Take on the role of an operative in the Hex Gen network, a decentralized movement of hacktivists resisting the economic pillaging conducted by the unholy alliances of Big Tech, Big Military, and Big Finance. Think "The Windup Girl" meets "Neuromancer". Features: -Facial, vocal biometric capture devices -"Nohface" electronic face projector for thwarting surveillance/drones which cover almost every inch of city -Wireless internet -Darknets - all web activity is fully surveilled, you need stealth not only in meatspace but in cyberspace -More types of hacking - cryptography, DDoS, spoofing -Hunger: experience real economic destitution as you slowly die of starvation and are forced to beg, steal, or even kill for a piece of bread. -DIY: Upgrade your hemp trenchcoat with solar trim, syphon electricity from the private power grid, take apart old phones and radios to hack together an EMP gun, set up a hydroponic garden in your squatted flat so you don't have to kill for every meal.

  • View media
  • View media
  • View media
  • View media
  • View media
  • View media
Media RSS Feed Report media Wireless Network Hacking Interface (view original)
Wireless Network Hacking Interface
embed
share
view previous next
 
Post a Comment
click to sign in

You are not logged in, your comment will be anonymous unless you join the community today (totally free - or sign in with your social account on the right) which we encourage all contributors to do.

2000 characters limit; HTML formatting and smileys are not supported - text only

Description

Latest WIP of the (hopefully) novel wireless hacking submenu. Your Hex Gen-issued hex-slate is capable, given the operative has the prerequisite skills, of detecting clandestine networks broadcasting in the vicinity. The player can go "Wardriving" -- that is, probing for porous wireless networks via the "Dreamcacher" packet sniffer, as well as other security vulnerabilities. Of course, hostile networks will have their "nose to the gravel" searching for you, as well. Upon gathering sufficient network packets, the hacktivist can then begin the process of decrypting the network hash function by tweaking algorithms and dictionary-attack wordlist tables, until the key is discovered. At that point, network packets can then be decrypted and read in plain-text, to allow the hacktivist to pan for potentially valuable/compromising data transferred over the wireless (such as a username / password combination... :) )

I tried to base as much of this as possible on real-world equivalents, which would include the usual cracker suite of Kismet, Wireshark, Back Track, etc. While at the same time not requiring the player be a rockstar at Infosec Con, a member of Masters of Deception, or be a senior black-hat working for the NSA/Google... (or are they two faces of the same meta-organization? :D )

Image Details
Type
Demonstration
Date
Aug 26th, 2012
Size
640×480
Options
URL
Embed (big)
Embed
Share
Report Abuse
Report media
Add Media
Members only