随着一大批新物理主机上线投入使用,我收到了一些关于它们是否更容易被骇入,或者你是否真的能分辨出它们的区别的问题。首先,新(或旧)主机使用的协议和界面与2075年上线的结构层技术主机完全相同。结构层技术主机本应是未来的发展方向,老实说,它们现在可能仍是,但它们从结构层与共鸣域带来了新的威胁。因此,公司将继续做它们擅长的事:通过延长一些旧技术的寿命并实际投资研究新的主机硬件来适应不断变化的环境。结构层技术和纯硬件或框架式主机的工作原理基本相同。你不会在框架式主机中找到结构层,这确实有助于防止那些从空节点冒出来的矩阵威胁。但就获取访问权限、四处查看和执行指令这些方面而言,它们都是一样的。我的超链者朋友告诉我,他们的复合程式和网精在框架式主机中也能够正常工作。
解决了这个问题后,让我们来简单讨论一下怎么攻击主机或设备。我们已经讨论过使用社交技巧来获取凭证,但我们还没有讨论过你打算如何使用它,是通过暴力手段还是暗中潜入。首先让我们从最基本的开始:做好调查。在你提升权限之前,你应该弄清楚主机中是否有蜘蛛。如果你想要使用暴力手段,那么不设防的主机就是你的最佳选择,因为蜘蛛要花很长时间才能登录并给你制造麻烦。通过社交工程获得的凭证将在暴力破解袭击中为你提供你所期望的优势。
当进行长时间骇入时,你会通过寻找未打补丁的软件或防御漏洞来进行后门登录。拥有凭证将使你在进入系统时占据优势,即使在探查它时也是如此。如果你赶时间,那么在没有预先探查的情况下闯入意味着你只能依赖你的漏洞库,并期望其中一个能在这个主机上起效。如果你在没有探查的情况下从后门登录,那就会让主机占据优势。但你可以通过拥有凭证来消除这个优势。就个人而言,我总是建议新的奔跑者花点时间来探查弱点,然后通过这种方式进入主机。坦率地说——大多数情况下,你进入主机的大部分时间都是在让摄像头循环播放,或是清理你的团队为了降低热度而制造的混乱。这意味着不要让整个该死的主机系统警觉到你是用暴力方法进入的。
另一件重要的事情是,你甚至可以不需要访问PAN或主机就能实现你的目标。快速地伪造一个指令就可以拯救你小队的人。再配上分叉或一些新程序,你就可以在战斗中同时弹出四个弹夹。了解你的工具,知道什么是你不需要花时间获取更高权限就能执行的,以防止你的OS上升到危险水平。
这就引出了程序、代理、网精和其他一堆你需要掌握的工具。这些实用程序和赛博程序对你的成功至关重要。我编写了一些程序,帮助我管理我的一套赛博程序和智能框架,这样我就可以只用一个指令来切换它们。这种灵活性让我能够更快地更换装备,对设备或主机做出反应,这很重要,因为时间是你在矩阵中最宝贵的资产。我的典型设置基于我要入侵的目标。我有一套专门用于攻击和暴力破解的配置。还有一套用于探查系统,另一套用于处理文件和设备。最后,我还有基础的矩阵属性配置和处理AR中设备与PAN的程序配置。我都在运行什么?抱歉,但我不会泄露我的秘密配方。
> GOD一直在寻找正在运行的非法网络程序,因此,如果你总是运行你最热门的赛博程序,你会更快地引起注意。拥有可替换的程序来让OS降低就能在事态恶化前为我赢得一些时间
> Pistons
劇透 - :
With a bunch of new physical hosts being brought online, I’ve been getting questions about whether they are easier to hack or if you can really tell the difference. First off, the new (or old) hosts use the exact same protocols and interface as Foundation-tech hosts brought online in 2075. The Foundation-tech hosts were supposed to be the way of the future, and honestly, they probably still are, but they bring new threats from the Foundation and Resonance realms. So the corps are going to do what they’re good at: adapting to the changing circumstances by extending the life of some of older tech, and actually invest in researching new host hardware. Foundation-tech and pure hardware, or framework, hosts are going to work pretty much the same as each other. You won’t find a Foundation in the framework hosts, which really helps prevent some Matrix threats bubbling up from the Null node. But in the ways that matter for gaining access, having a look around and executing commands are the same. And my technomancer friends have told me that their complex forms and sprites work just fine in framework hosts.
With that question outta the way, let’s cover a little bit about hitting a host or device. We’ve talked about using social skills to gain credentials, but we really haven’t talked about whether you want to use that with brute force or if you can expoit a user’s credentials while going stealthy. First let’s start with the basics: doing your research. Before you go and elevate privileges, you should figure out if there is a spider in the host. Undefended hosts are ripe for the picking if you want to use brute force, since it’s going to take forever for a spider to log in and give you trouble. Having credentials from social engineering is going to give you the edge you’re looking for on a brute-force attack.
When setting up something long-term, you’ll be doing a backdoor entry by looking for unpatched software or holes in their defenses. Having credentials is going to give you the advantage hacking into the system, even when probing it. If you’re in a hurry, then going in without probing first means you’re relying on your stable of exploits and hoping one of them is going to work on this host. If ya gain a backdoor entry without probing, then it’s giving the host an advantage over you. But you can negate that advantage by having credentials. Personally, I’ll always tell a new runner to spend the time to probe for a weakness and gain entry to the host that way. Let’s be honest—most of the time you enter a host, it’s going to be looping a camera or cleaning up the mess your team has made in an effort to keep heat down. This means not alerting the whole fragging host system that you bruteforced your way in.
The other big thing is that you may not even need access to the PAN or host to achieve your goals. Quickly spoofing a command can save your team’s soyrizo. Couple that with Fork or some of the newer programs out there, and in a fight you can eject four magazines simultaneously. Know your tools and know what you can execute without spending time gaining elevated access to prevent your Overwatch Score from climbing to dangerous levels.
This leads me to programs, agents, sprites, and the pile of other tools you need to get your hands on. These utilities and cyberprograms are critical to your success. I’ve written a few programs that help me manage my suite of cyberprograms and smartframes so that I can swap them in and out with a single command. This flexibility lets me change gears and respond to the device or host quicker, which is important since time is your most precious asset in the Matrix. My typical setups are based on what I’m going after. I have one setup specifically for attack and brute force. I have another for probing the system, and another for dealing with files and devices. Finally, I have my base configuration of ASDF and programs to deal with devices and PANs in AR. What am I running? Sorry, but I’m not giving away my secret recipes.
> GOD is always looking for illegal cyberprograms being run, so you bring the heat faster if you’re always running your hottest decking software. Having something you can swap out to keep the OS down has bought me the seconds I need before it all goes critical.
> Pistons