Difference between revisions of "User:Zamujasa/Station Network"
m (→114.9 - PDAs) |
(Adding a bunch more data, still a ton of work to do. If this is SUPER SECRET SHIT then please let me know so I don't waste any more time) |
||
Line 1: | Line 1: | ||
I'd like to make this into a more detailed page at some point, but for now I'm just infodumping what I have. | I'd like to make this into a more detailed page at some point, but for now I'm just infodumping what I have. | ||
Until then, here's a basic guide to abusing the station network: | |||
== Wired Network == | |||
TODO. Need to go into this more, explain what devices are on the network, etc etc. | TODO. Need to go into this more, explain what devices are on the network, etc etc. | ||
Line 20: | Line 17: | ||
=== Types of networked devices === | |||
TODO | |||
=== Creating packets === | |||
Packets can be created by using the following command: | |||
:<code>echo field=value|nfield2=value2|nfield3=value3</code> | |||
To store the packet as a file on the mainframe: | |||
:<code>echo ... ^ /home/pjones/''filename''</code> | |||
To send a file (like a packet!) to your terminal, so you can send it with <code>file_send</code> or print it with <code>file_print</code>, save the file to the <code>/mnt/term</code> directory: | |||
:<code>cp /home/pjones/''filename'' /mnt/term/x</code> | |||
If you just need to get the file right away, you can simply save the file in <code>/mnt/term</code> right away: | |||
:<code>echo ... ^ /mnt/term/foo</code> | |||
=== Spoofing the login packet === | |||
Faking a login involves a few specific steps. You'll generally always need a valid ID of any kind to do the initial login, though. | |||
# Log into the mainframe (insert your card and <code>term_login</code>) | |||
# Craft a login packet | |||
# Send the crafted packet back to your terminal | |||
# Either enter <code>su</code> for admin rights, or disconnect and reconnect to log in as a completely different user | |||
# Instead of using <code>term_login</code>, use <code>file_send</code> to send the packet you saved earlier | |||
# You are now logged in with your forged user | |||
The login packet looks like this: | |||
* <code>registered=Pubbie Jones</code> | |||
* <code>assignment=Staff Assistant</code> | |||
* <code>access=</code>, followed by a (semicolon? comma?)-separated list of rights -- every access in the ID computer has a different one. The important one for <code>su</code> access is 11 | |||
=== Radio Frequencies | Applying all of the above to create the packet and register it for <code>file_send</code>: | ||
:<code>echo registered=Pubbie Jones|nassignment=Hacker|naccess=11 ^ /mnt/term/loginpacket</code> | |||
Keep in mind that [[Rules#Don't grief|you shouldn't use this]] to set the [[Guardbuddy|Guardbuddies]] to purge or other destructive things unless you're a [[traitor]]! | |||
=== Sending packets using the mainframe's radio === | |||
You can use DWAINE to send out packets over the air. The mainframe's radio has a limited range, though, so it won't reach everything. | |||
# Create a directory for the frequency you want to transmit on. Directories are the four numbers without the decimal point, e.g. <code>/mnt/radio/1149</code> for 114.9, by using the command <code>mkdir /mnt/radio/1149</code> | |||
#* If the directory already exists for whatever reason, you can skip this step | |||
# Craft your packet | |||
#* Optional: Save it if you need to use it more than once. Otherwise, just use <code>echo</code> and pipe it directly. | |||
# Copy or move your crafted packet to the folder you created, e.g. <code>copy packet /mnt/radio/1149</code> or <code>echo ... ^ /mnt/radio/1149/packet</code> | |||
If it worked, the packet you crafted should automatically be sent out by the radio. You can use the Packet Sniffer program on your [[PDA]] to confirm. | |||
== Radio Frequencies == | |||
Basically everything you can spoof (aside from PDA messages) will require a <code>address_1</code> field, indicating the target of the message. | Basically everything you can spoof (aside from PDA messages) will require a <code>address_1</code> field, indicating the target of the message. | ||
Line 29: | Line 81: | ||
<code>sender</code> is added automatically to almost every packet-sending device, though apparently you can get away without one by manually crafting a signal and using a wireless computer's free mode (with greatly reduced range) | <code>sender</code> is added automatically to almost every packet-sending device, though apparently you can get away without one by manually crafting a signal and using a wireless computer's free mode (with greatly reduced range) | ||
=== 114.9 - [[PDA]]s === | |||
Packets: | Packets: | ||
Line 42: | Line 94: | ||
* And more! | * And more! | ||
=== 141.1 - Doors === | |||
Doors have a really short brodcast range (± 5 tiles?) so you'll have to be close to ping them. You can sniff packets if you click on a door (or someone else does), or just ping and try to pick the right one from the list. | Doors have a really short brodcast range (± 5 tiles?) so you'll have to be close to ping them. You can sniff packets if you click on a door (or someone else does), or just ping and try to pick the right one from the list. | ||
Packet Sniffing details: | Packet Sniffing details: | ||
* TBD | * <code>user_id</code>: Person whose ID was used (e.g. <code>pubbiejones</code>) | ||
* <code>door_status</code>: State the door is in (e.g. <code>open</code>, <code>closed</code>) | |||
* <code>lock_status</code>: State of the door bolts (e.g. <code>locked</code>, <code>unlocked</code>) | |||
* <code>tag</code>: TBD? | |||
Packet spoofing: | Packet spoofing: | ||
* <code>command</code>: One of the following: | |||
* | |||
** <code>open</code>: Opens a door | ** <code>open</code>: Opens a door | ||
** <code>close</code>: Closes a door | ** <code>close</code>: Closes a door | ||
Line 59: | Line 114: | ||
** <code>secure_close</code>: Bolts a door closed* | ** <code>secure_close</code>: Bolts a door closed* | ||
<small>*Used by the [[Syndicate Items#EMAG|cryptographic sequencer]]</small> | <small>*Used by the [[Syndicate Items#EMAG|cryptographic sequencer]].</small> | ||
=== 143.7 - Fire Alarms === | |||
Packet Sniffing: | |||
* <code>zone</code>: Fire alarm's location (e.g. <code>Head of Research's Office</code>) | |||
* <code>type</code>: Alert type (e.g. <code>Fire</code>) | |||
* <code>netid</code>: Fire alarm's network address? | |||
* <code>alert</code>: Alert type (e.g. <code>fire</code>, <code>reset</code>, maybe more?) |
Revision as of 23:38, 16 June 2014
I'd like to make this into a more detailed page at some point, but for now I'm just infodumping what I have.
Until then, here's a basic guide to abusing the station network:
Wired Network
TODO. Need to go into this more, explain what devices are on the network, etc etc.
Unlike the other page(s) that says there are several different station networks, everything is on one big network now. There are still separate ones out in space (like on Hemera VII and some telescience areas) though.
Things you can do!
- Connect to the AI (
MAINFRAME_AI
) for a direct chat line! Only people who have an active packet sniffer will be able to see what you're doing (and the likelihood of that is exceedingly rare) - Connect to the communications array to download that security report you hear about at the start of rounds! It's useless but it might make a good hat if you print it out
- Send out radio packets from the mainframe radio using only DWAINE! (The existing guide leaves out that you have to
mkdir /mnt/radio/XXXX
before you can pipe to that frequency) - And more! Stick a packet sniffer onto a data terminal somewhere and go nuts.
Types of networked devices
TODO
Creating packets
Packets can be created by using the following command:
echo field=value|nfield2=value2|nfield3=value3
To store the packet as a file on the mainframe:
echo ... ^ /home/pjones/filename
To send a file (like a packet!) to your terminal, so you can send it with file_send
or print it with file_print
, save the file to the /mnt/term
directory:
cp /home/pjones/filename /mnt/term/x
If you just need to get the file right away, you can simply save the file in /mnt/term
right away:
echo ... ^ /mnt/term/foo
Spoofing the login packet
Faking a login involves a few specific steps. You'll generally always need a valid ID of any kind to do the initial login, though.
- Log into the mainframe (insert your card and
term_login
) - Craft a login packet
- Send the crafted packet back to your terminal
- Either enter
su
for admin rights, or disconnect and reconnect to log in as a completely different user - Instead of using
term_login
, usefile_send
to send the packet you saved earlier - You are now logged in with your forged user
The login packet looks like this:
registered=Pubbie Jones
assignment=Staff Assistant
access=
, followed by a (semicolon? comma?)-separated list of rights -- every access in the ID computer has a different one. The important one forsu
access is 11
Applying all of the above to create the packet and register it for file_send
:
echo registered=Pubbie Jones|nassignment=Hacker|naccess=11 ^ /mnt/term/loginpacket
Keep in mind that you shouldn't use this to set the Guardbuddies to purge or other destructive things unless you're a traitor!
Sending packets using the mainframe's radio
You can use DWAINE to send out packets over the air. The mainframe's radio has a limited range, though, so it won't reach everything.
- Create a directory for the frequency you want to transmit on. Directories are the four numbers without the decimal point, e.g.
/mnt/radio/1149
for 114.9, by using the commandmkdir /mnt/radio/1149
- If the directory already exists for whatever reason, you can skip this step
- Craft your packet
- Optional: Save it if you need to use it more than once. Otherwise, just use
echo
and pipe it directly.
- Optional: Save it if you need to use it more than once. Otherwise, just use
- Copy or move your crafted packet to the folder you created, e.g.
copy packet /mnt/radio/1149
orecho ... ^ /mnt/radio/1149/packet
If it worked, the packet you crafted should automatically be sent out by the radio. You can use the Packet Sniffer program on your PDA to confirm.
Radio Frequencies
Basically everything you can spoof (aside from PDA messages) will require a address_1
field, indicating the target of the message.
sender
is added automatically to almost every packet-sending device, though apparently you can get away without one by manually crafting a signal and using a wireless computer's free mode (with greatly reduced range)
114.9 - PDAs
Packets:
- TODO
- Really easy to scan, the Network Tools cartridge defaults to this freqency
- Snoop on people trying to use PDAs to covertly message people!
Just be sure to get your ID switched to "NSA Operative" firstClear the log regularly so it doesn't clog up with PDA pings.
Packet spoofing:
address_1
: Needed if you're targeting one PDA, otherwise it's a mass broadcast to every PDAcommand
: Generallytext_message
, though there are others (TODO)message
: The text you want to send. Surprise!sender_name
: What the name should show up as. Leaving it blank will make PDAs show it as !UNKNOWN! (or something close)- And more!
141.1 - Doors
Doors have a really short brodcast range (± 5 tiles?) so you'll have to be close to ping them. You can sniff packets if you click on a door (or someone else does), or just ping and try to pick the right one from the list.
Packet Sniffing details:
user_id
: Person whose ID was used (e.g.pubbiejones
)door_status
: State the door is in (e.g.open
,closed
)lock_status
: State of the door bolts (e.g.locked
,unlocked
)tag
: TBD?
Packet spoofing:
command
: One of the following:open
: Opens a doorclose
: Closes a doorlock
: Drops the door boltsunlock
: Raises the door boltssecure_open
: Bolts a door open*secure_close
: Bolts a door closed*
*Used by the cryptographic sequencer.
143.7 - Fire Alarms
Packet Sniffing:
zone
: Fire alarm's location (e.g.Head of Research's Office
)type
: Alert type (e.g.Fire
)netid
: Fire alarm's network address?alert
: Alert type (e.g.fire
,reset
, maybe more?)