下载客户端

V指导的比特任务攻略

2026-02-19 01:00:21
发布在Hacknet
转载

AI智能总结导读

这是《V指导的比特任务攻略》,详细列出了完成该任务及通关所需的11款前置程序获取途径,还分阶段讲解了Foundation、Substantiation、Investigation等多个比特任务的具体操作步骤,包括服务器入侵、程序使用、关键信息获取等内容,助力玩家完成比特任务。

Full spread with pre-requirements for completing successfully the bit missions and finnishing the game. Prequisites For successfully completing the mission you will need the following programs on your local bin folder: SSHcrack.exe (first program achieved on bit's requests at the start of the game) FTPBounce.exe (second program achieved after completing the "Entropy registration" contract) eosDeviceScan.exe (third program achieved after recieving the "eOS device scanning" contract) SMTPoverflow.exe (fourth program achieved after you recieve the contract of "Agression must be punished") WebServerWorm.exe (fifth program achieved after you have naix's secondary relay server [from where he attacks you]) Sequencer.exe (sixth program achieved after you get accepted in CSEC) SQL_MemCorrupt.exe (seventh program achieved after you get accepted in CSEC) Decypher.exe (eigth program achieved in the "Ghosting the vault" contract) DECHead.exe (ninth program achieved in the "Through the Spyglass" contract) KBT_PortTest.exe (tenth program achieved in the "Project Junebug" contract) TraceKill.exe (eleventh program achieved in the start of bit's missions sent by "V") Another way to get the KBT_PortTest.exe after you have started bit's mission.Hack into the Universal Medical Server, search for a patient with "Whit Elliot", and then in the record find the "documentation and notes" IP. Here is the ip if you can't find it: 66.96.147.84. When you enter that server, click exit and hack the system. Firewall Solution For the server at 66.96.147.84 and it's adjecent one: BIOGEL. Once you are through, type scan and you will get another server (dont forget to delete your logs). Connect to that other server and hack it also, after you are through use "cd home/Production/Output" and copy the exe to your computer, then disconnect (dont forget to delete your logs here either). Now you have the tenth program ready. V - Bit -- Foundation This is the start of the missions, and it is simple, you download the TraceKill.exe after decompressing it with the given password dx122DX. once you have downloaded it, you just reply to the mail to continue with the missions. V - Bit -- Substantiation In here you have to connect to Bit's repo base (NOTE: TraceKill uses 600MB of ram, so if you want to stop the tracing you will have to get the ram free'd up and then run it [if you are running out of time after you have found the password {due to its long time to shutdown} simply shut it down manually with [b]"ps"[/b] and then "kill [PID]".]) Step 1: Hacking the systemStart by probing and getting the ports available for hack. You will have to hack/disable the following: (NOTE: You only need to open 4 ports to run porthack here) Proxy (overloading it with shelled computers) HTTP WebServer (WebServerWorm in console, default port 80) SSH (SSHcrack in console, default port 22) SQL Server (SQL_MemCorrupt in console, default port 1433) SMTP MailServer (SMTPoverflow in console, default port 25) FTP Server (FTPBounce in console, default port 21)If you do it fast, you should have some 30-40 trace time left, so run TraceKill as fast as possible for an extra time while you are in the server. In the server, you need to go to the directory ("cd home/work") home and then go in the work folder and copy the file in there. Disconnect and close tracekill and go to your pc, then analyze the .DEC file you just downloaded with DECHead. You will get an ip, put it in your notes or memoryze it, then reply to V with the IP adress. V - Bit -- Investigation You will recieve a mail from bit with another server, connect to that server, it's the main website of "EnTech". Start by probing and getting the ports available for hack. You will have to hack the following: (NOTE: You only need to open 4 ports to run porthack here) HTTP WebServer (WebServerWorm in console, default port 80) SSH (SSHcrack in console, default port 22) SQL Server (SQL_MemCorrupt in console, default port 1433) SMTP MailServer (SMTPoverflow in console, default port 25) FTP Server (FTPBounce in console, default port 21)After you are through (and porthack has shut down) run tracekill to get again some extra time. Start by scanning for linked computers, you will get 3 computers ("ZEUS", "WORKSTATION_CORE", "MAIL"), delete the logs (or have some fun around editing the website page cause you can) and disconnect from it (also shutdown tracekill after you disconnect). ZEUS and the MAIL servers are INVIOABLE so you can't hack them, you can only log in if you have the password, however you can hack the WORKSTATION_CORE. Probe the WORKSTATION_CORE. You will have to hack the following: (NOTE: Tracing here is very fast, so after you get the password manually kill porthack process and run tracekill as fast as you can) SQL Server (SQL_MemCorrupt in console, default port 1433)After you get the password and get tracekill active, scan the network for linked computers and delete your logs, then disconnect and shutdown tracekill. On the scan you will get 5 servers listed, 4 of them have the INVIOABILITY detection warning, but one of them doesn't. Connect to that sysem and probe it. You will need to hack the following: Proxy (Overloading with shelled computers) Firewall (Solution: BEKX4S [EDIT: According to a comment this now changes. You will have to figure this one out on your own if so.]) HTTP WebServer (WebServerWorm in console, default port 80) SSH (SSHcrack in console, default port 22) Medical Services (KBT_PortTest in console, default port 104)Once you have hacked through and activated tracekill, navigate to workstation > store ("cd workstation/store") and read "StoreServIPs.txt" to get the ips of the PROMETHEUS and ROMULUS servers. write both of them down in your notes, then read the file "Prometheus.txt" for the password to access the PROMETHEUS server. Once you have done this, disconnect (because there are no more linked computers to that last server) and reply to V's mail. (NOTE: if you can't reply to V's mail because it says mssion incomplete after following this whole secton from top to bottom, then check that the last mail that you recieved is V's mail about investigating bit's case, however, if it still doesn't let you reply, connect to the PROMETHEUS server and log in, at that point V should send you a mail back automatically.) V - Bit -- Propagation You will recieve another e-mail with a link back to the first found INVIOABLE system. Ignore it for now, you have to do something else first. Connect to the Prometheus server that you remembered/placed on your notes, log in with username: admin and the password that you also remembered/placed on your notes. Once you are in, delete the logs and run eosDeviceScan, you will find 2 linked phones. Connect to the first phone, and log in with the username: admin and password: alpine and go into the mail folder under /eos and write down in the notes the account username (what goes before the @) and also the password for the account. Disconnect from the phone and connect to the MAIL server of EnTech, log in with the username that you wrote down and the password for it. Once you are in the e-mail, read the mail that says "Re: Romulus passwd", copy down on your notes the password and disconnect from the mail server. Now that you have the ROMULUS password, connect to the romulus server and log in to it with the username: admin and the password that you placed on your notes. Go into the file system data and find a file under STORE/contractors named Contractor_Server.doc, read it and there should be a password again, write it down in your notes and disconnect from there. From here you can choose to go into the relay server (that V linked you and that is linked in the doc file) or reply to him with the password, you choose. V - Bit -- Vindication This part is simple, you get a mail from V telling you the password of a .DEC encrypted file in the EnTech Relay server. Decrypt the file if you want and then reply to V. V - Bit -- Termination This one will be a complicated and fast paced one, better read the guide first unless you know how to do it. PrequisitesGet some shelled computers ready (I normally use 6 for a fast proxy disabling). Step 1(NOTE: if you do not have Sequencer.exe downloaded, go grab it from the asset server.) Activate Sequencer.exe and click activate. Step 2You will be automatically connected to the offline server and you will be moved into the probe page automatically. You will need to hack the following: (NOTE: You need to hack it ALL to run porthack) Proxy (Overloading it) Firewall (Solution: [EMMETPLACE]) HTTP WebServer (WebServerWorm in console, default port 80) SSH (SSHcrack in console, default port 22) SQL Server (SQL_MemCorrupt in console, default port 1433) SMTP MailServer (SMTPoverflow in console, default port 25) FTP Server (FTPBounce in console, default port 21) Medical Services (KBT_PortTest in console, default port 104) Step 3Once you are in, you will have to navigate in the server ARCHIVE -> Hacknet and enter folder by folder and delete all the files in each with "rm *" Once you are done deleting that, delete your logs and ready up ForkBomb to launch it once log deletion is complete. You should be done with this and Sequencer should automatically close. Video Version:

步骤4:回复V的邮件,你会收到一封任务完成邮件。 比特-终端 这是“完成”游戏前的最后一个任务。

评论

共0条评论
face
inputImg
相关阅读
最新更新

开始游戏 / 命令行 / 如何游玩?

这是一份《黑客网络》入门指南。如果你没有在自己电脑上使用DOS或命令终端的经验,这款游戏可能会很难上手,而且有些表述对新手来说比较晦涩。本指南将带你了解最常见的…

2026-02-18 07:000赞 · 0评论

[法语 - 英语友好] 攻略

本攻略可能是法语的,但由于命令对所有人都相同,你仍然可以参考! 简介 这是《黑客进化》的续作……好吧,并非剧情上的续作。更确切地说,这是回顾我们主角的过去。 这…

2026-04-02 13:000赞 · 0评论

第四章 - 库尔斯克任务

由于存在通关游戏的困难,以下是我的解决方法。

2026-04-07 22:000赞 · 0评论

第一关指南:生存最后阶段 - 僵尸对抗士兵

卡在第一关紧张刺激的最终阶段了?这里有个策略能帮你通关! 第一步:装备步枪 在到达控制室之前,确保你已武装好自己。当你第一次走出电梯时,会遇到三名士兵——击倒他…

2026-04-07 19:000赞 · 0评论

【100%图解指南】

全成就图文指南 第一部分

2026-04-06 13:000赞 · 0评论

由于未提供该游戏的官方中文译名,无法准确翻译。

方向输入指南 - 所有关卡 简介 移动方式: U = 上 D = 下 L = 左 R = 右 按下此按钮可将视角切换为俯视视角(推荐)

2026-04-06 07:000赞 · 0评论

100%成就指南

100%完成游戏简易指南 简介 本指南根据全球成就统计数据进行排序 说明

2026-04-05 16:000赞 · 0评论

"An Unexpected Pairing"成就,埃弗拉德版本

本指南将帮助你解锁【An Unexpected Pairing】成就,同时通关游戏并获得【Long Live The Queen】成就。 第1-14周 本指南将…

2026-04-05 13:000赞 · 0评论

《维京小队》攻略

游戏通关 第一部分

2026-04-05 10:000赞 · 0评论

简单通关方法

用最简单的操作通关3个地图 一句总结 泰坦守塔,放一堆飞行+吸血+高速单位出去拆敌人营地 较为详细描述 整体思路是开局组出2只骨人后,尽快出兵拆掉怪物营地,结束…

2026-04-03 22:000赞 · 0评论
暂无更多

最新更新

  • Hacknet:完全攻略 — (译者:由于我才疏学陋,翻译时有不准确的地方,有能力者还请参考原版攻略。 任务名、软件名等英语专用名暂时不予翻译,但部分会在后面附上解释,服务器名等请借助工具书…
  • 黑客网络逐步攻略 — I made this guide for those who think they're completely stuck. I don't recommen…
  • 如何备份x-server.sys(即让游戏部分内容更简单) — 奈克斯不会料到这一招…… 如何备份 奈克斯会删除你的x-server.sys。 你必须通过不同的用户界面恢复x-server。 我不喜欢这样。 重启存档后,我是…
  • Hacknet任务训练指南 — 《黑客网络》快速完成教学任务及游戏基础学习指南 《黑客网络》是一款怎样的游戏? 《黑客网络》是一款引人入胜的终端机模拟类电脑黑客游戏。在这款带有部分剧情的游戏中…
  • CSEC手册 — 这是CSEC新手与特工手册。本指南将教授基础知识和操作方法,还会提供一些你可能至今未知的提示与技巧。本指南可用于培训以及作为重要基础知识的提醒。 开始前 开始前…
  • 所有bash IRC日志 — List of every single one of them Update This *guide* has been remade, I found th…
  • 迷宫逐步攻略 — A completely spoiler-filled guide on how to do every mission in the DLC. General…
  • 如何:轻松将你的网络地图整理为网格! — 厌倦了在网络地图中点击重叠的节点吗?本指南将向您展示如何让网络地图以半有序网格的形式显示,而无需调整大量x/y坐标。 步骤1:做好准备工作 确保已安装Hackn…
  • 如何找回x-server.sys文件 — 在你删除Naix窃取的Macrosoft文件后,他删除了你的x-server.sys文件。 以下是你恢复系统所需的代码。 第一部分:连接Naix的代理服务器 重…
  • HackNet全任务及隐藏要素分析(包含DLC) — 使用Hacker的方式探索HackNet 前言 1. 本攻略适合已经完成一周目,并尝试探索hacknet中没有尝试过内容的同学,如果是新手,建议参考其它攻略 2…