Slavehack ana file




















Register Don't have an account? Edit source History Talk 0. Slaves screen with the IPs and Passwords blanked out. Usage [ ] Slaves are the primary way to earn money in SlaveHack.

Categories Add category. Cancel Save. Fan Feed 1 Slaves. Universal Conquest Wiki. This is a very handy piece of software. Keep your highest firewall unhidden and unencrypted at all times as it will no longer prevent people from getting access without a waterwall. A handy little feature for firewalls if you can pull it off is using them to boot people from your system.

If someone has managed to hack you and they have taken out your firewall s , get someone to upload you one higher than the attackers waterwall or just have them delete the attackers waterwalls and they'll instantly be kicked, rendering you temporarily safe. This is used to clean viruses from the system it's currently running on be it your own or a remote system. It will completely remove any virus that is of equal or lower level than it and will simply deactivate any that are higher with the exception of.

Running one can be a bit of a pest, even if it doesn't remove the virus completely as deactivating it will stop those who installed it from being able to let it build up a decent amount of money for collection. A tip for using an AV Handy for tricking people.

These are used for three things. Gaining repuation, gaining money and gaining slaves for use as a botnet to attack others and they all have the same icons. The spam virus is used to send out spam e-mails. This generates more repuation than euros but will give both.

The warez virus is used to sell warez files. This virus will generate more money than repuation but like the spam virus, it gives both. This is the virus used in conjunction with the. Each DDoS hit launched produces a small amount of rep per slave but no euros. If someone resets, wait for the tracker to update, visit the domain and it'll take you to the new IP.

Best used with a hider once a seeker is deleted so people won't run an AV or format and it leaves lines in logs so be sure to hide those logs until you can't do it anymore.

This is used alongside your spam viruses to "collect". As previously stated, it gives more repuation than money but will accumulate both. This is used alongside your warez viruses to "collect". Again, as I said previously it is the opposite of spam and will provide more money than reputation. For this to work, it needs one of the. These files are sold by your Warez virus. You need to have a copy of one of these files uploaded to the target machine. This is a collection of software which can help you in different ways.

None are used exclusively for attacking or defending, they're just This is used to hide the presence of a file so that it can only be seen by someone running a "seeker" of equal or higher level. When you hide software, it can no longer be used This is used to unhide files that have been hidden. It is generally quicker than re-downloading but it depends on the connections of yourself and the place you are downloading as well as your CPU.

It must be uploaded to the target system and depends upon you having a maxed CPU to give the most accurate results. This is used to encrypt a file. For the most part, this doesn't have a lot of uses other than for text files. Once encrypted, software can no longer be run until decrypted although, like hidden software, it cannot be over-written by re-downloading.

If you can manage to encrypt some important peices of software on someones system without being caught, they have no choice but to delete the files or wait and decrypt them. This is used to decrypt files that have been encrypted. There really isn't much more to say other than to explain that you need a decrypter of equal or higher level than the encrypter that was used to encrypt it. This is used to host a personal forum on your group server.

You have full admin privileges over it and it can be accessed by anyone who is inside the GS. If the file gets deleted from your GS, your forum will remain although you can't access it without reuploading the file.



0コメント

  • 1000 / 1000