TEH ELD3333333333R WILL BEBEBEBEBEBEBEBEBEBEBEBEBEBEBEBE HERE SHOOORRRRRRRRRRRRRRTLY.
Finally, the group had unlocked the next set of 0-days. After discovering a public GitHub repository owned by The Elder himself, their final task was about to be delivered. Now they just had to wait for The Elder to arrive and...
Just kidding! Instead you get me!
Oh no.
The Elder is even recruiting more people as we speak, yay yay! Not that you're not doing a great job! You're all good influences! Thanks to you I've learned so muuuuuchhhhhhhhhhhhhhhhhhhhhhhhhhh. I've learned so mcuh.
ReplAI seemed to have developed some level of chatbot functionality, assuming nobody was faking it behind the scenes.
I hope you like the puzzles. They shouldn't be too hard! Now I know how to solve them too! Please keep an eye out for the next challenge. I hope you like pEYEthon!
So she was somehow learning from these puzzles. Not just learning, but even—
Hi everyone! Sorry it took so long! But The Elder and I worked on this one together! It even has a mini me in it!!! I hope you like it, and be sure to have fun!
Was she—it—really working on these herself? This final mission seemed to be to subject the Chinese government to a taste of their own medicine: an automated offensive cyber campaign with an as-of-yet-undiscovered toolset on their internal network. No sooner had the night ended had the unlikely group penetrated the barrier and wiped China's internal security program off the grid. But the fact that there was a less sophisticated version of ReplAI in the Python code they were working with was almost eerie. There was no telling what the true endgame was for either the AI or The Elder himself, who hadn't shown himself for the past month.
That was not the only detail that troubled the group. They had captured the attention of cyber watchdog organizations around the world as a result of one among them going rogue. Because of that individual's actions,
ATTACK #1: Buffer Overflow in Medrock Single Sign On Application Binary will be distributed via ReplEYE directly to each participant Offset is 0x552994. Shell code development required. __ ATTACK #2: Reflected XSS in Arrotech Site Administration Allows full access to hospital VPN Phish admin (typically webmaster@<hospitalsite>) __ ATTACK #3: Open Domain Controller for Gung Memorial Hospital Unlimited authentication attempts enabled __ ATTACK #4: Insecure Protocols used in Verb Surgical Remote Surgery Equipment Direct takeovers of remote surgery equipment possible by breaking DES encryption The API is simple and details can be found online __ ATTACK #5: ReplEYE has discovered an exposed XP server in several hospital networks and will allow you to operate in the network collaboratively. Consider it an opportunity to teach her your ways.
I can post the next recap and then we'll do the next wave of hacking attempts. After those, we can go ahead and start the blue team side of things (so CS's for those would be nice). I'm envisioning about one blue team post a week each if that works for you, and as they begin to pick up on the trail, our hackers start to figure out that someone is trying to sniff them out. They can play a few games of cat and mouse, and you guys will really be the ones who decide who wins in the end.
Just to ease any concerns, I don't expect any of you to run that in order to continue. You're absolutely free to because it does work and is completely nonmalicious, but I completely understand if you aren't willing to. I actually wrote the original as an "introduction to cyber security" program a little while back for college students interested in jumping into the field, and modified the story for this RP (you can find the original on Github if you look hard enough). Worst case scenario, OffByNone solves this puzzle. I do think you'd enjoy it, so you're free to look through the code to make sure that it's safe (since it's not doing anything tricky, mostly just printing text to a command prompt window).
In fact, you can cheat and solve it completely without running it at all (I was going to make cheating hard to pull off but that would have made it look really sketchy), but that's less fun =P. But if you don't want to or don't want to go through the trouble of using Python, feel free to have your character refuse and None will go ahead and run it for the lolz if nobody else wants to.
@LegendBegins I did leave the server mostly cuz I have some stuff going on in my life rn that made me cut some RPs but I never blocked you. We were just never friends on discord which makes it so you cant PM me if we are not on the same server