LegendBegins is a Moderator. They assist users and keep the forum running smoothly. They have power across all forums.
Avatar of LegendBegins

Status

Recent Statuses

2 mos ago
Current @ColdAtlas PM me the headphone model? I doubt it’s a proprietary cable solution, so you can probably replace it for cheap.
3 mos ago
When did I say that? =P
4 likes
7 mos ago
The ad issue is resolved. Feel free to disable your adblocks to support the Guild!
19 likes
1 yr ago
Testing something rq
3 likes
1 yr ago
Yeah, we should. I’ll need to jump through some hoops to defeat bypasses, but that sort of thing is doable.

Bio

User has no bio, yet

Most Recent Posts

In H@ck3rz 5 yrs ago Forum: Casual Roleplay
@sassy1085

Definitely; I'm building the first IC post. Expect it this week—I'll be sure to ping all of you as well.
In H@ck3rz 6 yrs ago Forum: Casual Roleplay
@sassy1085

Hacker approved!

@Finris

Yep, feel free.
In H@ck3rz 6 yrs ago Forum: Casual Roleplay
@Katthaj

Hacker Approved!

@Finris

Hacker and InfoSec approved! Great details; it sounds like we'll be getting into some dangerous hardware vulnerabilities.

@sassy1085

Still working on the hacker or is it just the infosec professional that's left?
@Finris@sassy1085

I went ahead and created a thread for the RP. I'll wait a couple of days before starting. roleplayerguild.com/topics/177991-h-c…


Click.
Click.
Click.

...I'm in.


Cyber Attacks. Advanced Persistent Threats. Hacktivist Organizations. All of these have become a standard artifact of daily life in our digitally interconnected world. And as more systems become digitized, a certain subset of the population grows more powerful: Hackers. Threats have skyrocketed to lethally dangerous levels, to the point where a simple script kiddie has the potential to take down physical systems connected to the net. Crash trains. Pollute water treatment. Burn fuel. But fortunately, another group has risen to counter this insurgence of malicious actors. Information Security professionals, many of them ex-hackers themselves, are perpetually at work to restore order to the cyber world and stay ahead of this game of cat-and-mouse, lest those with no stake in the game obtain the power to destroy it.

Which of us haven't wondered at some point in their lives how it's really done? How hackers actually manage to break into systems? Wonder no longer. H@ck3rz is an RP that takes place in our world and engages in scenarios that are akin to what real attackers encounter and how they interact with systems across the globe. No information security or computer science experience required. Every player will generate two characters: A hacker (including hacktivists, foreign government agents, malware developers, lone wolves doing it for the lulz, etc.) and an information security professional (including penetration testers, defense specialists, compromise analysts, local government agents, etc.). The attackers cause some degree of mayhem that corresponds to their particular goals, whereas the security professionals aim to nullify efforts of malicious actors and to protect the world from their antics.

I am an information security professional IRL, and I'm more than willing to answer any questions you might have (now and throughout the RP), and I'll gladly work with you to ensure that you have a good understanding of the direction you want to take the attack/hunt and will give you any resources you'd like to carry out whatever situation you have in mind. H@ck3rz is about the players, not the GM, and in a world where cyber criminals can hit just about any system, virtually no attack is too outlandish to carry out in one way or another, be it through social engineering, exploit development, or even physically breaking into secure facilities. I have access to real attack tools and can provide anything from screenshots to software in order to ensure that your vision of your incident is fulfilled. Be prepared to solve puzzles, look for evidence, and defeat the hackers once and for all.

If you have any questions or interest, please let me know. Below I've included samples of potential scenarios and engagement locations. If you feel that you want to join, we will be beginning soon here: roleplayerguild.com/topics/177991-h-c…

Thank you.



In H@ck3rz 6 yrs ago Forum: Casual Roleplay


Click.
Click.
Click.

...I'm in.


Cyber Attacks. Advanced Persistent Threats. Hacktivist Organizations. All of these have become a standard artifact of daily life in our digitally interconnected world. And as more systems become digitized, a certain subset of the population grows more powerful: Hackers. Threats have skyrocketed to lethally dangerous levels, to the point where a simple script kiddie has the potential to take down physical systems connected to the net. Crash trains. Pollute water treatment. Burn fuel. But fortunately, another group has risen to counter this insurgence of malicious actors. Information Security professionals, many of them ex-hackers themselves, are perpetually at work to restore order to the cyber world and stay ahead of this game of cat-and-mouse, lest those with no stake in the game obtain the power to destroy it.

Every player will generate two characters: A hacker (including hacktivists, foreign government agents, malware developers, lone wolves doing it for the lulz, etc.) and an information security professional (including penetration testers, defense specialists, compromise analysts, local government agents, etc.). The attackers cause some degree of mayhem that corresponds to their particular goals, whereas the security professionals aim to nullify efforts of malicious actors and to protect the world from their antics. Every hacker can be stationed at anywhere in the world, while the professionals are either based in America or travel to the same location. Every scenario is akin to what real attackers encounter and how they interact with systems across the globe.

I am an information security professional IRL, and I'm more than willing to answer any questions you might have and I'll gladly work with you to ensure that you're prepared to take the attack/hunt in the direction you want it to go and I'll give you any resources you'd like to carry out the situation you have in mind. H@ck3rz is about the players, not the GM, and in a world where cyber criminals can hit just about any system, virtually no attack is too outlandish to carry out in one way or another, be it through social engineering, exploit development, or even physically breaking into secure facilities. I have access to real attack tools and can provide anything from screenshots to software in order to ensure that your vision of your incident is fulfilled.





Character Sheet Template (feel free to modify however you think is best):

Class
Hacker/InfoSec
Handle
NibbleOverfl0w (Screen name/username)
Name
U.N.K.N.O.W.N. (Hackers may have names if well known, InfoSec agents will have names, but they might be fake)
Origin
Country (If known)
Organizations
Dragon's Scythe (If the hacker is a part of a hacking group or other team, put it here. The InfoSec agent will most likely work for a company or be a freelancer)
Known Details
Place personal history or personality details about the individual. InfoSec agents may have a life, a family, hobbies, etc. Hackers may have the same and it's up to you whether to keep those secret, but they'll likely have some sort of known personality among online friends.
Avatar



Again, feel free to modify it to suit you. Since you're making two of them, they don't have to be abhorrently long, just reasonably enough to get the details across.
interest


Wonderful! Let me know if you have any questions.
That first image in Engagement Samples is a real site—I have some queries that can get anyone unrestricted access to real life security camera footage (which I won't post here out of respect for privacy, even though it isn't illegal). IoT is terrifying since so many of those devices come as insecure by default.
@Finris

Great! And just as worryingly, it almost happened in the real world a while back.

I'll leave this check up for a few more days to see who else might be interested before creating the thread.
© 2007-2024
BBCode Cheatsheet