Take on the role of an operative in the Hex Gen network, a decentralized movement of hacktivists resisting the economic pillaging conducted by the unholy alliances of Big Tech, Big Military, and Big Finance. Think "The Windup Girl" meets "Neuromancer". Features: -Facial, vocal biometric capture devices -"Nohface" electronic face projector for thwarting surveillance/drones which cover almost every inch of city -Wireless internet -Darknets - all web activity is fully surveilled, you need stealth not only in meatspace but in cyberspace -More types of hacking - cryptography, DDoS, spoofing -Hunger: experience real economic destitution as you slowly die of starvation and are forced to beg, steal, or even kill for a piece of bread. -DIY: Upgrade your hemp trenchcoat with solar trim, syphon electricity from the private power grid, take apart old phones and radios to hack together an EMP gun, set up a hydroponic garden in your squatted flat so you don't have to kill for every meal.

  • View media
  • View media
  • View media
  • View media
  • View media
  • View media
RSS feed Report content Wireless Network Hacking Interface (view original)
Wireless Network Hacking Interface
view previous next
Share Image
Share on Facebook Tweet Email a friend
Embed Image
Post a comment

You are not logged in, your comment will be anonymous unless you join the community. Or sign in with your social account:


Latest WIP of the (hopefully) novel wireless hacking submenu. Your Hex Gen-issued hex-slate is capable, given the operative has the prerequisite skills, of detecting clandestine networks broadcasting in the vicinity. The player can go "Wardriving" -- that is, probing for porous wireless networks via the "Dreamcacher" packet sniffer, as well as other security vulnerabilities. Of course, hostile networks will have their "nose to the gravel" searching for you, as well. Upon gathering sufficient network packets, the hacktivist can then begin the process of decrypting the network hash function by tweaking algorithms and dictionary-attack wordlist tables, until the key is discovered. At that point, network packets can then be decrypted and read in plain-text, to allow the hacktivist to pan for potentially valuable/compromising data transferred over the wireless (such as a username / password combination... :) )

I tried to base as much of this as possible on real-world equivalents, which would include the usual cracker suite of Kismet, Wireshark, Back Track, etc. While at the same time not requiring the player be a rockstar at Infosec Con, a member of Masters of Deception, or be a senior black-hat working for the NSA/Google... (or are they two faces of the same meta-organization? :D )

Aug 26th, 2012
Embed Thumb
RSS feed