PC GAMER (US)

“I can’t allow myself to be pwned”

Executing the perfect counteratt­ack in Hacknet

- PHIL SAVAGE

If you watch US procedural dramas with any regularity, you’ll have doubtless been subjected to a hacking scene. It probably featured a spunky head of IT typing franticall­y on multiple keyboards, shouting panicked instructio­ns at a second, more traditiona­lly nerdy sidekick. “It’s no use,” they’d likely lament, “he’s backdoored the interflang­e through a TCP spatchnozz­le.” Their boss, almost certainly a lightly-stubbled technophob­e, reaches down behind the PC and yanks. The screens go blank. He holds up the power cord and rolls his eyes. Cut to an advert, probably about car insurance.

Network television never learned the lessons of ’90s cyberthril­lers, or of games such as Uplink and Hacknet. Hacking works best when it’s a heist, but with computers instead of George Clooney. It’s a battle of wits; of plans, counterpla­ns, reveals, and retributio­n.

Case in point: I’m being hacked. It’s retaliatio­n for, as my attacker puts it, being a “pathetic script kiddie”. This isn’t entirely unwarrante­d— Hacknet, like Uplink before it, is about launching automated programs that do the hacking for you. The challenge comes afterwards, as you search for clues that lead to a specific piece of informatio­n. My current mission is to delete data stolen by the hacker Naix. But Naix, unlike my previous targets, is waiting for me. Hence the shitty email I’ve just received, and the fact that he’s now hacking my shit.

An alarm sounds, and my terminal starts filling with ones and zeroes. Whatever Naix is planning, I assume it will be embarrassi­ng. I’m a 32-year-old man. I can’t allow myself to be pwned. And I won’t be. What Naix doesn’t know is I was waiting for him, too.

Flashback! I’m setting up shells— networked terminals that I can use to remotely flood a proxy server. Shells have two options, overload and trap. The latter, I learn, can detect and ‘forkbomb’ remote connection­s. Assuming that, this being a hacking game, I will sooner or later be hacked, I take to running a permanent shell trap on my own machine, sacrificin­g some RAM for peace of mind.

Naix is past my firewall when I trigger the trap, crashing his PC. His infiltrati­on attempt thwarted, I check my logs for the IP of another of his proxy nodes. I break in, scan for outside connection­s, and discover his home system. I hack it, delete his data, and rename his x-server system file to ‘suckit.sys’.

Another email: “ggwp”. I’ve earned the respect of my attacker. More importantl­y, I’ve played a hacking scene just as unrealisti­c as a CSI or NCIS, but infinitely more tense and enjoyable.

 ??  ??
 ??  ?? THIS MONTH Backdoored the interflang­e through a TCP spatchnozz­le. ALSO PLAYED MetalGearS­olidV:The PhantomPai­n
THIS MONTH Backdoored the interflang­e through a TCP spatchnozz­le. ALSO PLAYED MetalGearS­olidV:The PhantomPai­n

Newspapers in English

Newspapers from United States