Thorium-Sim / thorium

Platform for starship simulator controls
https://thoriumsim.com
Apache License 2.0
157 stars 69 forks source link

Hacking Controls #98

Open alexanderson1993 opened 7 years ago

alexanderson1993 commented 7 years ago

Hacking follows a process:

  1. Target aquisition
  2. Vulnerability Detection
  3. Exploitation
  4. ...
  5. Profit

The Galileo hacking controls operate this way:

  1. Select a frequency to hack on
  2. Perform a port scan
  3. Get the open ports, each with its own application
  4. Crack the password
  5. Use the application to do what you want

In addition, there can be traces activated which must be masked with the signal jammer.

Nefarious things you could do with Hacking:

alexanderson1993 commented 7 years ago

arp

logic k-connection network connection sequence sniffer connection bouncer buffer overflow elliptic curve decryption remote file finder cryptographic collision cypher killpatrick unhasher quantum cracker password cracker
brentjanderson commented 7 years ago

Where the devil did you get those images?

    1. 2017 v 10:28, Alex notifications@github.com:

— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub, or mute the thread.

CMSECDirector commented 6 years ago

In looking forward to some day having the ships interact more I had the though this morning to consider specific commands being accessible to hacking (and possibly other stations) that allow for interactions.

Examples: Jamming - It adds a low layer of static to sensors or targeting LRM - Accessing actual LRMS from their ships database Sending LRMS as if they were the ship Power adjustment - Attempting to lower power in a specific system. So if you were running away you could try to reduce power to the chasing ships engines or other systems. It's quickly fixed by your opponent if they are paying attention and it would have taken a long time for them to have attempted the hack. False Targets for tactical for decoy probes as well. Adding users to computer core when they are attempting to infiltrate the ship. Weak signal or a "strange icon" amongst the communications satellites in LRM when a hack is in progress.

Some of these could be subtle clues the other ship gets to show hacking is occurring or has happened. The deeper they get through the firewall levels or more secure the system the more clues and opportunities for the real crew to shut down their efforts.

Emrix commented 5 years ago

@sassyspock, take a look at this, and tell me what you think