So there's this game called Telehack (http://telehack.com, or use telnet). It's.. hard to explain? It's definitely a MUD/MUCK-type thing, at least. It's a game that's a simulation of the Internet as it was circa 1985-1990 - with IRC, bang paths, email, telnet, usenet archives, the whole shebang. The cool thing is, the 'network' has somewhere around 24,000 hosts on it, most of which are built from archives of actual systems that were on the Internet at the time. So I guess it's part-living museum, too?
So there's this game called Telehack (http://telehack.com, or use telnet). It's.. hard to explain? It's definitely a MUD/MUCK-type thing, at least. It's a game that's a simulation of the Internet as it was circa 1985-1990 - with IRC, bang paths, email, telnet, usenet archives, the whole shebang. The cool thing is, the 'network' has somewhere around 24,000 hosts on it, most of which are built from archives of actual systems that were on the Internet at the time. So I guess it's part-living museum, too?
But the outright fun part of it is the hacking. You can use buffer overrun attacks on vulnerable ports to give yourself user privileges on a remote box, use a debugging tool to kill other peoples' applications, then install a rootkit to give yourself su - among other things. And the easiest way to get the exploits and figure out how to use them is to wardial into BBSes to find executables, and look around for textfiles detailing how to actually use it. It's a lotta fun.
KNIGHT wrote to ZEONET <=-
So there's this game called Telehack (http://telehack.com, or use telnet). It's.. hard to explain? It's definitely a MUD/MUCK-type thing, at least. It's a game that's a simulation of the Internet as it was circa 1985-1990 - with IRC, bang paths, email, telnet, usenet archives, the whole shebang. The cool thing is, the 'network' has somewhere around 24,000 hosts on it, most of which are built from archives of actual systems that were on the Internet at the time. So I guess it's part-living museum, too?
But the outright fun part of it is the hacking. You can use buffer overrun attacks on vulnerable ports to give yourself user privileges on a remote box, use a debugging tool to kill other peoples' applications, then install a rootkit to give yourself su - among other things. And the easiest way to get the exploits and figure out how to use them is to wardial into BBSes to find executables, and look around for textfiles detailing how to actually use it. It's a lotta fun.
This is fantastic. This reminds me of the highlights of the 90s. Thank
you for a new addiction!
Sysop: | MCMLXXIX |
---|---|
Location: | Prospect, CT |
Users: | 325 |
Nodes: | 10 (0 / 10) |
Uptime: | 246:10:47 |
Calls: | 508 |
Messages: | 219909 |