Street Hacker

Last updated
Street Hacker
Developer(s) VirtuWeb Interactive
Publisher(s) VirtuWeb Interactive
Designer(s) VirtuWeb Interactive
Platform(s) Windows
ReleaseFebruary 13, 2004
Genre(s) Simulation
Mode(s) Single player

Street Hacker is a hacking simulator game developed by VirtuWeb Interactive. Unlike other hacking simulation games, the in-game engine is made to appear more like an actual computer system similar to the Linux OS/Shell.

Contents

Plot

In Street Hacker, the player assumes the role of a hacker who is approached by a crude executive and entrepreneur, Demetrius Mordecai. He sees you as a person with a strong analytical mind, keen intuition and a desire for power. Having no money at your disposal, he hires you as a hacker to do his dirty work. Vince, his chief of operations, helps you get started and accustomed to the game. Being as successful as he is, Demetrius has made quite a few enemies in the corporate world. This is evident by the first few missions he assigns you to, missions in which you are required to disrupt these corporations by sabotaging their servers. Once these missions are completed, Demetrius decides to "retire" you by calling in an anonymous tip to the FBI about who was behind the attacks. Quickly responding, the FBI surrounds your apartment and finds enough evidence to put you away for 4 years.

Federal Bureau of Investigation governmental agency belonging to the United States Department of Justice

The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States, and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, the FBI is also a member of the U.S. Intelligence Community and reports to both the Attorney General and the Director of National Intelligence. A leading U.S. counter-terrorism, counterintelligence, and criminal investigative organization, the FBI has jurisdiction over violations of more than 200 categories of federal crimes.

Two years later, you are freed from prison to serve your remaining two years on parole. Vince, your mentor from the beginning, helps you get back on your feet by hooking you up with a laptop and some cash. He and many of the others who still work for Demetrius are all hoping that you can find enough dirt on him to put him away for life. Too afraid to directly betray him, they all put their support behind you.

Style

Street Hacker focuses primarily on actual forms of hacking (viruses, worms, etc.). The user is given a program with which to order these different programs so that they can perform the various missions assigned to them. Another feature to the game is the infiltration feature, where the user is required to infiltrate a building in order to hack internet access so they can accomplish the different missions that are assigned to them. Similarly to games such as Uplink, Street Hacker is heavily mission-driven, the entire main storyline being propelled by the different missions assigned. For the most part, the in-game dynamics mimic that of an actual operating system (down to the ability to execute programs and view folders). Hacking takes place in a DOS-style command prompt, using commands familiar to computer aficionado (commands such as WHOIS, CONNECT, etc.). It also allows for downloading files from the respective servers which you must connect to for missions (and in some cases for software downloads). [1]

DOS group of closely-related PC-compatible operating systems

DOS is a family of disk operating systems, hence the name. DOS primarily consists of MS-DOS and a rebranded version under the name IBM PC DOS, both of which were introduced in 1981. Other later compatible systems from other manufacturers include DR-DOS (1988), ROM-DOS (1989), PTS-DOS (1993), and FreeDOS (1998). MS-DOS dominated the x86-based IBM PC compatible market between 1981 and 1995.

WHOIS is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block or an autonomous system, but is also used for a wider range of other information. The protocol stores and delivers database content in a human-readable format. The WHOIS protocol is documented in RFC 3912.

See also

Related Research Articles

In multiplayer online games, a MUSH is a text-based online social medium to which multiple users are connected at the same time. MUSHes are often used for online social intercourse and role-playing games, although the first forms of MUSH do not appear to be coded specifically to implement gaming activity. MUSH software was originally derived from MUDs; today's two major MUSH variants are descended from TinyMUD, which was fundamentally a social game. MUSH has forked over the years and there are now different varieties with different features, although most have strong similarities and one who is fluent in coding one variety can switch to coding for the other with only a little effort. The source code for most widely used MUSH servers is open source and available from its current maintainers.

In telecommunications a link is a communication channel that connects two or more devices. This link may be an actual physical link or it may be a logical link that uses one or more physical links or shares a physical link with other telecommunications links.

Email client computer software that allows sending and receiving emails

An email client, email reader or more formally mail user agent (MUA) is a computer program used to access and manage a user's email.

In computer networking, the Name/Finger protocol and the Finger user information protocol are simple network protocols for the exchange of human-oriented status and user information.

.hack is a series of single-player action role-playing video games developed for the PlayStation 2 console by CyberConnect2 and published by Bandai. The series of four games, titled .hack//Infection, .hack//Mutation, .hack//Outbreak, and .hack//Quarantine, features a "game within a game"; a fictional massively multiplayer online role-playing game (MMORPG) called The World which does not require the player to connect to the Internet. Players may transfer their characters and data between games in the series. Each game comes with an extra DVD containing an episode of .hack//Liminality, the accompanying original video animation series which details fictional events that occur concurrently with the games.

A backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device, or its embodiment, e.g. as part of a cryptosystem, an algorithm, a chipset, or a "homunculus computer" —a tiny computer-within-a-computer. Backdoors are often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems.

<i>Uplink</i> (video game) video game

Uplink is a video game released in 2001 by the British software company Introversion Software. It is a simulator of the cinematic depiction of computer hacking.

Cheating in online games

Cheating in online games is defined as the action of pretending to comply with the rules of the game, while secretly subverting them to gain an unfair advantage over an opponent. Depending on the game, different activities constitute cheating and it is either a matter of game policy or consensus opinion as to whether a particular activity is considered to be cheating.

A programming game is a video game that incorporates elements of computer programming, enabling the player to direct otherwise autonomous units within the game to follow commands in a domain-specific programming language, often represented as a visual language to simplify the programming metaphor. Programming games broadly fall into two areas: single-player games where the programming elements either make up part of or the whole of a puzzle game, and multiplayer games where the player's automated program is pitted against other players' programs.

Remote administration refers to any method of controlling a computer from a remote location.

<i>.hack//G.U.</i> series of role-playing games

.hack//G.U. is a series of single-player action role-playing games for the PlayStation 2, developed by CyberConnect2 and published by Bandai Namco Games. The series contains three games: .hack//G.U. Vol. 1//Rebirth, .hack//G.U. Vol. 2//Reminisce and .hack//G.U. Vol. 3//Redemption. As in the previous .hack games, .hack//G.U. simulates a massively multiplayer online role-playing game as the player controls a character who starts playing it.

'Macintosh User Groups' (MUGs) are groups of people who meet both virtually and in the real world to discuss all things Mac. They exist to give and share support and advice between members. Many have regular meetings often with a presentation on a certain topic and most have regular email communication in between times. Groups are for everyone from first-time computer users to experts—from every profession, background and age are available. Many people use websites like, www.howtomac.com to discuss and engage in banter about their views on the ways of a mac. Macintosh user Groups are seen a lot on YouTube now with lots of people with millions of subscribers who concentrate their content on being about mac.

In the X Window System, the X resources are parameters of computer programs such as the name of the font used in the buttons, the background color of menus, etc. They are used in conjunction with or as an alternative to command line parameters and configuration files.

HackThisSite organization

HackThisSite.org, commonly referred to as HTS, is an online hacking and security website founded by Jeremy Hammond, with the site being maintained by members of the community after his departure. It aims to provide users with a way to learn and practice basic and advanced "hacking" skills through a series of challenges in a safe and legal environment. The organization has a user base of over 1,800,000, though the actual number of active members is believed to be much lower. The most users online at the same time was 1,995 on February 5, 2012 at 2:46:10 AM CST.

System 15000 is a 1984 video game by A.V.S. It was originally conceived, designed, and programmed by Lee Kristofferson in assembly language for the Commodore 64. Versions were later ported to the ZX Spectrum and BBC Micro, both written in BASIC. This was the first game to simulate computer hacking.

The following outline is provided as an overview of and topical guide to computer security:

DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur, an independent programmer and computer security coder from France. Although the RAT was developed back in 2008, it began to proliferate at the start of 2012. The program was discontinued, partially due to its use in the Syrian civil war to monitor activists but also due to its author's fear of being arrested for unnamed reasons. As of August 2018, the program's development "has ceased indefinitely", and downloads are no longer offered on its official website.

<i>Hacknet</i> 2015 video game

Hacknet is a 2015 video game that allows the player to perform simulated computer hacking.

Hackers is an independent strategy game developed by Trickster Arts for Android and iOS. Hackers is a cyberwarfare strategy game, and has been likened to the video game Uplink. On iOS the game has an added suffix: Hackers - Join the Cyberwar.

A web shell is a web security exploit which is a web-based implementation of the shell concept that is able to be uploaded to a web server to allow remote access to the web server, such as the web server's file system. A web shell is unique in that it enables users to access a web server by way of a web browser that acts like a command-line interface.
A user can access a remote computer via the World Wide Web using a web browser on any type of system, whether it's a desktop computer or a mobile phone with a web browser, and perform tasks on the remote system. No command-line environment is required on either the host or the client. Web shells are used as backdoors that can be accessed from the web browser. Infected web servers can be either connected to the Internet or internal to the network, where the web shell is used to infect further to internal hosts.

References

  1. "Street Hacker Synopsis".