Hack the FBI
N/A
PC

Hack the FBI

Released: Dec 31, 2018
Genres:
Puzzle Role-playing (RPG) Squad Management Stealth Strategy
Themes:
Indie Thriller
Game Modes:
Single player
Description from Steam STEAM

A short, tightly scripted hacking adventure revolving around the dangers of power and the vulnerable technology of our modern society. Recruit a team of hackers to save your brother from a vindictive prosecutor, and discover a secret agenda with a global reach.

The game has 20+ beautifully rendered characters, each with their own flaws and motivations. Chat in chatrooms and over instant messenger, snoop on private emails and calendar appointments, scrutinize web browsing habits and purchase histories; NPCs are complete characters, each with explorable computers and visible activities.

A shy analyst struggling not to be labeled by her gender meets a stoic Russian developer trying to make an honest living surrounded by the black market... a manipulative enforcer that cares less about ideology and more about bending others to her will...

A vicious federal prosecutor is railroading your brother with spurious charges. What is he really after? Who is funding the hacker collective that has taken up your brothers case?

There is a core scripted story that spans your brothers desktop to the corridoors of power. Subtle influence and hidden agendas give way to direct action and difficult choices. . Reveal new layers of the story with subsequent NewGame+ playthroughs. As the main story is exposed, threads are left behind for the player to pull and explore at their own pace.

There are many ways to spend time in the game. Explore a hacked system, puzzle and plan over how to locate and infiltrate target, or hang out out and listen to hacker NPCs chatting. But specifically when it comes to hacking a target, there is a sequence that will always occur in some form:

Exploration

Exploration and deduction are large parts of the game. Besides the pure fun of snooping around someone elses digital life, key clues can be discovered that reveal new servers or attack avenues. For example, discovering an email address of "sales@hyperion.net" means not only is there a server at to be investigated, but its probably running a mail server which can potentially be bruteforced, with the username "sales". This kind of passive exposition is a goal of the game, rather than feeding information to the player line by line.

A second aspect of exploration is the reconaissance of a server prior to attacking. Once a target is located, its ports must be scanned to enumerate its running services. A more aggressive scan will also list the versions of the different software running. Cross-reference running services with known exploits to find a way in, or if there are no known exploits, you might have to open up your fuzzer analyzer to try and discover a new zero-day exploit. But always ask around the darknet markets first to see if you can buy your way in, either through stolen credentails, or an upgraded version of a hacking program.

Attacking

The actual attacks are not the focus of the game, but when executing a hack, different attacks take the form of puzzles and minigames. Once inside, depending on different factors like your method of intrusion, your skill in the minigame, target defenses, etc, an active trace may have been triggered, in which case you'll need to work quickly to do what you need to do before time runs out. Only the most skilled hackers can infiltrate the top systems undetected.

Spending resources

A great designer once described gameplay as "a series of interesting decisions". How you spend your resources should be part of the fun.
Resources can be:
  • Hardware power (CPU cycles, network bandwidth)
  • Money
  • Time
  • Exploit visibility
Is it more valuable to enlist a compromised server into your botnet, or nuke it to preseve the secrecy of the exploit you used to capture it? Should you devote your processor to mining cryptocurrency, or put it to work cracking passwords? Are you skilled enough at a certain minigame, or should you buy an upgraded version of the software that has auto-solve features? Which targets should you attack first? Is it worth it to leave a calling card at the site of an attack to build your hacker reputation and attract top talent? Or do you prefer to cloak yourself in secrecy and anonymity?

Personal computers

Average user PCs won't have many powerful services running, however they almost always contain valuable things like bank account details and juicy personal secrets. To get in you'll need to leverage your malware and phishing skills.

Corporate systems

Companies protect their secrets well, due to their valuable nature. Firewalls, antivirus, and active intrusion detection systems are all formidable obstacles to even highly skilled hackers, and their system administrators rarely fall for social engineering. For these advanced environments, you'll need a combination of pure technical skills and raw firepower.

Other services

Some servers offer useful things such as email, web hosting, or other support services. While they may not hold monetary value, the user accounts they contain can often be cracked to unmask a targets password, which can be used on more important or secure systems. Not to mention getting file access to all the emails the server holds! Additionally, these machines often have high-spec hardware, a valuable addition to any botnet.


Vulnerability scanning

Portscan a target to enumerate its running services, or aggressively interrogate it to determine their versions.. then browse your collection of exploits for a match, or use what you find to research a new exploit.

Fuzzer

Analyze programs for previously undiscovered zero-day vulnerabilities. Trade time and CPU capacity for powerful new attack vectors.

Bruteforce

An improperly configured target will allow rapid, semi-random login attempts.. given enough time (and bandwidth) the correct credentials can eventually be guessed!

Log deletion

Don't get backtraced! Remember to clear out any logs that might reveal your connection information. Easily automated via a script, or even better, use root access to disable logging outright.

Malware

Craft your own malware with a custom payload! Discreetly kill a crucial process, extract a valuable file, or wipe out their entire OS. Add-on modules like packers can sneak your shellcode past antivirus scanners, and stealth modules like log deleters cover your tracks.

Proxies

Every hacker needs a network of compromised devices to bounce their connection through.

Botnet

Every server you hack can be added to your network of compromised devices. Bandwidth is especially useful for distributed attacks and cryptocurrency mining.

Address book

Keeps track of who, what, where. Automatically stores interesting things like:
  • Server addresses (and their portscan results)
  • Known identities (not necessarily persons)
  • Account credentails

Antivirus

Scans files for malware. Keeps you safe, but presence on a target will hinder your own attacks.
Can be process-killed, or evaded with a certain cleanroom stealth module.

Background

Rotate through cool backgrounds befitting an leet hax0r such as yourself. Move your own images into the right folder (IRL) and use them in the game!

Beacon

You can only fight enemies you can see; get a target to run this and it'll phone home, giving you an address to attack.

Browser

Browse the information superhighway, graphically.

Bruteforce

No password? No problem! Force your way in via services like SSH (port 22), SMTP (port 25), or even web page auth (port 80).

Chatroom

Chat with AI hackers, stroke moderator egos, maybe get an invite into the password protected back room.

Cleanroom

Use this command-line malware lab to build your own executable: choose a payload, crypter, and stealth module. Advanced players can write their own shellcode for ultimate pwnage.

Clock

Important for synchronizing attacks with other hackers, pulling off exploits with narrow execution windows, and reminding yourself how little sleep you're about to get.

Decrypter

Important files are sometimes encrypted.. but not for long. Graphical minigame to clear memory blocks and help along the decryption process.

EmailClient

Send, receive, read emails and attachments.

Fuzzer

Don't have an exploit for a target? If you can get a copy of the executable (or even better, the sourcecode) the fuzzer will automatically analyze it for potential vulnerabilities.

HardwareMonitor

Keep track of processor usage, bandwidth, and memory capacity. An unexpected spike might indicate you've been compromised...

Messenger

Aim to chat with your infosec peeps one on one. Can transfer files. No emojis.

Journal

Display currently active tasks, sidequests, and notes.

MailServer

Listens for SMTP traffic on a domain. Compromise this and get access to a massive trove of communications.

Malware

Broad, abstract category for any program that contains a malicious payload. Payloads can be shellcode scripts, other executables, or simple files that need to be deposited on a target.

MusicPlayer

Any good hacker needs a hacking soundtrack.

NewsScroller

Get the latest news delivered to your desktop in a minimally intrusive way. Keep up on world developments, and maybe see what you've done in the latest headlines.

NMap

Recon a target by finding out what other servers are in its network.

OS

Where the magic happens. The one process you really don't want to kill.

Phisher

Disguise emails as coming from within a targets social circle. Crucial to getting malware executables into a machine and running.

SQL Server

Stores data. Interrogate and retrieve with real SQL commands!

SSHClient

Connect to other computers with (or without) the right password.

SSHServer

Allows incoming connections from other computers and gives local access privileges.

Terminal

Some programs only accept command line input, with no GUI. Advanced players might choose the terminal over a GUI for speed.

Text Editor

For editing text, duh.

Tutorial Launcher

Run different tutorial programs that teach broad concepts or specific programs.

Vulnerability Scanner

An aggressive port scanner, cross references running services with a database of known vulnerabilities.

Wallet

Put your processor to work mining cryptocurrency, which can be traded for goods and services.

Webserver

Listens on port 80 for web requests to serve up.


Can I play this even if I'm not great at computers?
Of course! This is a VIDEOGAME first, and hacking game second. There will be tutorials for different aspects of the game. But you'll still have to get good.

Do I need to know programming/is this a programming game?
This is not a programming game, but some aspects of it do use limited SQL, as well as the ability to write your own shellcode scripts, but the game can still be won without mastering these things.


Reminder that this game is in its unfinished form! With any luck, a lot will change between now and when its finally released. But until then, remember that there will be:
  • bugs
  • unfinished features
  • missing content
  • balance problems
  • everything else that goes with a game thats currently in development
ONLY buy the early access version if you want to actively support its developer and help shape the game!

Description from IGDB IGDB

Deception is an art, and you've been given your brush.

Basic Info
Release Date: December 31, 2018
IGDB ID: 29702
Additional Information
Release Date: December 31, 2018
IGDB ID: 29702
Платформы 1
PC
Genres 5
Puzzle Role-playing (RPG) Squad Management Stealth Strategy
Themes 2
Indie Thriller
Game Modes 1
Single player
No Companies Available

Company information for this game hasn't been loaded yet.

Keywords
game 38048 be 24685 world 21802 play 21097 player 17513 new 16891 character 16396 feature 15873 release 15455 use 15100 adventure 14593 story 14536 make 14384 take 14371 time 14243 action 13662 find 12717 explore 12690 enemy 12654 fight 12555 series 12332 own 11404 out 10969 system 10915 power 10813 way 10761 different 10679 include 10330 build 9952 skill 9888 get 8930 know 8866 life 8747 choose 8556 item 8079 help 7417 powerful 7251 even 7236 discover 7020 come 6746 attack 6701 need 6461 live 6448 change 6378 secret 6119 open 5990 magic 5965 complete 5898 choice 5875 upgrade 5814 allow 5778 window 5708 team 5676 save 5646 run 5583 back 5559 work 5542 give 5523 person 5466 day 5439 force 5284 long 5276 main 5210 good 5205 art 5167 craft 5161 large 5148 hide 5103 real 5094 high 5081 great 5034 Master 5026 see 4996 call 4960 try 4901 part 4896 version 4816 move 4755 late 4742 puzzle 4717 want 4676 key 4635 meet 4550 keep 4499 leave 4474 offer 4231 environment 4205 add 4173 home 4136 content 4086 strong 4050 support 3943 form 3853 ally 3773 resource 3768 focus 3761 solve 3705 class 3554 list 3530 group 3460 fall 3450 simple 3432 development 3412 right 3405 exploration 3323 plan 3270 future 3254 don 3245 happen 3229 thing 3191 kill 3118 advance 3104 write 3097 access 3054 computer 3048 reach 2990 limit 2924 fun 2904 decision 2900 task 2855 mean 2833 developer 2754 goal 2685 company 2670 contain 2660 always 2615 port 2591 card 2580 ultimate 2561 certain 2555 command 2550 soundtrack 2550 hold 2515 history 2451 steam 2446 put 2443 trade 2411 receive 2372 enough 2329 protect 2311 buy 2268 pace 2263 danger 2258 store 2249 combination 2248 line 2225 purchase 2223 short 2217 kind 2191 depend 2190 direct 2165 match 2154 book 2151 send 2134 share 2133 detail 2132 determine 2125 top 2105 recruit 2060 memory 2041 occur 2035 technology 2030 defense 2017 course 2015 balance 2005 interest 2001 specific 1977 difficult 1962 modern 1957 room 1946 attempt 1933 NPC 1920 addition 1906 hardware 1864 spend 1858 entire 1824 random 1777 reveal 1757 influence 1756 local 1748 massive 1716 money 1707 core 1697 digital 1688 track 1683 capture 1658 speed 1651 currently 1619 ai 1615 mine 1609 result 1599 hack 1580 serve 1580 clear 1557 important 1492 struggle 1479 machine 1465 aim 1455 note 1446 software 1429 personal 1426 remember 1407 steal 1379 extra 1358 due 1356 information 1343 quickly 1319 research 1313 example 1281 user 1281 collection 1254 device 1242 custom 1237 safe 1220 target 1214 background 1210 social 1206 deliver 1199 cover 1198 activity 1189 nature 1177 process 1175 connect 1170 investigate 1165 service 1162 display 1138 charge 1130 maybe 1122 surround 1096 market 1095 block 1093 trigger 1078 clue 1075 eventually 1070 highly 1070 obstacle 1065 rather 1063 active 1054 case 1048 problem 1026 value 1006 potential 991 valuable 977 cross 945 page 944 stealth 941 talent 941 text 941 read 934 aspect 932 unexpected 930 brother 904 cycle 896 invite 896 host 880 someone 879 ask 871 global 866 program 840 previously 832 locate 821 sleep 818 care 817 auto 811 concept 802 automatically 799 network 778 society 765 data 763 image 740 connection 725 server 720 formidable 715 useful 699 revolve 695 layer 694 chat 669 cool 669 pull 669 passive 667 span 667 accept 659 easily 645 sale 645 describe 643 prefer 634 bug 629 web 622 render 619 exploit 614 zero 613 method 604 designer 601 listen 599 reputation 585 pure 580 execute 575 sequence 567 worth 554 distribute 538 engineer 531 secure 530 input 529 editor 526 phone 525 additionally 523 identity 518 especially 516 teach 498 hang 495 crucial 494 copy 492 account 491 attract 479 root 470 prior 464 file 462 bend 458 sneak 446 script 443 beautifully 441 retrieve 440 transfer 430 evade 417 skilled 413 height 412 category 411 news 411 asset 409 fund 407 presence 407 raw 404 tutorial 390 minigame 388 actual 384 reference 384 private 377 wipe 377 log 364 semi 353 vicious 351 aggressive 346 russian 344 mention 343 communication 340 lab 340 gender 339 circle 335 clock 332 factor 329 technical 324 correct 322 probably 317 label 312 crack 311 site 311 subsequent 305 average 298 infiltrate 298 automate 293 specifically 292 trace 283 besides 282 edit 279 corporate 275 spike 275 module 270 bank 267 instant 265 rotate 263 expose 257 motivation 257 potentially 257 extract 255 disable 254 domain 252 visible 251 graphical 248 broad 239 browser 229 incoming 226 journal 225 rapid 222 launcher 215 vulnerable 212 thread 203 capacity 197 guess 197 indicate 197 usage 195 execution 182 enlist 181 net 179 tag 179 desktop 176 email 175 analyze 174 hind 174 hacker 169 firepower 168 deception 166 devote 166 subtle 166 agenda 163 disguise 158 leverage 155 bounce 152 scan 150 con 146 terminal 146 mail 144 configure 135 traffic 135 honest 134 address 131 cloak 127 rarely 126 beacon 125 shy 125 collective 123 interrogate 117 abstract 115 flaw 115 calendar 112 folder 111 attachment 108 browse 108 detection 104 narrow 104 remind 104 black market 100 malicious 100 password 98 habit 96 cpu 94 tightly 92 brush 89 spec 89 messenger 84 deposit 83 visibility 81 deduction 75 juicy 75 undiscovered 67 enforcer 65 necessarily 65 compromise 61 ideology 61 vulnerability 59 privilege 58 http 57 administrator 56 trove 56 avenue 54 vector 53 stroke 52 outright 48 synchronize 48 scanner 47 federal 46 ego 45 stoic 45 wallet 42 nuke 41 railroad 41 secrecy 40 gui 39 unmask 39 aggressively 37 decryption 36 undetected 34 executable 33 monetary 32 processor 31 graphically 29 width 25 headline 23 manipulative 23 appointment 20 hyperion 20 firewall 19 intrusive 19 snoop 19 intrusion 18 chatroom 16 exposition 16 peep 15 analyst 14 payload 14 prosecutor 14 proxy 12 befit 10 discreetly 10 deletion 9 bandwidth 7 credential 7 vindictive 6 anonymity 5 enumerate 3 superhighway 2 analyzer 0 like 0 moderator 0 scrutinize 0