering Falken's Maze

Command Cost

500 Command Points

Description

SSH is the remote equivalent of the 'hack' command, and is used to hack into systems over what remains of the internet. The process of pulling off an SSH hack is somewhat complicated and involves a number of steps.

Step One: Finding a Target

Valid targets of an SSH attack are indicated by a web address. You will find these through several mechanisms - one is by being given them by NPCs for whatever reason, and another is querying an existing system for the machines it knows through the netstat program. You can 'ssh ping' addresses to see if they are still reachable through the internet. Once you have an IP address you need to make a connection, which is done using 'ssh connect'.

Step two: Routing

When attempting to hack a system you only have a short period of time - you can increase the time between starting and being detected by routing your connection through previously compromised systems. Systems do not stay compromised, so for a very difficult hack you may need to hack several easier systems first and route your connection through them.

Step three: Hacking

The first thing you must do is hack a password - you perform actions on a remite system by using the 'ssh run' command. 'ssh list programs' will show you which ones are available to you. Step one is usually to 'hack password', which will escalate you from having no access to getting guest access.

Step four: Escalation

Each of the programs available to you require a certain level of access to execute on the remote system. If you don't have the necessary access you must escalate. One you have guest access you can attempt to use 'dictionary attack' to gain the next level, as an example. Each system also has a 'compromise point' which is at the point whereby you have enough access to make a successful attempt to 'complete' your hack. Some programs reduce the compromise point, others make it easier to run other programs. Balancing your requirements against the machine security versus your available time is how a hack is managed. If you don't manage to escalate permissions to the right point, you will be forcibly disconnected from the remote system and be left unable to reconnect for a while.

Step five: Compromise

Compromising a system is the final step in a hack - once you have done this whatever payload information is available in the machine becomes yours. Some machines will give you XP, rep or money - others have narrative payloads and make game story available.

Syntax Forms

ssh [status] [with] <object> 

Query the status of the system you are hacking.

ssh download <file> from <computer> to <usb> 

Query the status of the system you are hacking.

ssh list [programs] [with] <object> 

List the programs available on the current machine.

ssh connect [to] <ip> [with] <object> 

Connect to the specified machine in an attempt to hack it.

ssh ping <ip> [with] <object> 

Ping the provided machine to see if it's available through the remaining internet.

ssh route [through] <ip> [with] <object> 

Add a computer to the routing for your current hack.

ssh log off [with] <object> 

Disconnect from a remote hacking attempt.

ssh {logoff|quit|exit|disconnect} [with] <object> 

Disconnect from a remote hacking attempt. Alternative syntax.

ssh compromise [with] <object> 

Roll the dice of your access level against the security of the machine with an attempt to completing the hack.

ssh run <program> {with|on} <object> 

Run the specified program on the remote system.

Examples

Example one

> ssh ping epitaphonline.co.uk with computer You tap away at the keyboard of the high-end laptop for a bit. > Your ping received an ack in response!

Example two

> ssh connect to epitaphonline.co.uk with laptop The high-end laptop beeps as it connects to the login screen of the remote system. You tap away at the keyboard of the high-end laptop for a bit.

Example three

> ssh run hack password on computer You tap away at the keyboard of the high-end laptop for a bit. The program "Hack Password" finishes running.

Example four

> ssh status with computer Hacking system epitaphonline.co.uk IP Address 78.129.181.118 System Status Unknown Current Access guest Processor Speed 100% System Trace Unknown Security Countermeasures Unknown You tap away at the keyboard of the high-end laptop for a bit.

Example five

> ssh run dictionary attack on computer You tap away at the keyboard of the high-end laptop for a bit > Your computer beeps angrily as it is forcefully disconnected from the remote system. The connection dies, and your computer sits dormant.

Example six

> ssh compromise with computer Playing that awesome game earned you 44xp! Wow, that was intense. It was some kind of incredibly awesome text game in which people play the role of survivors in a zombie apocalypse. Crazy stuff, but lots of fun. The people there were HILARIOUS too. You tap away at the keyboard of the high-end laptop for a bit.

See Also:

hack
Copyright Statement

Epitaph - Epiphany v1.2.13 [release]. Copyright © Imaginary Realities Ltd 2009 -