2 Problems
Moderators: jelco, bert_the_turtle, Chris, Icepick, Rkiver, Punisher Bass
2 Problems
first of all i lost my link to the ARC Central Mainframe(how can i get this back) and second of all i need to know everything about how the LAN software works and how to by-pass a LAN
All Internal Services Machines have a "links" list. Hack into ARC's ISM (make sure to include enough bounces) and click "view links." That will reveal the links that won't show up in InterNIC (namely, the central mainframe and their LAN).
As for the LAN, you'll basically want to scan it and systematically probe each connection. If you need a valid subnet to connect to a system, spoof the system that's on the valid subnet. Try to avoid forcing locks, since it attracts unwanted attention.
Really, LANs just involve some playing around with. It's tough, but if you work at it long enough you'll get 'em.
As for the LAN, you'll basically want to scan it and systematically probe each connection. If you need a valid subnet to connect to a system, spoof the system that's on the valid subnet. Try to avoid forcing locks, since it attracts unwanted attention.
Really, LANs just involve some playing around with. It's tough, but if you work at it long enough you'll get 'em.
Re: 2 Problems
Agent X wrote:...and second of all i need to know everything about how the LAN software works and how to by-pass a LAN
Uplink FAQ wrote:
-LAN HACKING GUIDE -
1. Have LAN_Scan, LAN_Probe, and LAN_Spoof. Also required (these should be obvious, but I'll list just in case), are The highest versions of Password_Breaker (for terminals and pretty much everything else), Decypher (For Elliptic-Curve on Authentication Comps, and I belive Isolation Bridges), Monitor/Proxy Bypass to keep the admin off your butt while you are hacking everything except the main server, IP_Lookup for any modem numbers you run accrss, and have the Administrators voice-print ready for playback on your voice-analyzer if you plan on hitting the Main server.
2. After Logging in to the LAN (the bounce right before the LAN should be a "trusted" connection, basically one that is the same company as the LAN), run your LAN_Scan program adn click the scan button on teh program to Scan as many Devices as you can.
3. After Scanning, go through and LAN_Probe every device you see, or every black box with white outline. Start with the ones closest to your connection and move outward.
4. Now is a good time to slap on your Monitor and Proxy bypasses, just in case.
5. Connect step by step to each device. For example, click on the hub, hit connect, click on the terminal, hit connect. THere may be a faster way, this is just the way I do it.
6. Hubs/Routers/Switches - Look like boxes with a bunch of light sand buttons on them, no security just connections.
7. Terminals - Look lik elittle computers, Password-Required Security. Make sure to note any Radio frequencies or Modem Numbers on any Terminals you hack, be sure to write them down.
8. Locks - Look like small blue diamonds with a Padlock icon on them. By default they are enabled, so they well block LAN_Probes until they are disabled. The status of these are controlled by Authentication Comps and Isolation Bridges.
9. Authentication Comps - Look like big computers, with a padlock icon on them. Password and Elliptic-Curve Security. When clicking on them, the lock it controls is highlighted by a yellow box (one lock per Authentication Comp). Locks are enabled on Authentication Comps by default, but once disabled, will remain disabled (unless you re-enable them) after you log off (or even quit Uplink).
10. Isolation Bridges - Look like small blue boxes with three computer icons on them. To be honest I can't remeber the security on these, its either Password and Elliptic-Curve or none (Will check tomorrow morning). Isolation bridges contro the status of two locks. Here's the trick. Isolation Bridges are DISABLED by default. FOr them to have an affect, you have to ENABLE them (took me awhile to get that. . When enabled, it will switch the status of the two locks. For example, if LOCK1 is enabled and LOCK2 is disabled, enabling the Isolation Bridge will cause LOCK1 to become disabled and LOCK2 to become enabled.
11. Modems - Looks liek a telephone, allows external access of LAN. Often, phone numbers are found on computers for Modems. RUn IP_Lookup adn typ teh phone number in (*****-******), and click go. This will add the LAN to your bookmarks, and accessing form the new location will connect you to the phone. This is often used to access areas of the LAN not accessible from the main switch.
12. Wireless Networking Transmitters (or just Radio Transmitters) - Looks like a radio transmitter, can't get much mroe experienced than that. . Used to connect different areas of the LAN without wires. Frequencies for these transmitters are often found on Terminals. Just enter the frequency and click connect.
13. Main Server - Looks like a computer with a tower. Password Security, plus requires the Administrators Voice Authorization. Here comes the fun part. No matter what bypasses you have on, upon connecting to teh Main Server, the SysAdmin smells something fishy. He will log on shortly after accessing the Main Server (you will hear an alarm if you have your sound on), and he will start a trace shortly after. While some peopel say its a good idea to hit reset now, it generally semms like the trace starts and continues anyway, so I just keep going. (Don't close your Voice-Analyzer after using it the first time, you may need to log into the LAN again to finish the job). Onc eyou are in, the Main Server is basically any Mainframe you hack into. But be quick, the SysAdmin will not wait for th etrace to complete before booting you. The most time you can hope for is 30-40 or before being kicked, the least 2 or 3 seconds (At least this was my experience on the ARC LAN, the trac started with 120 seconds remaining, I was often booted before it hit 100).
14. Yellow Boxes:
Contoller - ANy item listed as a Controller governs the status of the item you have selected; generally found on Authorization Comps or Isolation Bridges when you have a Lock selected.
Locks/Unlocks, Locks, Unlocks - THese boxes generally appear on Locks when you have an Authentication Comp or an Isolation Bridge Selected; it describes what functions they can perform on the locks.
Valid Subnet - These often appear around Terminals when you have an item slected that performs some function (Authentication Comp, Isolation Bridge, Main Server, could be anumber of things). Anythign and everything listed as a valid subnet must be spoofed using LAN_Spoof. Be sure to leave LAN_Spoof open after spoofing each terminal. After you are done with whatever item required the Valid Subnets to be spoofed, you can close the LAN_Spoofs.
Guarded by - I first noticed this whiel hacking the ARC LAN when I clicked the Main Server, the Guarded By box showed up on the three locks surroundign the Main Server. Basically it means you have to disable every lock before accessing the Main Server.
15. Other tips:
If for any reason you cannont connect to some item, such as a lock, terminal, Authentication Comp or whatever, check a few things. IF a lock is not disabled, you will not be able to connect to it. If you do not have all of an item's Valid Subnet's spoofed (make sure all of the LAN_Spoofs are still open), you also will no tbe able to connect.
Items in the LAN you can't seem to get to:
GO step by step through each item in the LAN. Everytime you disable a LOCK, run LAN_Probe on it again to make sure you've foun dall the paths. Also, IP_Probe only workes if you have awire connection to the item, so reuse LAN_Probe on the items tou can conenct to by wire to check for new openings. Also, if you have aradio transmitter o rmodem but no numbers, hack every terminal you can access adn write down anything you can find.
If for some reason you are booted or have to disconnect, don't worry. All locks you disabled will still be disabled. Also, if fo rexample you had time to hack teh passwor don the Main Server (for example), but not the Voice-Print, upon loggin back on you will have the Passowrd already done (once both are completed they will reset after disconnecting).
Who is online
Users browsing this forum: No registered users and 3 guests


