Hacknet

Hacknet

481 ratings
参考翻译:Hacknet:完全攻略(原文:Hacknet Step-by-Step Walkthrough)
By dzx_dzx and 1 collaborators
(译者:由于我才疏学陋,翻译时有不准确的地方,有能力者还请参考原版攻略。
任务名、软件名等英语专用名暂时不予翻译,但部分会在后面附上解释,服务器名等请借助工具书。
(此条过期)据悉,目前游戏所有文本已翻译完成,正在校对。预计8/15校审完成,8/20提交至游戏作者。

欢迎加入Hacknet吧正式Mod研究所,群号码:583218698。()

我在指南下看见很多卡关的玩家,但因技术问题在这里我难以给出回复。故请卡关的玩家到贴吧/steam论坛提问,或到上面所写的群中寻求帮助。



由 [Cash.net] Gorimaccha 制作
I made this guide for those who think they're completely stuck. I don't recommend you to read this too much if you seek some challenge :)
All missions available now!

这个攻略提供给那些完全卡关的玩家。过分阅读可能影响您的游玩体验。(*剧透警告*)


4
   
Award
Favorite
Favorited
Unfavorite
Basic Tips 基础窍门

***IMPORTANT*** Some computers/servers may have different names on them, but what you need to do should be the same. Just follow the steps, you will be fine.

***非常重要*** 有些电脑/服务器可能有不同的名字,但你所要做的应该相同。遵循如下步骤,您就不会有问题。


DON'T abandon any missions atm!! It will most likey cause serious problems and make you unable to finish the game!

眼下,***请勿***放弃任何任务!!这很可能导致严重问题并最终无法完成游戏,毁掉您的存档!

1, Type commands as soon as possible.
2, Delete logs when you disconnect.
3, You need to reply almost every time you finish a mission.
4, Always use "Scan Network" option when you successfully hack a computer.
5, Don't delete/rename files unnecessarily. <-This is important!!
6, Use auto-complete for commands and file names. (Tab key)
7, Always use "admin" "alpine" to log in to any eos devices.

1.尽速输入指令。(译者:更要善用Tab)
2.断线前别忘了删log。(译者:虽然我不删也没有什么麻烦……)
3.不要忘了完成任务时回复邮件。(极少数情况不需要)
4.成功骇入电脑时总扫描一遍主机。(译者:★★★★★推荐)
5.无必要时不要删除/重命名任何文件!<—十分重要。
6.使用“自动拼写”(Tab键)输入指令及文件名。
7.不要忘了“admin”“alpine”这神奇的eos设备账户。
译者:即使你希望独立完成游戏,我也非常推荐您阅读这些提示,它们非常有用。另外我在此补充几条。
(但愿我没记错……)
1.SQL的入侵工具和KBT,即104端口入侵工具可以忽视Proxy和Firewall。
2.Firewall和Proxy的破解是独立的,你可以一边破解proxy一边analysis。更有甚者,用Tracekill可以允许您慢悠悠地破解完Firewall,再攻破proxy。
3.在shell里按overload破解proxy,对吧?然而如果内存不足,这些窗口会折叠,并在内存足够时展开。(如果我说的不清楚,可以试着在您的电脑上运行一堆shell并点按trap,然后关掉其中一个窗口。)除了略有点壮观以外,这是个“储存”足够多shell的小技巧。
4.不过,5~7个shell一般够了。
5.在几次analyze后弹出的几行文字里应该会各有一个字符,如果某一行里全是”0”怎么办?有时这意味着所对应的代码就是0。例如:(只是示范)
0 0 0 0 0 0 0 0 0 0 2 0 0 0
0 0 0 0 0 5 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0
结果就是250。(我才不是250呢!)

Troubleshooting Common Problems
Q, I don't get an email to start a new mission!! What do I do now!?
A, Make sure to check following things:
1, Your previous mission has finished. (Click "Reply" in the email for it and see if "Mission Incomplete" message shows up.)
2, You don't have any available missions in your current faction's contracts server. (Or the message board if you're working on /el missions.)
3, Restart your game and your problem is still there.

常见问题解决方案。(疑难杂症)
Q:我得不到开始新任务的邮件!!我该怎么办!
A:出门检查您的邮筒(划掉)。请确认您已检查过以下条件。
1.你上一个的任务已完成。[尝试点按邮件中的“Reply”(回复)看会不会出现“Mission incomplete”(任务未完成)。]
2.在您现在所处的派系(Entropy,CSEC,…)没有可用的任务,或者
在/el任务里信息板上没有任务。
3.重启游戏问题仍存在。

For "gg wp" from Naix, you need to revenge Naix BEFORE you start any new Entropy mission. Details in "Naix Missions" section below.

对于Naix的“友善问好”,你要在完成Entropy任务***之前***对Naix报仇。下面的“Naix任务”一栏会给您帮助。

If none of these helps you, you might have had a critical bug... The devs are working on an update to fix many bugs, so wait for it... Meanwhile, you still can try 2 options:
1, Editing your save data (Here's the link: http://steamproxy.net/sharedfiles/filedetails/?id=500893610 Be super careful with your savedata.)
2, Start a new session (This is much easier... You also can work on achievements that you missed.)

若以上几条都不起作用,您已无药可救了(划掉)。您可能遇到了一个严重的bug(您不会连bug也不知道吧?)。开发者们(们?)在致力于更新游戏以修正bug。所以只能等了。
在此时,您可以尝试以下方法。
1.编辑您的存档。(敬参阅http://steamproxy.net/sharedfiles/filedetails/?id=500893610请特别小心对待您的存档)
2.再开个存档。(不仅简单多了,还可以去做您以前忽略的成就。)

Q, I don't have the necessary exe file to do this mission!! UGGHHHH
A, Here is the list of exe files, and in which mission you can find them. Use "CTRL+F" on this guide and search for them.

Q.我怎么没有做任务所需的工具!!啊啊啊!!
A.这是exe文件列表及其来源,用"CTRL+F"在这指南里搜索一下。

SecurityTracer.exe - "First Contact", or on "Credit Server" after you finish the game.
SSHcrack.exe (for port 22) - "Getting Some tools together"
FTPBounce.exe (for port 21) - "Welcome"
eosDeviceScan.exe (for finding eos device) - "eOS Device Scanning"
SMTPoverflow.exe (for port 25) - "Aggression must be punished"
WebServerWorm.exe (for port 80) - "***Revenging Naix***", or "CSEC Invitation"
SQLBufferOverflow.exe (for port 1433) - "-Shrine of Polar Star-"
SQL_MemCorrupt.exe (for port 1433) - "CSEC Invitation - Congratulations"
Decypher.exe (for decrypting files) - "Ghosting the Vault"
DECHead.exe (for analyzing .dec files) - "Through the Spyglass"
KBT_PortTest.exe (for port 104) - "Project Junebug"
TraceKill.exe (for freezing traces) - "Bit -- Foundation"
Sequencer.exe (for the final hacking) - "Bit -- Termination"
Clock.exe (Um...just a clock app) - Read "-Finding Clock.exe-"

SecurityTracer.exe(安全追踪程序) -来自 "First Contact"(第一次沟通), 或在完成游戏时的"Credit Server" (荣誉服务器)上。
SSHcrack.exe (ssh协议破解器)(适用端口 22) - "Getting Some tools together"(收集些工具)
FTPBounce.exe (ftp“跳转攻击”破解器)(适用端口21) - "Welcome"(欢迎)
eosDeviceScan.exe(eos设备搜寻器) (适用寻找eos设备) - "eOS Device Scanning"(搜寻eos设备)
SMTPoverflow.exe(邮件过载破解器) (适用端口25) - "Aggression must be punished"(侵略者必将受惩处)
WebServerWorm.exe (网络蠕虫破解器)(适用端口80) - "***Revenging Naix***"(向Naix复仇 译者:这不是一个官方给出的任务名,我没记错的话。), or "CSEC Invitation"(CSEC诚邀您到来)
SQLBufferOverflow.exe (SQL内存缓冲区过载破解器)(适用端口1433) - "-Shrine of Polar Star-"(北极星圣地)
SQL_MemCorrupt.exe(SQL_内存错误破解器) (for port 1433) - "CSEC Invitation - Congratulations"(CSEC邀请-祝贺!)
(译者:根据另一个指南,这两个SQL破解器完全一样。)
Decypher.exe (解密器)(适用解密文件) - "Ghosting the Vault"[拱顶鬼神(?)]
DECHead.exe (十六进制文件头查看器/加密文件查看器?)(适用分析加密文件) - "Through the Spyglass"(通过望远镜)
KBT_PortTest.exe[KBT端口测试器(其实也是破解器。)] (适用端口104) - "Project Junebug"(Junebug项目)
TraceKill.exe(阻止追踪) (适用冻结追踪) - "Bit -- Foundation"(Bit-支柱)
Sequencer.exe(排序器) (适用最后骇入) - "Bit -- Termination"(Bit-终局)
Clock.exe (钟)(Hmm…只是个钟的软件) - Read "-Finding Clock.exe-"(敬参阅“寻找‘Clock.exe’”)



For KBT_PortTest.exe, you can try this method if you don't get "Project Junebug" unlocked, or mistakenly abandoned it. Thank you, Elsarild!
对于KBT_PortTest.exe,若您没有解锁“Junebug项目”,或失误取消了这个任务,可以试试这个方法。谢谢您,Elsarild!

http://steamproxy.net/sharedfiles/filedetails/?id=500893610
Q, I can't use this command somehow!! Fuuuuuuuuuuuuuuu
A, Make sure to check if you already have the necessary exe for the command, then try typing commands like below:

Q,由于某种原因我没法用这命令!(根据相关法律法规和政策,该信息不予公布)
A,确认您已具备所需的软件,然后根据以下范例输入命令。
译者:Hacknet的命令似乎更接近Linux。

Command Template - Example
命令 样板 - 范例

scp [the file's name] - scp index.html
connect [the IP address] - connect 103.33.8.643
cd [the folder path] - cd /log
replace [the file's name] "[target words]" "[your words]" - replace template.txt "[FIRST_NAME]" "John"
(If you use "cat" and open the file, you can use 'replace "[FIRST_NAME]" "John" ' instead. Use the full command above if you get "Assuming active flag file" error.)
Decypher [the file's name] [its password] - Decypher naix_secrets.dec D1CKS
DECHead [the file's name] - DECHead naix_private_photos.dec
mv [target's name] [new name] - mv template.txt Boorman_John[111]

scp (文件传输)[the file's name(文件名)] - scp index.html
connect(连接) [the IP address(IP地址)] - connect 103.33.8.643
cd (改变目录)[the folder path(文件地址)] - cd /log
replace(替换) [the file's name(文件名)] "[target words(文件中目标文字)]" "[your words(你想要替代它的文字)]" - replace template.txt "[FIRST_NAME]" "John"
[若您使用cat打开文件,你可以使用以下命令:“replace "[FIRST_NAME]" "John"”,若得到"Assuming active flag file"(译者:我对这句实在没辙……抱歉……)错误则打全整条命令。]
Decypher [the file's name(文件名)] [its password(其密码,有时没有)] - Decypher naix_secrets.dec D1CKS
DECHead [the file's name] - DECHead naix_private_photos.dec
mv(移动) [target's name(目标文件名)] [new name(新名)] - mv template.txt Boorman_John[111]
First Missions 终极之开始
First Contact
1, Connect to your main PC.
2, Delete or rename "SecurityTracer.exe".
3, Reply to Bit.

Getting Some tools together
1, Hack "Viper-Battlestation".
2, Download "SSHcrack.exe" at /bin.
3, Reply to Bit.

Maiden Flight
1, Hack "Bitwise Test PC".
2, Reply to Bit.

Something in return
1, Hack "P.Anderson's Bedroom PC".
2, Go to /log, and delete all logs there.
3, Reply to Bit.
First Contact
1, 连接你的主电脑(按那个绿点).
2, 删除 或重命名"SecurityTracer.exe".
3, 回复 Bit.

Getting Some tools together
1, 入侵 "Viper-Battlestation".
2, 下载 "SSHcrack.exe" 在 /bin.
3, 回复 Bit.

Maiden Flight
1, 入侵 "Bitwise Test PC".
2, 回复 Bit.

Something in return
1, 入侵 "P.Anderson's Bedroom PC".
2, 进入/log, 并删除 all logs there.
3, 回复 Bit.
Entropy Missions Entropy任务
Where to from here
1, Run "Shell" on at least one computer.
2, Connect to "Entropy Test Server".
3, Click "overload" and bypass the proxy.
4, Hack.
5, Find "Entropy_Induction_Test" and download it.

Confirmation MIssion
1, Hack "Slash-Bot News Network".
2, Go to /MsgBoard/Listings.
3, Delete "Entropy_Group_engaged_in_malicious_Hacking?" and "Suspicious_arise_over_Entropy".
4, Go to /MsgBoard, and delete or rename config.sys.

Welcome
1, Log in to "Entropy Asset Server".
2, Go to /bin, and download "FTPBounce.exe".

Point Clicker
1, Hack "PointClicker".
2, Go to /PointClicker/Saves.
3, Delete "Mengsk.pcsav".

The famous counter-hack
1, Hack "PP Marketing Inc."
2, Go to /home/WORKSPACE
3, Delete "SECURE_MAILLIST.dec".

Back to school
1, Hack "Milburg High IT Office".
2, Go to /home/MH_STUFF
3, Read "pwmemo.log" and remember the password.
4, Reply with the password. ()

eOS Device Scanning
1, Go to "Entropy Asset Server", and download "eosDeviceScan.exe" at /bin.
2, Hack "Jason's Powerbook Plus".
3, Run "eosDeviceScan".
4, Log in to "Jason's ePhone 4S" (username: admin password: alpine).
5, Find "jjstacks@jmail.com.act" at /eos/mail.
6, Read the file, then reply the password. ()

Internal investigations
1, Hack "X_C Project Tablet*01//RESEARCH".
2, Find "FlightComputers.rep" at /X.
3, Read it and find its project ID.
4, Reply with the ID. ()

Intimidation Tactics
1, Hack "Software Enterprises"
2, Delete "Archive_Data.zip" at /home.

Dengler Solutions - Return Policy
1, Hack "Starchip Communications".
2, Delete "dengler_solutions_delivery.zip" at /home.

Cleaning Operation
1, Hack "Dengler Inc".
2,Delete "banished_stallion_technologies_Internal_Archive.zip".

Smash N' Grab
1, Hack "JDel Home PC".
2, Scan for the eos device.
3, Log in to "Jacob's ePhone 4" as admin.
4, Read "pass.txt" at /eos/notes.
5, Reply with the password. ()

Aggression must be punished
1, Go to "Entropy Asset Server", and download "SMTPoverflow.exe" at /bin.
2, Hack "Proxy_Node-04". (3 or 4 shell windows recommended)
3, Delete "Macrosoft_Internal_Raid_Archive.rar" at /home. (DON'T delete logs on your main pc yet!! You'll need them later!!)
******After you get hacked by Naix, follow the steps in "Naix Missions"!!*****

Hopefully that will do
1, Hack "KyonBox".
2, Read "Macrosoft_dox.txt" at /home/loot.
3, Reply with the IP address.
Where to from here
1, 在至少一个服务器上启动"Shell".
2, 连接"Entropy Test Server".
3, 点击 "overload" and bypass the proxy.
4, 入侵.
5, 寻找 "Entropy_Induction_Test" 并 下载它.

Confirmation MIssion
1, 入侵 "Slash-Bot News Network".
2, 进入/MsgBoard/Listings.
3, 删除 "Entropy_Group_engaged_in_malicious_Hacking?" 和"Suspicious_arise_over_Entropy".
4, 进入/MsgBoard, and 删除或重命名config.sys.

Welcome
1, 登入to "Entropy Asset Server".
2, 进入/bin, 并下载 "FTPBounce.exe".

Point 点击er
1, 入侵 "PointClicker".
2, 进入/PointClicker/Saves.
3, 删除 "Mengsk.pcsav".

The famous counter-Hack
1, 入侵 "PP Marketing Inc."
2, 进入/home/WORKSPACE
3, 删除 "SECURE_MAILLIST.dec".

Back to school
1, 入侵 "Milburg High IT Office".
2, 进入/home/MH_STUFF
3, 读 "pwmemo.log" 并记住密码.
4, 回复密码.

eOS Device Scanning
1, 进入"Entropy Asset Server", 并 下载 "eosDeviceScan.exe" 在 /bin.
2, 入侵 "Jason's Powerbook Plus".
3, 启动"eosDeviceScan".
4, 登入 "Jason's ePhone 4S" (username: admin password: alpine).
5, 寻找 "jjstacks@jmail.com.act" 在 /eos/mail.
6, 读文件并回复密码.

Internal investigations
1, 入侵 "X_C Project Tablet*01//RESEARCH".
2, 寻找 "FlightComputers.rep" 在 /X.
3, 阅读之并寻找project ID(项目ID).
4, 回复ID.

Intimidation Tactics
1, 入侵 "Software Enterprises"
2, 删除 "Archive_Data.zip" 在 /home.

Dengler Solutions - Return Policy
1, 入侵 "Starchip Communications".
2, 删除 "dengler_solutions_delivery.zip" 在 /home.

Cleaning Operation
1, 入侵 "Dengler Inc".
2,删除 "banished_stallion_technologies_Internal_Archive.zip".

Smash N' Grab
1, 入侵 "JDel Home PC".
2, 搜索eos设备.
3, 登入 "Jacob's ePhone 4" as admin.
4, 读 "pass.txt" 在/eos/notes.
5, 回复密码.

Aggression must be punished
1, 进入"Entropy Asset Server", 下载 "SMTPoverflow.exe" 在 /bin.
2, 入侵 "Proxy_Node-04". (推荐3 到4 shell )
3, 删除 "Macrosoft_Internal_Raid_Archive.rar" 在 /home. (***不要***删除你电脑上的记录!您还需要它!!)
******你被Naix入侵后严格遵循Naix任务中的步骤!!*****

Hopefully that will do
1, 入侵 "KyonBox".
2, 读"Macrosoft_dox.txt" 在 /home/loot.
3回复IP.
Naix Missions Naix任务
***After you get hacked by Naix***
Your UX system is destroyed by Naix. Now you need to get a working "x-server.sys" using only commands. This time you'll get one from a Naix's proxy server with the commands below.
1, "cd /log"
2, "ls"
3, Now you should see the IP address which was used by Naix.
4, "connect [the IP address]"
5, "probe"
6, "SSHcrack 22"
7, "PortHack"
8, "cd /sys"
9, "scp x-server.sys"
10, "dc"
11, "reboot -i"
You can choose to either go back to Entropy missions, or revenge Naix now.

***Revenging Naix***
1, Connect to "Proxy_Node-x22" (the one in which you found the x-server.sys).
2, Scan network.
3, Hack "Naix Root Gateway".
4, Download "WebServerWorm.exe" at /bin.
5, Delete "x-server.sys" at /sys.
6, You should get an email from Naix.
*You can get your original "x-server.sys" at /home if you want.

gg wp
1, Hack "Nortron Security Web Server".
2, Open "index.html" at /web.
3, Replace "Nortron Security Services" with "♥♥♥♥♥". (use this command:)

Hilarious
1, Connect to "Norton Security Web Server", then scan network.
2, Hack "Nortron Internal Services Server".
3, Open "REMINDER.txt" at /staff_folders/J.Abrams
4, Remember the username and password. ()
5, Scan network.
6, Connect to "Nortron Mail Server", log in as J.Abrams.
7, Read "RE: Can't Log In", and remember the password for the firewall. ()
8, Hack "Nortron Mainframe". (Make sure to solve the firewall with the password first!)
9, Just delete logs and disconnect.
10, Reply to the email.

An Important Link
Now you're given an access to "/el Message Board". Read the threads carefully and solve some myths there.

译者注:
还有一种办法可以避免Naix成功入侵你的电脑。
在被入侵的时候,打开你的shell,并按上面的trap,然后是trigger。你的电脑会像重启过一番,同时入侵会结束。这是trap唯一的用处。在未来的多人模式中,这会十分有用。
***你被Naix入侵后***
您的 UX系统被Naix入侵了,现在你要从Naix的服务器上获取一个正常“x-server.sys”.
(译者:有些人反映之后自己界面变绿了。是的,每个x-server都有自己特殊的主题风格。)
1, "cd /log"
2, "ls"
3, 你现在应该看到Naix使用的IP.
4, "connect [the IP address]"
5, "probe"
6, "SSHcrack 22"
7, "PortHack"
8, "cd /sys"
9, "scp x-server.sys"
10, "dc"
11, "reboot -i"
现在你既可返回Entropy任务,也可向Naix复仇.

***向Naix复仇***
1, 连接"Proxy_Node-x22" (您找到“x-server”的地方).
2, 扫描网络.
3, 入侵 "Naix Root Gateway".
4, 下载 "WebServerWorm.exe" 在/bin.
5, 删除 "x-server.sys" 在/sys.
6, 您会受到Naix的邮件.
*你需要的话可以找回原来的"x-server.sys" ,它在 /home .
译者注:
很多人在这个分支上犯难,抱怨无法进入这个分支。请参考下面我过去写的一段说明文字。
“请注意Naix主电脑上的这两个文件。
1.Macrosoft_Internal_Raid_Archive.rar
2.x-server.sys
删除的文件不同,剧情也会不同。如果删除1,您会结束Naix任务,接着迅速进入CSEC。如果删除2,你就会得到Naix的邮件,接着开始/el任务。
这两个分支互斥。一旦你决定删除其中的一个文件,另一段剧情将无法开始。(应该如此。)”

gg wp
1, 入侵 "Nortron Security Web Server".
2, 打开 "index.html" at /web.
3, 将 "Nortron Security Services" 替换为 "♥♥♥♥♥".

Hilarious
1, 连接"Norton Security Web Server", 之后扫描网络.
2, 入侵 "Nortron Internal Services Server".
3, 打开 "REMINDER.txt" 在/staff_folders/J.Abrams
4, 记住 username 和 password. ()
5, 扫描网络.
6, 连接"Nortron Mail Server", 以J.Abrams身份登录.
7, 读 "RE: Can't Log In", 并记住防火墙密码.
8, 入侵 "Nortron Mainframe". (别忘了先用密码破解firewall!)
9, 删除log并离开.
10, 回复邮件.

An Important Link
你现在已经得到“/el Message Board”通行许可,阅读那里的威胁并破除那里怪事
/el Missions /el任务
You must finish all Naix's missions to access /el's message board!

You won't get any emails for these /el missions, but you still need to work on them to keep the story going. Read the threads on "/el Message Board" carefully.

-Shrine of the Polar Star-
1, Read the first thread about "Shrine of the Polar Star".
2, Find the IP address for "Shrine of the Polar Star", then hack it.
3, Open "index.html" at /web.
4, Find 4 IP addresses for the Trials.
5, Hack all of them one by one and get 4 reward txt files. Details for each Trials below.

Polar Star - Trial of Patience
1, Hack "Polar Star - Trial of Patience". (It takes time to bypass its proxy)
2, Download "Reward_of_Patience.txt" at /home, remember the number.
Polar Star - Trial of Haste
1, Hack "Polar Star - Trial of Haste".
2, Download "Reward of Haste.txt" at /home, remember the number.
Polar Star - Trial of Diligence
1, Hack "Porlar Star - Trial of Diligence".
2, Scan network.
3, Hack "Trial of Diligence".
4, Download "Reward_of_Diligence.txt" at /home, remember the number.
Polar Star - Trial of Focus
1, Hack "Polar Star - Trial of Focus".
2, Download "Reward of Focus.txt" at /home, remember the number.

6, The 4 numbers in the reward txt files are parts of an IP address. Sort them in the right order and connect to "Head of the Polar Star". (The correct IP address is )
7, Hack "Head of the Polar Star".
8, Enjoy your gifts at /home/Gifts ;) ()

-Hacking /EL's Secure SecuLock Drive-
**If you alreay have "SQLBufferOverflow.exe", you can skip 3 - 5 and just hack "/EL's Secure SecuLock Drive".**
1, Read the third thread about the "/EL's Secure SecuLock Drive".
2, Find 2 IP addresses there; one for "COME AT ME /EL's Secure SecuLock Drive" and another for "Stormrider"
3, Hack "stormrider", and scan for his eos device.
4, Log in to "Mica's ePhone 4S" as admin.
5, Read secu_lock_test_server.txt. ()
6, Connect to "COME AT ME /EL's Secure SecuLock Drive" then log in as admin.
7, Delete DeleteMe.txt at /home.

-Finding Clock.exe-
You can ignore this one if you want.
This would be the last thing you need to finish for Naix's "An Important Link". I didn't know how to find it, but the Lux Æterna's guide helped me alot!! If you have followed thig guide, you will need to work on CSEC's missions and find "Decypher.exe".

http://steamproxy.net/sharedfiles/filedetails/?id=498964442
An Important Link
你现在已经得到“/el Message Board”通行许可,阅读那里的威胁并破除那里怪事
/el Missions
要进/el Message Board先要完成Naix任务!
这些任务您不会得到任何邮件,但为了剧情发展您仍要做任务。仔细阅读"/el Message Board" 上面的威胁

-Shrine of the Polar Star-
1, 阅读"Shrine of the Polar Star"的威胁.
2, 寻找 "Shrine of the Polar Star"的IP, 入侵之.
3, 打开 "index.html" 在 /web.
4, 寻找 4 IP addresses for the Trials.
5, 入侵四个服务器,以下为指南。

Polar Star - Trial of Patience
1, 入侵 "Polar Star - Trial of Patience". (破解proxy要点时间。)
2, 下载 "Reward_of_Patience.txt" 在 /home, 记住其中的数字.
Polar Star - Trial of Haste
1, 入侵 "Polar Star - Trial of Haste".
2, 下载 "Reward of Haste.txt" 在 /home, 记住其中数字.
Polar Star - Trial of Diligence
1, 入侵 "Porlar Star - Trial of Diligence".
2, 扫描网络.
3, 入侵 "Trial of Diligence".
4, 下载 "Reward_of_Diligence.txt" 在 /home, 记住其中数字.
Polar Star - Trial of Focus
1, 入侵 "Polar Star - Trial of Focus".
2, 下载 "Reward of Focus.txt" 在 /home, 记住其中数字.

6, 四个数字是IP的一部分,以正确的顺序组合后, 连接"Head of the Polar Star".
7, 入侵 "Head of the Polar Star".
8, 享受您的礼物!( 在 /home/Gifts )

-入侵ing /EL's Secure SecuLock Drive-
**若您已有 "SQLBufferOverflow.exe", 您可跳过3 - 5 ,只需入侵 "/EL's Secure SecuLock Drive".**
1, 阅读第三个威胁: "/EL's Secure SecuLock Drive".
2, 寻找 两个IP ; 一个是"COME AT ME /EL's Secure SecuLock Drive" ,另一个是"Stormrider"
3, 入侵 "stormrider", 扫描eos设备。
4, 登入"Mica's ePhone 4S" .
5, 读secu_lock_test_server.txt.
6, 连接"COME AT ME /EL's Secure SecuLock Drive" 登入.
7, 删除Me.txt 在 /home.

-寻找 Clock.exe-
你可以忽略它.
这是你完成Naix'"An Important Link"的最后一部分. 敬参阅以下指南。

http://steamproxy.net/sharedfiles/filedetails/?id=498964442
CSEC Missions CSEC任务(原文)
CSEC Invitation
1, Hack "CSEC Invitation Gauntlet".
2, Read "CONTINUE.txt" at /home/Test.
3, Scan network.
4, Hack "CSEC Gauntlet 02".
5, Read "CONTINUE.txt" at /home/Test.
6, Hack "CSEC Gauntlet 03".
7, Download "WebServerWorm.exe" at /home/Gift.
8, Read "Invitation_Passwords" at /home/Test. Remember the password.
9, Reply with the password.

CSEC Invitation - Affirmation
1, Hack "www.cfc.com".
2, Scan network.
3, Hack "CFC Corporate Mainframe".
4, Read "11_Secret_Herbs_And_Spices.txt" at /home/training_files.
5, Scan network
6, Hack "CFC Records Repository".
7, Download "Seasoning_Order_Placement_Template_Pt1.docx" and "Seasoning_Order_Placement_Template_Pt2,docx".
8, Upload the 2 files to "CSEC Public File Drop".

CSEC Invitation - Attenuation
(This is what you get if you finished /el missions)
1, Hack "www.cfc.com".
2, Scan network.
3, Hack "CFC Corporate Mainframe".
4, Read "11_Secret_Herbs_And_Spices.txt" at /home/training_files.
5, Scan network
6, Hack "CFC Records Repository".
7, Download "Seasoning_Order_Placement_Template_Pt1.docx" and "Seasoning_Order_Placement_Template_Pt2,docx".
8, Upload the 2 files to "CSEC Public File Drop".

CSEC Invitation - Congratulations
1, Log in to "CSEC Assets Server" as admin.
2, Download "SQL_MemCorrupt.exe" at /bin/SQL_Mem_Corrupter (you don't need this if you already have "SQLBufferOverflow.exe") and "Sequencer.exe" at /bin/Sequencer.
3, Now it's time for CSEC missions....

Rod of Asclepius
1, Hack "Universal Medical".
2, Search for "Jonas Sandburg".
3, Click "e-mail this record", and send the record to "gila@jmail.com".

Binary Universe(ity)
1, Hack "International Academic Databse".
2, Search for "John Stalvern".
3, Click "Add Degree".
4, Add the following information: "Manchester Univeristy" "Masters in Digital Security" "3.1"
5, Click "Save and Return".
6, Delete logs!!

Ghosting the Vault
1, Hack "CSEC Crossroads Server".
2, Download "encrypt_source.dec" at /home.
3, Hack "DEC Solutions Web Server".
4, Scan network.
5, Hack "DEC Solutions Mainframe".
6, Download "Decypher.exe" at /Staff/A.Carey.
7, Connect to your main PC, then go to /home.
8, Decrypt "encrypt_source.dec". (Use this command:)
9, Upload "encrypt_source.cs" to CSEC Public File Drop".

Imposters on Death Row
1, Hack "Death Row Records Database".
2, Go to /dr_database/records.
3, Remove Joseph Felman's record. (Use this command:)

Bit's disappearance Investigation
1, Hack "Bitwise Relay 01".
2, Read Home_Base.txt at /home.
3, Connect to "Bitwise Drop Server", and hack it.
4, Download "READ_all_hackers.txt" at /Drop/Uploads.
5, Upload "READ_all_hackers.txt" to "CSEC Public File Drop".

Through the Spyglass
1, Hack "Joseph Scott's Battlestation".
2, Download "DECHead.exe" at /home/work.
3, You'll get a new email once you realy, now connect to "CSEC Crossroads Server".
4, Download "CSEC_encode_1.dec" at /home.
5, Connect to your main PC, then analyze "CSEC_encode_1.dec" with "DECHead.exe". (Use this command:)
6, You'll find an IP address for "Macrosoft Workhorse". Connect to it and hack it.
7, Read "3345633.log" at /WORKLOGS, the password is there.

Red Line
You don't need to hack this server completely! Just attempting to hack it is enough!
1, Connect to "CCC Hacksquad Filedump".
2, As soon as you start hacking, you will enter "emergency recovery mode". Now you should change your IP address quickly.
3, Connect to "ISP Management System". (Use this command:)
4, Hack "ISP Management System".
5, Click "Search for IP", then type your current IP address. (It should be shown at bottm-left corner.)
6, Click "Assign New IP", your PC will restart immediately.
7, Reply the email.
Some tips for hacking this one completely:
*EASIEST WAY to beat it: Just keep hacking the server even if you enter the emergency recovery mode. Each command will reset the warning message and you will be able to finish hacking.
* If you want to download the files in this server, you can do it while emergency recovery mode. You'll need to type commands really quickly though.....

Wipe the record clean
1, Hack "International Academic Detabase", or just log in as admin if you've done this before.
2, Search for "Jacob Stevens".
3, Click "Delete", then "Confirm".
4, Delete logs before you disconnect!

Jailbreak
1, Hack "Sal_Home_Workstation".
2, Scan for his eos device.
3, Log in to "Elanor Helleran's ePhone 4s" as admin.
4, Read "ids.txt" at /eos/notes, and remember the registration ID.
5, Reply with the registration ID.

A Convincing Application
1, Log in to "CSEC Crossroads Server" as admin.
2, Download "FOF_Screenplay.doc" at /home.
3, Analyze "T2_Screenplay.dec" with "DECHead.exe". You'll get an IP address.
4, Hack "Jason's LackBook Pro".
5, Go to /home/scripts, and upload "FOF_Screenplay.doc" from your PC.

Unjust Absence
1, Log in to "CSEC Assets Server" as admin.
2, Download "template.txt" at /home/Templates/DeathRowDatabaseTemplate.
3, Connect to your main PC, and open "template.txt" at /home.
4, Edit "template.txt".
Use these commands:




5, Rename "template.txt" to .
6, Connect to "Death Row Records Database", and hack it or log in as admin if you have already hacked it.
7, Go to /dr_database/records, and upload the file, .

Two Ships in the night
1, Connect to "CSEC Crossroads Server", and find "C_EXE_contact.dec" at /home.
2, Decrypt "C_EXE_contract.dec" with "Decypher.exe". (Use this command:)
3, Download "C_EXE_contact.txt". ()
4, Upload "C_EXE_contact.txt" to "CSEC Public File Drop".

Project Junebug
1, Hack "Universal Medical".
2, Search for "Elliot Whit".
3, Send his record to your email address. (Click "e-email this record" then "Specify Address".)
4, Go to your Jmail inbox, and read Elliot's record. You will find 2 IP addresses here.
5, Connect to "Kellis Biotech Client Services", and hack it.
6, Optional, but necessary if you wanna know what you're doing: Read all news on "Kellis Biotech News".
7, Scan network
8, Hack "Kellis Biotech Prodection Asset Server".
9, Download "KBT_PortTest.exe" at /home/Production/Output. This software will allow you to hack port 104.
10, Now go back to "kellis Biotech Client Services", and read "#0E0015_-_Pacemaker_v2.44_Firmware_and Patching" at /MsgBoard/listings. You'll find an IP address here.
11, Connect to "Eidolon Soft Production Server", and hack it.
12, Read "Eidolon_Security_Notes.txt" at /projects/Internal. Remember the user name and the password.
13, Download "PacemakerFirmware_Cycle_Test.dll" at /projects/KellisBT/Tests.
14, Connect to "KBT-PM 2.44 REG#10811", and hack it.
15, Go to /KBT_Pacemaker, and upload "PacemakerFirmware_Cycle_Test.dll" there.
16, Click "View Monitor".
17, Log in as EAdmin. ()
18, Click "Administrate Firmware".
19, Choose "PacemakerFirmware_Cycle_Test.dll", then click "Activate This Firmware".
20, Now watch his heart beat....
21, RIP
CSEC Missions CSEC任务(译文)
CSEC Invitation
1, 入侵 "CSEC Invitation Gauntlet".
2, 读 "CONTINUE.txt" 在 /home/Test.
3, 扫描网络.
4, 入侵 "CSEC Gauntlet 02".
5, 读"CONTINUE.txt" 在 /home/Test.
6, 入侵 "CSEC Gauntlet 03".
7, 下载 "WebServerWorm.exe" 在 /home/Gift.
8, 读 "Invitation_Passwords" 在 /home/Test.记住密码.
9, 回复密码.

CSEC Invitation - Affirmation
1, 入侵 "www.cfc.com".
2, 扫描网络.
3, 入侵 "CFC Corporate Mainframe".
4, 读 "11_Secret_Herbs_And_Spices.txt" 在 /home/training_files.
5, 扫描网络
6, 入侵 "CFC Records Repository".
7, 下载 "Seasoning_Order_Placement_Template_Pt1.docx" and "Seasoning_Order_Placement_Template_Pt2,docx".
8, 上传文件到 "CSEC Public File Drop".

CSEC Invitation - Attenuation
(This is what you get if you finished /el missions)
1, 入侵 "www.cfc.com".
2, 扫描网络.
3, 入侵 "CFC Corporate Mainframe".
4, Read "11_Secret_Herbs_And_Spices.txt" 在 /home/training_files.
5, 扫描网络
6, 入侵 "CFC Records Repository".
7, 下载 "Seasoning_Order_Placement_Template_Pt1.docx" and "Seasoning_Order_Placement_Template_Pt2,docx".
8, Upload the 2 files to "CSEC Public File Drop".
(译者:我实在不清楚上面两个任务有何区别——它们似乎完全一样。)

CSEC Invitation - Congratulations
1, 登入to "CSEC Assets Server" as admin.
2, 下载 "SQL_MemCorrupt.exe" 在/bin/SQL_Mem_Corrupter (有了 "SQLBufferOverflow.exe"您就不需要这个了。) 及"Sequencer.exe" 在/bin/Sequencer.
终于进入CSEC任务了…...

Rod of Asclepius
1, 入侵 "Universal Medical".
2, 寻找"Jonas Sandburg".
3, 点击 "e-mail this record", 发到"gila@jmail.com".

Binary Universe(ity)
1, 入侵 "International Academic Databse".
2, 寻找"John Stalvern".
3, 点击 "Add Degree".
4, 增加以下记录(译者:用replace命令吧): "Manchester Univeristy" "Masters in Digital Security" "3.1"
5, 点击 "Save and Return".
6, 删除 logs!!(译者:说实话,我实在不知道不删log会怎么样。)
译者:这是不是对uplink致敬呢?

Ghosting the Vault
1, 入侵 "CSEC Crossroads Server".
2, 下载 "encrypt_source.dec" 在 /home.
3, 入侵 "DEC Solutions Web Server".
4, 扫描网络.
5, 入侵 "DEC Solutions Mainframe".
6, 下载 "Decypher.exe" at /Staff/A.Carey.
7, 连接你的主电脑, 进入/home.
8, 解密 "encrypt_source.dec".
9, 上传"encrypt_source.cs" 到CSEC Public File Drop".

Imposters on Death Row
1, 入侵 "Death Row Records Database".
2, 进入/dr_database/records.
3, 删除 Joseph Felman 记录.

Bit's disappearance Investigation
1, 入侵 "Bitwise Relay 01".
2, 读 Home_Base.txt 在 /home.
3, 连接"Bitwise Drop Server", 入侵它 .
4, 下载 "READ_all_Hackers.txt" 在 /Drop/Uploads.
5, 上传"READ_all_Hackers.txt" 到 "CSEC Public File Drop".

Through the Spyglass
1, 入侵 "Joseph Scott's Battlestation".
2, 下载 "DECHead.exe" 在 /home/work.
3, 你会得到一个邮件, 连接"CSEC Crossroads Server".
4, 下载 "CSEC_encode_1.dec" 在 /home.
5, 连接主电脑, 侦听"CSEC_encode_1.dec" 用 "DECHead.exe".
6, You'll 寻找 an IP address for "Macrosoft Workhorse". 连接并入侵它.
7, 读"3345633.log" 在 /WORKLOGS, 密码在那.

Red Line
不用完全入侵这服务器! 假装试着入侵即可!
1, 连接"CCC Hacksquad Filedump".
2, 您一开始入侵, 就会进入"emergency recovery mode". 您要快点改IP.
3, 连接"ISP Management System". (译者:在右下角,应该是第一行.)
4, 入侵 "ISP Management System".
5, 点击 "Search for IP", 输入您的电脑IP. (其应在右下角.)
6, 点击 "Assign New IP", 您的电脑会立即重启.
7, 回复邮件.
完全入侵之的小帮助:
*入侵它的最容易的办法:即使进入"emergency recovery mode"仍入侵这个服务器. 每个命令都会重新设定倒计时,使您最终完成入侵。
(译者:入侵成功后您会找到一个新x—server,对于我来说,如此漂亮的界面让我感觉值了。)
* 若您想下载服务器的文件, 您可以在emergency recovery mode做到这一点. 虽然您的手速一定要快.....

Wipe the record clean
1, 入侵或登录 "International Academic Detabase".
2, 搜索 "Jacob Stevens".
3, 点击 "Delete", then "Confirm".
4, 删除记录!

Jailbreak
1, 入侵 "Sal_Home_Workstation".
2, 搜索eos设备.
3, 登入 "Elanor Helleran's ePhone 4s" .
4, 读 "ids.txt" 在/eos/notes, 记住登入ID.
5, 回复 ID.

A Convincing Application
1, 登入 "CSEC Crossroads Server" .
2, 下载 "FOF_Screenplay.doc" 在 /home.
3, 分析 "T2_Screenplay.dec" 用 "DECHead.exe". 你会得到ip地址.
4, 入侵 "Jason's LackBook Pro".
5, 进入/home/scripts, 并上传 "FOF_Screenplay.doc" .

Unjust Absence
1, 登入to "CSEC Assets Server" .
2, 下载 "template.txt" 在 /home/Templates/DeathRowDatabaseTemplate.
3, 连接your main PC, 打开"template.txt" 在 /home.
4, 编辑"template.txt".
5, 重命名 "template.txt" .
6, 连接"Death Row Records Database", 入侵或登入之.
7, 进入/dr_database/records, 上传文件 .

Two Ships in the night
1, 连接"CSEC Crossroads Server", 寻找 "C_EXE_contact.dec" 在 /home.
2, 解密 "C_EXE_contract.dec" 用"Decypher.exe".
3, 下载 "C_EXE_contact.txt".
4, 上传 "C_EXE_contact.txt" 到 "CSEC Public File Drop".

Project Junebug
译者广告:您也可以参考我的攻略http://tieba.baidu.com/p/4456967644?lp=5028&mo_device=1&is_jingpost=1&pn=0&
1, 入侵 "Universal Medical".
2, 搜索"Elliot Whit".
3, 把这个记录发到你邮箱上. (点击 "e-email this record" 然后"Specify Address".)
4, 进入您的邮箱. 您会在此找到两个IP.
5, 连接"Kellis Biotech Client Services", 入侵它.
*6, 可选,但是如果要搞明白自己在干什么最好读"Kellis Biotech News"的所有文章.
7, 扫描网络
8, 入侵 "Kellis Biotech Prodection Asset Server".
9, 下载 "KBT_PortTest.exe" 在 /home/Production/Output. 这软件可让您入侵 端口104.
10, 回到 "kellis Biotech Client Services", 读"#0E0015_-_Pacemaker_v2.44_Firmware_and Patching" at /MsgBoard/listings.您会找到IP.
11, 连接"Eidolon Soft Production Server", 入侵它.
12, 读 "Eidolon_Security_Notes.txt" at /projects/Internal.记住用户名、密码.
13, 下载 "PacemakerFirmware_Cycle_Test.dll" 在/projects/KellisBT/Tests.
14, 连接"KBT-PM 2.44 REG#10811", 入侵它.
15, 进入/KBT_Pacemaker, 上传 "PacemakerFirmware_Cycle_Test.dll" .
16, 点击 "View Monitor".
17, 以EAdmin登入.
18, 点击 "Administrate Firmware".
19, 选择 "PacemakerFirmware_Cycle_Test.dll", 点击 "Activate This Firmware".
20, 默默注视他(?)的心电图...
21, 安息吧.
Final Missions 终极之终极
Bit -- Foundation
1, Connect to "CSEC Assets Server".
2, Decrypt "Tracekill.dec" at /bin/TK. (Use this command:)
3, Download "Tracekill.exe".

Bit -- Substantiation
1, Connect to "Bitwise Repo Base", and hack it.
2, Analyze "hn_repo_archieve.dec" with "DECHead.exe". You'll get an IP address.
3, Send the IP address to V.

Bit -- Investigation
***Use "Tracekill.exe" wisely!!***
1, Hack "EnTech Web Server".
2, Scan network.
3, Hack "EnWorkstationCore".
4, Scan network.
5, Hack "EnTech Workstation_008".
6, Download "Prometheus.txt" at /WORKSTATION/store. You'll need the password in it later.
7, Download "StoreServIPs.txt" at /WORKSTATION/store. You'll find 2 IP addresses in it.
8, Go to "En_Prometheus", then log in as admin. (usename:password:)
9, You'll get an email from V.

Bit -- Propagation
1, Go back to "En_Prometheus", then log in as admin.
2, Scan for eos devices.
3, Connect to "ENTECH_TEST_01's ePHONE 4S".
4, Read "nstanford@entech.com.act" at /eos/mail. Remember the username and the password.
5, Connect to "EnTech Mail Server", then log in as nstanford@entech.com. (username:password:)
6, Read the email titled "Re"Romulus passwd". Remember the password.
7, Connect to En_Romulus, then log in as admin. (username:password:
8, Read "Contractor_Server.doc" at /STORE/Contractors. This is the admin password for "EnTech External Contractor Relay Server"..
9, Send the password to V.

Bit -- Vindication
1, Connect to "EnTech External Contractor Relay Server".
2, Download "heart.dec" at /Contractors/Bit.
3, Connect to your main PC, then decrypt "heart.dec". (Use this command:)
4, Read "heart.txt".
5, Reply to V.

Bit -- Termination
1, If you don't have "Sequencer.exe" yet, connect to "CSEC Assets Server", and download it at /bin/Sequencer.
2, Run "Shell" on your main PC and some other computers. 3 or 4 recommended.
3, Start "Sequencer.exe" and click "ACTIVATE"
8, Hack "EnTech_offline_Cycling_Backup"!!! GO GO GO!!!
9, Delete all files in /ARCHIVE/Hacknet/24-02, /ARCHIVE/Hacknet/03-12, /ARCHIVE/Hacknet/18-09.
10, Delete logs.
11, Disconnect.....
12, Reply to V.

Terminal
1, Connect to "PortHack.Heart.
2, Hack "PortHack.Heart".......!?



Bit -- Foundation
1, 连接"CSEC Assets Server".
2,解密"Tracekill.dec" 在 /bin/TK.
3, 下载 "Tracekill.exe".

Bit -- Substantiation
1, 连接"Bitwise Repo Base", 入侵它.
2, 分析"hn_repo_archieve.dec" 用 "DECHead.exe". 您会得到一个IP.
3, 把IP发给 V.

Bit -- Investigation
***善用 "Tracekill.exe" !!***
(译者:Entech大部分服务器都无法正常破解,注意。)
1, 入侵 "EnTech Web Server".
2, 扫描网络.
3, 入侵 "EnWorkstationCore".
4, 扫描网络.
5, 入侵 "EnTech Workstation_008".
6, 下载 "Prometheus.txt" 在/WORKSTATION/store. 您会稍候需要其中的密码.
7, 下载 "StoreServIPs.txt" 在 /WORKSTATION/store. 您要找两个IP.
8, 进入"En_Prometheus", 登入.
9, 您会得到V的邮件.

Bit -- Propagation
1, 回到 "En_Prometheus", 登入.
2, 扫描eos设备.
3, 连接"ENTECH_TEST_01's ePHONE 4S".
4, 读 "nstanford@entech.com.act" 在/eos/mail. 记住其中的用户名、密码.
5, 连接"EnTech Mail Server", 以 nstanford登入. (2016/10/21注:邮箱服务器是不需要后面的@的,很抱歉造成误导。)
6, 阅读标题为 "Re:Romulus passwd"的邮件. 记住密码.
7, 连接En_Romulus, 登入.
8, 读 "Contractor_Server.doc" 在/STORE/Contractors. "EnTech External Contractor Relay Server"的密码就在里面.
9, 发送密码给 V.

Bit -- Vindication
1, 连接"EnTech External Contractor Relay Server".
2, 下载 "heart.dec" 在 /Contractors/Bit.
3, 连接your main PC, then decrypt "heart.dec".
4, 读"heart.txt".
5, 回复 V.

Bit -- Termination
1, 若您没有 "Sequencer.exe" , 连接"CSEC Assets Server", 下载它在 /bin/Sequencer.
2, 启动"Shell" 在您的电脑及其它几个电脑.3-4个够了。
3, 启动 "Sequencer.exe" 点击 "ACTIVATE"
8, 入侵 "EnTech_offline_Cycling_Backup"!!!快点!!!
9, 删除 /ARCHIVE/Hacknet/24-02, /ARCHIVE/Hacknet/03-12, /ARCHIVE/Hacknet/18-09的所有文件.
10, 删除记录.
(译者:您事实上可以下载上面的文件,但您很快会发现其中Hacknet.exe文件无法运行。您明白为什么吗?
Sequencer还能再运行一次以破解服务器。)
11, 断线.....
12, 回复 V.

Terminal
1, 连接"PortHack.Heart.
2, 入侵 "PortHack.Heart".......!?

Final Words from Me 最后
Final Words from Me
Thank you for reading my guide. I hope my guide helped you! Anyway, if you have followed this guide too much, I recommend you to play a new session after you see the ending. Hacknet's story is pretty good and interesting, you would be pleased when you understand what was going on with those hackers, and see the ending again :D

最后
感谢阅读我的指南。我希望我的指南帮到你!无论如何,若您一直顺着指南走,我推荐您在开个存档玩。Hacknet故事很好,若您明白究竟发生些什么,你会很高兴的。:D

Thank you again,

再次感谢

Gorimaccha(作者)

译者记
非常,非常抱歉。
如果你仔细读完这个翻译,恐怕很容易发现其中充斥大量错误和纰漏。我得说,对于我而言,翻译一篇十几甚至二十页的攻略已十分不易,将其雕琢地如原攻略般完美,几乎不可能。尽管如此,我仍十分惭愧没有尽力完善它。因此,由于我的疏忽导致大家阅读这份指南时产生的任何阅读障碍,我都表示抱歉。
75 Comments
百事可乐 9 Apr @ 3:30am 
good
密西西比泥哥 20 Nov, 2023 @ 10:13am 
拿到的服务器怎么排列整齐,靠边上的看不清ip和名字
BoredBean 18 Jul, 2022 @ 6:00am 
什么王者农药群…
请问把主题二次删掉了,下载os系统后还是无法正常打开怎么办??请求您的回复
猫喵喵 3 Apr, 2019 @ 9:32am 
red line那个试了下,看来是改了,能通过emergency mode强行打开所有port,但是portHack不能成功了,似乎只能通关后的securityTracer去搞,或者不要删刚开始的那个(刚开始不想删的话重命名下就好了),这样这时候就能用这个反trace进去了:lunar2019piginablanket:

或者有其他大神有新方法?求分享:lunar2019deadpanpig:
Phen0barbita1 1 Aug, 2018 @ 4:25am 
问一下大佬,entec那关En_Prometheus的用户名是什么啊
187A_Chara 16 Jul, 2018 @ 10:41pm 
还有naix的任务如果直接在他机子上/sys>del *就触发不了
187A_Chara 16 Jul, 2018 @ 3:05am 
防火墙大部分其实只要分析到每行只要一个大写字母就可以了
还有黑进/el论坛并且在帖子的地方上传一个九位数字.tm查看页拉到最下面游戏就会出bug
只和帅哥讲话 28 May, 2018 @ 4:42am 
普罗米修斯的eos设备登陆密码是多少?
PrologueTwo 20 Jan, 2018 @ 11:50pm 
感谢贴主,DEC文件那关卡了好久