Exploit (video game)

Last updated
Exploit
Exploit Logo.png
Developer(s) Gregory Weir
Platform(s) Browser game
ReleaseDecember 2008
Genre(s) Puzzle

Exploit is a Flash browser game by Gregory Weir. It was published in December 2008. [1] As of October 2011, Exploit has been played over 700,000 times. [1]

Contents

Gameplay

Each level consists of a rectangular grid with different elements (nodes) in some of the squares. The player controls orange "ports" which shoot "packets" into the grid. The different elements react to the packets in different ways. The goal is to hit one of the green "Root Nodes" in each level, though most levels have got only one Root Node. The other elements are red "Blocker Nodes", purple "Divider Nodes", yellow "Buffer Nodes", blue "Directory Nodes", cyan "Latch Nodes", white "Port Knock Keys" and lines connecting Buffer Nodes to Blocker Nodes. In each chapter, you can use one Distributed Denial of Service (DDOS). If a chapter is too difficult, the DDOS lets you skip this level.

Apart from the story mode, there is a tutorial, a challenge mode, and a puzzle editor. Users can publish levels made with the editor. The main game (story mode) consists of three chapters, with over 50 levels. Between the levels, you get e-mails, by a character named "sk3tch" and other sources. The events of the story are set to the fictive dictatorship "Locha", Los Angeles and Charlotte, North Carolina (Gregory Weirs hometown).

Plot

The main character, a computer security cracker, get an e-mail from one of his friends using the nickname "sk3tch". He is asked to break into the computer network of the nation Locha, a fictive military junta with a resemblance to Myanmar, as a test for his hacking skills. While drilling deeper into Locha's firewalls, the player discovers that a famous Lochan blogger and political activist, Li Yolei, has been recently arrested and awaits execution for "trahison and Western propaganda." Using their skills, sk3tch and the player manage to free him and his cellmate Gadao Koi, another inmate in death row for suspected terrorism, and to have them board a plane to Los Angeles; but as soon as they land in American soil, the FBI arrest and send them to the Camp Zulu detention camp on one of the Florida Keys (which opened after the closure of Guantanamo Bay), suspecting them to be terrorists as the relation between Locha and the United Nations becomes sour.

The player manages to free the two prisoners and send them to sk3tch's house by bus, only to find that only Yolei arrived. After some research, sk3tch discovers that Gadao was a Lochan spy, who used Li's evasion to get into America for an unknown purpose. It is later found that his goal is to commit a terrorist attack on the headquarters of Ameribank, a multinational bank located in Charlotte, by using thermite bombs. Gadao also hacked the central server of Charlotte's fire and emergency department to delay any help, to maximize the damage and casualties of the attack. While sk3tch warns the FBI, the player manages to fix the fire department system, warn security about Gadao (who is already in the building, disguised as a delivery boy) and traps him in an elevator when cornered by the FBI and security. Gadao accidentally kills himself by using thermite to break through the elevator, which catches fire and burns him to death.

After finding documents about the true goal of Gadao, the US decides to grant American citizenship to Li, and when the UN decides of new sanctions against Locha, sk3tch and the player celebrate their victory by discussing new targets to hack for the good cause.

Reception

Kyle Moore of Jay is Games stated "...this is going to be a good year for both Weir and all of us who enjoy great games." [2] Michael Rose of IndieGames.com stated Exploit is "...a great little game..." which initially appears complicated, but leaves the player feeling "...rather clever from figuring it out." [3] Tom Fronczak of Destructoid praised Exploit as "...one hell of a fulfilling flash game", describing the game's music as "decent" and highlighting the option for players to create their own levels. Despite this he stated that the style of game has been seen before, but that the plot sets it apart since it contains internet-derived humor while maintaining focus on "...the serious topic of net censorship." [4]

Related Research Articles

<span class="mw-page-title-main">Buffer overflow</span> Anomaly in computer security and programming

In programming and information security, a buffer overflow or buffer overrun is an anomaly whereby a program writes data to a buffer beyond the buffer's allocated memory, overwriting adjacent memory locations.

<span class="mw-page-title-main">Denial-of-service attack</span> Type of cyber-attack

In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. The range of attacks varies widely, spanning from inundating a server with millions of requests to slow its performance, overwhelming a server with a substantial amount of invalid data, to submitting requests with an illegitimate IP address.

<span class="mw-page-title-main">Transport layer</span> Layer in the OSI and TCP/IP models providing host-to-host communication services for applications

In computer networking, the transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet protocol suite and the OSI model. The protocols of this layer provide end-to-end communication services for applications. It provides services such as connection-oriented communication, reliability, flow control, and multiplexing.

Agobot, also frequently known as Gaobot, is a family of computer worms. Axel "Ago" Gembe, a German programmer also known for leaking Half-Life 2 a year before release, was responsible for writing the first version. The Agobot source code describes it as: “a modular IRC bot for Win32 / Linux”. Agobot was released under version 2 of the GNU General Public License. Agobot is a multi-threaded and mostly object oriented program written in C++ as well as a small amount of assembly. Agobot is an example of a Botnet that requires little or no programming knowledge to use.

Homebrew, when applied to video games, refers to software produced by hobbyists for proprietary video game consoles which are not intended to be user-programmable. The official documentation is often only available to licensed developers, and these systems may use storage formats that make distribution difficult, such as ROM cartridges or encrypted CD-ROMs. Many consoles have hardware restrictions to prevent unauthorized development.

<i>Hacking: The Art of Exploitation</i> 2003 book by Jon "Smibbs" Erickson

Hacking: The Art of Exploitation (ISBN 1-59327-007-0) is a book by Jon "Smibbs" Erickson about computer security and network security. It was published by No Starch Press in 2003, with a second edition in 2008. All of the examples in the book were developed, compiled, and tested on Gentoo Linux. The accompanying CD provides a Linux environment inclusive of all tools and examples referenced in the book.

Cheating in video games involves a video game player using various methods to create an advantage beyond normal gameplay, usually in order to make the game easier. Cheats may be activated from within the game itself, or created by third-party software or hardware. They can also be realized by exploiting software bugs; this may or may not be considered cheating based on whether the bug is considered common knowledge.

Michael Gregory Hoglund is an American author, researcher, and serial entrepreneur in the cyber security industry. He is the founder of several companies, including Cenzic, HBGary and Outlier Security. Hoglund contributed early research to the field of rootkits, software exploitation, buffer overflows, and online game hacking. His later work focused on computer forensics, physical memory forensics, malware detection, and attribution of hackers. He holds a patent on fault injection methods for software testing, and fuzzy hashing for computer forensics. Due to an email leak in 2011, Hoglund is well known to have worked for the U.S. Government and Intelligence Community in the development of rootkits and exploit material. It was also shown that he and his team at HBGary had performed a great deal of research on Chinese Government hackers commonly known as APT. For a time, his company HBGary was the target of a great deal of media coverage and controversy following the 2011 email leak. HBGary was later acquired by a large defense contractor.

<i>Warriors: Legends of Troy</i> 2011 video game

Warriors: Legends of Troy, released in Japan as Troy Musou, is a video game for the PlayStation 3 and Xbox 360 games consoles set during the Trojan War. The game was developed by Koei Canada and is published by Tecmo Koei. While having a Warriors title, this game differs from the Dynasty Warriors series as it features a greater level of graphic violence. The game had a scheduled release date of Q4 2010 in all regions but was pushed back to Q1 2011 after Koei's announcement during Tokyo Game Show 2010.

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.

<span class="mw-page-title-main">Low Orbit Ion Cannon</span> Open source network stress testing and denial-of-service attack application

Low Orbit Ion Cannon (LOIC) is an open-source network stress testing and denial-of-service attack application written in C#. LOIC was initially developed by Praetox Technologies, however it was later released into the public domain and is currently available on several open-source platforms.

<span class="mw-page-title-main">Operation Payback</span> Series of cyberattacks conducted by Anonymous

Operation Payback was a coordinated, decentralized group of attacks on high-profile opponents of Internet piracy by Internet activists using the "Anonymous" moniker. Operation Payback started as retaliation to distributed denial of service (DDoS) attacks on torrent sites; piracy proponents then decided to launch DDoS attacks on piracy opponents. The initial reaction snowballed into a wave of attacks on major pro-copyright and anti-piracy organizations, law firms, and individuals. The Motion Picture Association of America, the Pirate Party UK and United States Pirate Party criticised the attacks.

<i>Dungeon Defenders</i> 2010 video game

Dungeon Defenders is a hybrid multiplayer video game developed by Trendy Entertainment that combines the genres of tower defense and action role-playing game. It is based on a showcase of Unreal Engine 3 named Dungeon Defense. The game takes place in a fantasy setting where players control the young apprentices of wizards and warriors and defend against hordes of monsters. A sequel titled Dungeon Defenders II was released in 2015.

CommView is an application for network monitoring, packet analysis, and decoding. There are two editions of CommView: the standard edition for Ethernet networks and the wireless edition for 802.11 networks named CommView for WiFi. The application runs on Microsoft Windows. It is developed by TamoSoft, a privately held New Zealand company founded in 1998.

Lizard Squad Hacker group

Lizard Squad was a black hat hacking group, mainly known for their claims of distributed denial-of-service (DDoS) attacks primarily to disrupt gaming-related services.

<i>Monaco: Whats Yours Is Mine</i> 2013 stealth video game

Monaco: What's Yours Is Mine is a 2013 stealth video game developed by Pocketwatch Games in which players, alone or cooperatively, perform heists and robberies. Players choose from eight characters, each of whom has a unique and beneficial skill, such as the ability to change appearance or tunnel through walls. Monaco's single-player story is told in four acts from perspectives of different characters. The cooperative mode lets up to four players play together in different locations.

Mirai is malware that turns networked devices running Linux into remotely controlled bots that can be used as part of a botnet in large-scale network attacks. It primarily targets online consumer devices such as IP cameras and home routers. The Mirai botnet was first found in August 2016 by MalwareMustDie, a white hat malware research group, and has been used in some of the largest and most disruptive distributed denial of service (DDoS) attacks, including an attack on 20 September 2016 on computer security journalist Brian Krebs' website, an attack on French web host OVH, and the October 2016 Dyn cyberattack. According to a chat log between Anna-senpai and Robert Coelho, Mirai was named after the 2011 TV anime series Mirai Nikki.

Data center security is the set of policies, precautions and practices adopted at a data center to avoid unauthorized access and manipulation of its resources. The data center houses the enterprise applications and data, hence why providing a proper security system is critical. Denial of service (DoS), theft of confidential information, data alteration, and data loss are some of the common security problems afflicting data center environments.

Superhot: Mind Control Delete is an independent first-person shooter (FPS) video game developed and published by Superhot Team. It is a sequel to Superhot, and expands on the game mechanics by utilizing roguelike elements.

References

  1. 1 2 "Release date: 2009-03-04". Archived from the original on 2011-11-07. Retrieved 2011-10-30.
  2. Moore, Kyle (2009-03-04). "Exploit". Jay is Games. Archived from the original on 2011-11-07. Retrieved 2011-11-07.
  3. Rose, Michael (2009-03-05). "Browser Game Pick: Exploit (Gregory Weir)". IndieGames.com. Archived from the original on 2012-08-26. Retrieved 2011-11-07.
  4. Fronczak, Tom (2009-11-02). "Monday Mind Teasers: Exploit". Destructoid. Archived from the original on 2011-08-23. Retrieved 2011-11-07.