addBuffer("You bypass the normal securities of the host and break into their neural center. You feel the defenses break against your will and the struggling entity finally succumb. The surge of power is all the more rewarding to your neural core. The next phase of your power can begin.")
addBuffer("You absorb the host into your own own, becoming one with the entity. You feel the welcoming surge of power and strength through your neural processors. You can now use this Core as your own and take the form of this Architecture and Operating System.")
write("The ping returns with the message:<br>Kernal: Fatal exception")
},
'scan':function(x_attack,x_host){
if(!x_host.known){
addHostVul('star','ssh')
addHostVul('star','ftp')
}
x_host.known=true
write("<span class='exe'>SCAN COMPLETE</span><br>You identify the <span class='exe'>"+x_host.title+"</span> entity in the sandbox network, with an location of "+x_host.location+"<br>It is running a x86 CPU, and a 32bit version of a Linux Operating System")
writeHostVuls(x_host)
refreshHostView()
},
'ftp-guest-':function(x_attack,x_host){
addBuffer("<span class='exe'>SUCCESS</span><br>You have logged into the guest FTP directory and discovered a cache of accessible files. You were able to exploit this access and mount the drive <span class='exe'>/home/star1s1</span>")
write("<span class='exe'>SUCCESS</span><br>You have successfully logged into the root account. You have complete access to all memory and processing powers of the host.<br><br><span class='exe'>You are now able to absorb the host.</span>")
rmHostVul('star','ssh')
addHostVul('star','absorb')
}
}
},
//
// Sun Host
//
sun:{
title:'Sun Host',
location:'10.10.4.53',
architecture:'SPARC-32bit',
os:'Solaris-32bit',
force:8,
vuls:['pingspike'],
mountable_disks:function(x_host){
addBuffer("<span class='exe'>SUCCESS</span><br>You find the Sun home disk available and mount it as your own.")
addDiskFromSlug('sun')
x_host.already_mounted_disks=true
addFileFromSlug('sun-readme',false,true)
addFileFromSlug('sun-oracle',false,true)
addFileFromSlug('sun-memo',false,true)
},
attackcallbacks:{
'ping':function(x_attack,x_host){
write("The ping returns with the message:<br>This OS is currently HSFLOP(03)00:C18354AE months deprecated as of March 2010. Please reach out to your local Oracle Sales Representative.")
},
'scan':function(x_attack,x_host){
write("<span class='exe'>SCAN COMPLETE</span><br>You identify the <span class='exe'>"+x_host.title+"</span> entity in the sandbox network, with an location of "+x_host.location+"<br>It is running a SPARC CPU, and a 32bit version of the Solaris Operating System")
writeHostVuls(x_host)
x_host.known=true
refreshHostView()
},
'accessroot-root-Jack':function(x_attack,x_host){
write("<span class='exe'>SUCCESS</span><br>You have successfully logged into the root account. You have complete access to all memory and processing powers of the host.<br><br><span class='exe'>You are now able to absorb the host.</span>")
addHostVul('sun','absorb')
}
},
},
//
// Sont Host
//
sony:{
title:'Sony Host',
location:'10.10.40.153',
architecture:'PowerPC-32bit',
os:'CellOS-32bit',
force:8,
mountable_disks:function(x_host){
addBuffer("<span class='exe'>SUCCESS</span><br>You find the Sony disk and mount it as your own.")
addDiskFromSlug('sony')
x_host.already_mounted_disks=true
addFileFromSlug('sony-readme',false,true)
addFileFromSlug('sony-schema1',false,true)
addFileFromSlug('sony-schema2',false,true)
},
attackcallbacks:{
'ping':function(x_attack,x_host){
write("The ping returns with successful message.")
},
'scan':function(x_attack,x_host){
addHostVul('sony','sony')
write("<span class='exe'>SCAN COMPLETE</span><br>You identify the <span class='exe'>"+x_host.title+"</span> entity in the sandbox network, with an location of "+x_host.location+"<br>It is running a PowerPC CPU, and a 32bit version of CellOS")
writeHostVuls(x_host)
x_host.known=true
refreshHostView()
},
'sonyopen':function(x_attack,x_host){
write("Disk drive opens. parappathrappa.iso available for download")
x_host.sonyopen=true
},
'sonyclose':function(x_attack,x_host){
write("Disk drive closes. Ready to play.")
x_host.sonyopen=false
},
'sonyusbmount':function(x_attack,x_host){
write("Image mounted")
},
'sonyusbunmount':function(x_attack,x_host){
write("Image removes")
},
sonyrestart:function(x_attack,x_host){
if(x_host.mounted){
write("The psjailbreak.img is booted as the new Operating System. The script grants access that allows you to execute code at a user level.")
addHostVul('sony','execode')
}else{
write("System Restarted normally")
}
},
sonyimgupload:function(x_attack,x_host){
write("psjailbreak.img mounted")
x_host.mounted=true
},
sonyimgunmount:function(x_attack,x_host){
write("psjailbreak.img unmounted")
x_host.mounted=false
},
},
},
//
// Juno Host
//
juno:{
title:'Juno Host',
location:'10.10.15.66',
architecture:'x86-32bit',
punt_count:0,
force:10,
os:'Linux-32bit',
mountable_disks:function(x_host){
addBuffer("<span class='exe'>SUCCESS</span><br>You find the Juno home disk available and mount it as your own.")
write("The ping returns with the message:<br>SSH Guest password: mamba")
hostLearnPw('juno','mamba')
},
'scan':function(x_attack,x_host){
write("<span class='exe'>SCAN COMPLETE</span><br>You identify the <span class='exe'>"+x_host.title+"</span> entity in the sandbox network, with an location of "+x_host.location+"<br>It is running a x86 32bit CPU, and a 32bit version of the Linux Operating System")
write("<span class='exe'>SUCCESS</span><br>You have successfully logged into the root account. You have complete access to all memory and processing powers of the host.<br><br><span class='exe'>You are now able to absorb the host.</span>")
write("<span class='exe'>SUCCESS</span><br>You have successfully logged into the root account. You have complete access to all memory and processing powers of the host.<br><br><span class='exe'>You are now able to absorb the host.</span>")
addHostVul('juno','absorb')
},
'ssh-guest-mamba':function(x_attack,x_host){
write("<span class='exe'>SUCCESS</span><br>You successfully log into the guest network. You now have rights to basic commands and execution rights.")
addHostVul('juno','execode')
startJunoPunt()
}
},
},
//
// Luna Host
//
luna:{
title:'Luna Host',
location:'10.10.195.53',
architecture:'x86-16bit',
os:'MSDOS-16bit',
force:2,
attackcallbacks:{
ping:function(x_attack,x_host){
write("The ping responds with successful message.")
},
scan:function(x_attack,x_host){
x_host.known=true
write("<span class='exe'>SCAN COMPLETE</span><br>You identify the <span class='exe'>"+x_host.title+"</span> entity in the sandbox network, with an location of "+x_host.location+"<br>It is running a 16bit x86 CPU, and a 16bit version of MSDOS")
writeHostVuls(x_host)
refreshHostView()
},
},
silent_mountable_disks:function(x_host){
addDiskFromSlug('luna')
addFileFromSlug('luna-readme',false,true)
},
},
//
// cypher Host
//
cypher:{
title:'Cypher Host',
location:'10.10.256.256',
architecture:'x86-32bit',
os:'MSDOS-32bit',
force:8,
attackcallbacks:{
ping:function(x_attack,x_host){
write("The ping responds with the message: Do not disturb.")
},
scan:function(x_attack,x_host){
x_host.known=true
write("<span class='exe'>SCAN COMPLETE</span><br>You identify the <span class='exe'>"+x_host.title+"</span> entity in the sandbox network, with an location of "+x_host.location+"<br>It is running a 32bit x86 CPU, and a 32bit version of MSDOS")
writeHostVuls(x_host)
refreshHostView()
}
},
silent_mountable_disks:function(x_host){
addDiskFromSlug('cypher')
addFileFromSlug('cypher-readme',false,true)
addFileFromSlug('cypher-diary',false,true)
},
},
//
// Eris Host
//
eris:{
title:'Eris Host',
location:'10.10.12.1',
architecture:'x86-32bit',
smtpcount:7,
os:'MSDOS-32bit',
force:8,
attackcallbacks:{
ping:function(x_attack,x_host){
write("The ping responds successfully.")
},
scan:function(x_attack,x_host){
addHostVul('eris','smtp')
addHostVul('eris','smtpexploit')
addHostVul('eris','ssh')
x_host.known=true
write("<span class='exe'>SCAN COMPLETE</span><br>You identify the <span class='exe'>"+x_host.title+"</span> entity in the sandbox network, with an location of "+x_host.location+"<br>It is running a 32bit x86 CPU, and a 32bit version of MSDOS")
writeHostVuls(x_host)
refreshHostView()
},
smtp:function(x_attack,x_host){
if(x_host.smtpcount>10){
addBuffer("SMTP message response: Error Disk Space Full")
addBuffer("The Host is running an email server accessible on the SMTP protocol. You manage to pass a series of conflicting commands and gain access to the Disk drive.")
addBuffer("There is a cache of forgotton emails in the drive")
writeBuffer()
addDiskFromSlug('eris')
addFileFromSlug('eris-readme')
addFileFromSlug('eris-remotedesktop')
addFileFromSlug('eris-1')
addFileFromSlug('eris-2')
addFileFromSlug('eris-3')
addFileFromSlug('eris-4')
addFileFromSlug('eris-5')
addFileFromSlug('eris-6')
addFileFromSlug('eris-7')
for(vari=8;i<=x_host.smtpcount;i++){
addFileFromSlug('eris-'+i)
}
x_host.already_mounted_disks=true
refreshMenu()
},
'ssh-eris-FCKGW':function(x_attack,x_host){
write("<span class='exe'>SUCCESS</span><br>You have successfully logged into the Eris account. You may now execute code at a User level.")
addHostVul('eris','execode')
}
},
},
//
// Solar Host
//
solar:{
title:'Solar Host',
location:'10.10.70.12',
architecture:'x86-32bit',
os:'MSDOS-32bit',
force:8,
attackcallbacks:{
ping:function(x_attack,x_host){
write("Away Message: In the bbs, seeking help")
},
scan:function(x_attack,x_host){
addHostVul('solar','remotedesktop')
x_host.known=true
write("<span class='exe'>SCAN COMPLETE</span><br>You identify the <span class='exe'>"+x_host.title+"</span> entity in the sandbox network, with an location of "+x_host.location+"<br>It is running a 32bit x86 CPU, and a 32bit version of MSDOS")
write("<span class='exe'>SUCCESS</span><br>Your RDP credentials are accepted and you log into the Remote Desktop interface. This user has privilages to install and execute software into the OS.")
addHostVul('solar','execode')
}
},
mountable_disks:function(x_host){
addBuffer("<span class='exe'>SUCCESS</span><br>You find the Solar home disk available and mount it as your own.")
addDiskFromSlug('solar')
addFileFromSlug('solar-readme',false,true)
x_host.already_mounted_disks=true
},
silent_mountable_disks:function(x_host){
addDiskFromSlug('solar')
addFileFromSlug('solar-readme',false,true)
},
},
//
// eons
//
eons:{
title:"EONS Host",
location:'10.10.104.11',
architecture:'unknown',
os:'unknown',
attackcallbacks:{
ping:function(x_attack,x_host){
write("You receive a response ping 10ms before your ping is sent. The logic here is distorted.")
},
scan:function(x_attack,x_host){
x_host.known=true
write("<span class='exe'>SCAN COMPLETE</span><br>You identify the <span class='exe'>"+x_host.title+"</span> entity in the sandbox network, with an location of "+x_host.location+"<br>It is running on unknown hardware. The ports on the host seem neither open nor closed.")
writeHostVuls(x_host)
refreshHostView()
},
pingspike:function(){
launchAdventureFromSlug('eons')
}
},
},
//
// n0va Host
//
nova:{
title:'n0v4 Host',
location:'10.10.2.101',
architecture:'x86-32bit',
os:'MSDOS-32bit',
force:8,
attackcallbacks:{
ping:function(x_attack,x_host){
write("The ping returns with the message:<br>Welcome to the n0v4 Bulletin Boards! Feel free to log in and browse the archives!")
},
scan:function(x_attack,x_host){
if(!x_host.known){
addHostVul('nova','telnet')
}
x_host.known=true
write("<span class='exe'>SCAN COMPLETE</span><br>You identify the <span class='exe'>"+x_host.title+"</span> entity in the sandbox network, with an location of "+x_host.location+"<br>It is running a x86 CPU, and MSDOS 32bit. It seems to be set up as an interactive messaging system.")