This is a read-only snapshot of the ComputerCraft forums, taken in April 2020.
tommyroyall's profile picture

Cyber-Warfare in ComputerCraft.

Started by tommyroyall, 05 March 2012 - 12:20 AM
tommyroyall #1
Posted 05 March 2012 - 01:20 AM
Cyber-Warfare in Minecraft


Cyber-warfare in CC is by far possible. It involves the use of servers, turtles and networking to disrupt or damage the enemy. This will be a brief guide of what I have discovered as Cyber-warfare inside of CC.
Glossary:

Networking:
Server - A computer that runs software that broadcasts messages or data.
Server Sync - When a server syncs, it sends out it's next wave of data.
Server Sync Rate - The rate of which every server syncs. A typical rate is 10.
Attacking Computer - The computer of which controls the attacks, and may launch attacks.
Sponge Computer - The computer that absorbs all data, useful for spying.
Manager Computer - The computer of which the hacker uses to manipulate the others.
Hack-Line or Hack-Buss - The bundled cable of which the manager computer controls the others from.

Tools:
Boot-Disk - A boot disk contains a blank, clean copy of your computer.
Xeno - A xeno, or xeno-program is a program of which is hostile to a computer. Not quite a virus as they do not always reproduce, more like simple mal-ware.
Hell-Wall - A large wall of wireless mining turtles all activated at the same time and they demolish any terrain that they come across. A method of physical destruction by way of computer.
Master Remote - A cannon managing computer.
ID Spoofer - An extra computer, typically manipulated by bundled cable that does the work, so that then the hacker isn't caught on their normal computer. The computer used to spoof an ID is typically destroyed after the operation.

Defenses:
Anti-Virus - A program filter that searches for malicious code.
Selective Networking - Filtering out which messages are accepted by way of ID.
Grid Tracking - Using a large grid of sponge computers to get an approximate location of a server.

Examples:

Example A >> The enemy communicated over RedNet. You use a spam-bot to take out their network.
Example B >> The enemy negotiates or trades, and you ID Spoof and promise to sell them lots of fake product for cheap, then when they arrive to pick it up you attack them.
Example C >> The enemy has a hidden server somewhere and it's interrupting you. You grid-track to find them.
Example D >> The enemy is not using much technology, so you set up a hell wall and send it after them.
Example E >> You make a filter for your trade or communication networks that filters out all known enemy IDs.
Example F >> You use a master remote to control your cannons, so that then you have immediate control of them.
Example G >> You set turtles out to dig massive tunnels through their obsidian lined walls to let your army through.
Example H >> You sponge on their network and get vital data.

Technique:

1. Spam - Sending repetitive data.
2. Sponge - Retrieving and storing data.
3. Grid Tracking - Using a grid of computer to track a particular server.
4. Hell-Walling - Using a large wall of wireless mining turtles to demolish terrain.
5. ID Spoofing - Using and disposing of another computer to keep your ID hidden.
6. Server Hosting - Using server software to host a server.
7. Xeno - A foreign, malicious piece of software. Sending a fake program that is actually a xeno is an example of attack.

Recommended Tools:
1. CoreNet - A good networking tool.
2. Custom server software, or if you're just doing broadcasts use CoreNet.
3. RedWord for word processing for creation of the programs.
4. Tomasss' StringUtilAPI for encryption/decryption.


Any ideas of what else I should put on here? Please comment :unsure:/>/>.
- Sledger721/SirDerpsAlot.
LitCactus #2
Posted 05 March 2012 - 02:03 AM
I thought some kind of in-game hacking would be interesting when I first saw this mod… Very nice post!
jtdavis99 #3
Posted 05 March 2012 - 02:44 AM
I love this idea!
FuzzyPurp #4
Posted 05 March 2012 - 03:16 AM
Haha we totally forgot about this idea. Too bad im busy with Redworks Toolkit - infact that may actually have use for this project :unsure:/>/>
Liraal #5
Posted 05 March 2012 - 05:43 AM
Nice! Care if I implement this as an API?
francogp #6
Posted 05 March 2012 - 05:54 AM
almost all of the idea is based on broadcasting servers? or there is a way to "hack" a rednet message to an specific ID?
Liraal #7
Posted 05 March 2012 - 05:59 AM
via modems? i don't think so. But you can always spam the receiving function and generate loads of events for the opponent to deal with.
francogp #8
Posted 05 March 2012 - 06:08 AM
via modems? i don't think so. But you can always spam the receiving function and generate loads of events for the opponent to deal with.

but… that might "crash" you real computer (overloaded) or eat several FPS, instead of computercraft pc crash :S… I'm not sure… but
Liraal #9
Posted 05 March 2012 - 02:04 PM
Well, you can crash your real computer even easier (infinite threads). But spying on bundles is definitely a possibility, it'd require a bit of redstone events processing though. But I have other things in mind… :unsure:/>/>
tommyroyall #10
Posted 22 March 2012 - 02:13 AM
Also guys, this would make for a great API :3. attack(attackType) or spy(bundle).
Epic
BigSHinyToys #11
Posted 22 March 2012 - 05:18 PM
When i think cyber warfare I don't think lets build a network with holes in it I think Ow look this is someones network look at all that unencrypted broadcast data. and then set a program to file every message. for me to collect and pick through latter.

The thrill of the game s to find the weakness not to have it programed in.

It would be rely to easy to hack any rednet system step one find one computer or bundle plug in to wifi or cable. run a packet sniffer.
sit back and read everyones secrets look for Commands on rudimentary systems this may not even exist. write a program that randomly sends one of the commands every random time. and wait for the complaints to roll in.

Hacking in computercraft is simple :(/>/>

thanks Dan200
Liraal #12
Posted 22 March 2012 - 05:23 PM
it's not that simple when a network is set up on modems (e.g. a system I am working on) not bundles, and if you have a physical connection (cable) between point A and point B, you can always protect it against hackers sniffing your net.
BigSHinyToys #13
Posted 22 March 2012 - 05:34 PM
it's not that simple when a network is set up on modems (e.g. a system I am working on) not bundles, and if you have a physical connection (cable) between point A and point B, you can always protect it against hackers sniffing your net.

all I would need to do is Open one of the routers and edit the code to send a message to me as well as deliver it. then sit back and collect all that sweet data :(/>/>

so let me predict your next response. "Well I will lock the terminal" place disk drive use Bump Key print("open") saved as startup

"Ok so i put it in a bullet proofed room of obsidian and use a white list to block me"
That is the only way to win

"But what about encryption"
I would look for a user treminal (made easer by triangulation ) and copy then reverse engineer the encryption method. Install a back door and KEY loger that sends your key to me when you use it next.

If you can think of a way to counter all of that I would like to see it. :)/>/>
Liraal #14
Posted 22 March 2012 - 05:44 PM
first of all - alternating network encryption with hashing, other hash for every node/terminal, containing its ID as well. (To implement :(/>/> )
no broadcasts meaning no triangulation as well (already done)
relay can be a turtle and when connected to a gps and with a good program it can shift positions easily and if captured, erase the coding and its hash and/or send a warning
also, because of the architecture of my network, you can only capture more message traffic if you make a 'node', and to do this (and for the node not to be rejected, you must have the correct network key)

now how do you counter this?
BigSHinyToys #15
Posted 22 March 2012 - 06:17 PM
Computer virus designed to appendage its self to all files and run a fake shell. It would mimic shells functions and installs itself when you run a program infected by it. it then hides invisible to all. loging keys and sending data to me. there is no defense to that. as for how to get it into your network That is the simple part just leave it on a floppy in your chest. curiosity will win out always.
Liraal #16
Posted 22 March 2012 - 06:21 PM
and i am such a moron to launch it on a protected server, yeah… I have written my share of nasty viruses :)/>/> And false shell is always detectable, but to be completely sure, i will make integrity checks on all my software. :(/>/>

and as for using key loggers: You can only get messages to/from one computer. the rest is safe.
BigSHinyToys #17
Posted 22 March 2012 - 06:26 PM
Ok then a fake os.pullEventRaw that sends a rennet message to me And exists entirely in RAM It is totally undetectable ounce installed.

it is always nice to find a worthy opponent
Thank's
Sebra #18
Posted 22 March 2012 - 07:08 PM
Still no one rewrote Dan200 classes? Strange :(/>/>
Singleplay on isolated computer would be the only protection.
Cloudy #19
Posted 22 March 2012 - 09:16 PM
When i think cyber warfare I don't think lets build a network with holes in it I think Ow look this is someones network look at all that unencrypted broadcast data. and then set a program to file every message. for me to collect and pick through latter.

The thrill of the game s to find the weakness not to have it programed in.

It would be rely to easy to hack any rednet system step one find one computer or bundle plug in to wifi or cable. run a packet sniffer.
sit back and read everyones secrets look for Commands on rudimentary systems this may not even exist. write a program that randomly sends one of the commands every random time. and wait for the complaints to roll in.

Hacking in computercraft is simple :)/>/>

thanks Dan200

If you use the broadcast feature, then yes, it's intercept-able, by its very nature. If you use rednet.send, then it isn't, as it only goes to the computer you ask it to.


Still no one rewrote Dan200 classes? Strange :(/>/>
Singleplay on isolated computer would be the only protection.

How would that help at all? And how would that be possible within the realms of Lua?
Wolvan #20
Posted 23 March 2012 - 06:46 PM
I am so totally ready for cyber warfare! Let us build that together what do you say?
Liraal #21
Posted 23 March 2012 - 07:17 PM
i need only some workable ideas. anyone?
bbqroast #22
Posted 25 March 2012 - 02:26 AM
While it should be configurable being able to "tap" into someones communications would be awesome. Maybe you could make a block that when placed acts as a relay between the cables touching it, it would save messages/provide an API for listening to the messages. Wireless versions should be made (which would make wireless more balanced as it would pose a serious security risk).

Also for blancing "garbl = encrypt(message, key)" and "message = decrypt(garbl, key)" should be added- even a basic low CPU alogrithm would be enough. Oh and "md5(message, key)" would be handy (md5 is a one way algorithm used for passwords and such).
Sebra #23
Posted 25 March 2012 - 07:45 AM
Please do not add artificial vulnerability.
Alex_ #24
Posted 25 March 2012 - 08:59 PM
we should host a server and have a game of this

just have a huge cyber war
BigSHinyToys #25
Posted 26 March 2012 - 05:17 PM
making a server specifically for this would be almost pointless as everybody would keep all there stuff else ware because they don't want to get messed with. only arrogant smart people with a slightly narcissistic tendency's would join a server like that

sign me up
Wolvan #26
Posted 26 March 2012 - 07:34 PM
sign me up
Me too! I am so totally in it >: )
BlackRa1n #27
Posted 26 March 2012 - 10:04 PM
I would love to see a server with this!
But first, it would help if somebody made the API and coding xD
Wolvan #28
Posted 27 March 2012 - 08:18 PM
Me too! I can really help with rednet stuff
francogp #29
Posted 27 March 2012 - 08:51 PM
I would love to see a server with this!
But first, it would help if somebody made the API and coding xD

I think that first of all, we need a presice list of the "rules", tools and the Objetives of the game (when you/team "win" the hack? etc…)
Ian-Moone #30
Posted 27 March 2012 - 08:54 PM
ill help i mean turtle-bomb could be used and ill make whatever i can
Wolvan #31
Posted 27 March 2012 - 09:51 PM
Turtlebomb remote version *_* Think about the possibilities! Create a starting zone for turtles, connect a rednet computer to it, send the coords via rednet to the turtle and send the ATTACK Command *_* And I know how to create a modification on turtle bomb so it doesn't blow up itself. just rapid tnt bomb fire
Jojo.bacon #32
Posted 28 March 2012 - 08:11 PM
Hmmm, is there a way to spoof an id so if enemy sends to comp 1 you could pick it up?
The turtle bomb idea is easy with magicturtle api.
Maybe a way to hook up to cable connections and bypass the "rednet.send("id, msg")" And download everything
Ian-Moone #33
Posted 28 March 2012 - 08:38 PM
turtle bomb i made is on my programs edit it if you need
BigSHinyToys #34
Posted 29 March 2012 - 02:01 PM
Hmmm, is there a way to spoof an id so if enemy sends to comp 1 you could pick it up? The turtle bomb idea is easy with magicturtle api. Maybe a way to hook up to cable connections and bypass the "rednet.send("id, msg")" And download everything
if you could get access to a repeter you could alter its code and add a line that sends to you as well as the reciver
rednet.send(7,mes)
placed right next to the send function in the repeater would do it. if 7 was your computers ID and mes was the var that stored the mesage
Wolvan #35
Posted 29 March 2012 - 03:05 PM
why do we still talk and don't start whith what we can do best: PROGRAMING
Mads #36
Posted 03 April 2012 - 12:14 PM
I could possibly set up a dedicated 24/7 server for this xD.
It would cost me like $19 a month for 20 slots
Wolvan #37
Posted 03 April 2012 - 03:56 PM
I could possibly set up a dedicated 24/7 server for this xD.
It would cost me like $19 a month for 20 slots
You would do that? That would be awesome! I would help if I could spend money/send money to you. But I can help with setting up and administration stuff
1v2 #38
Posted 03 April 2012 - 04:10 PM
Really cool concept.
I've made a very simple "sponge", nothing fancy.

http://pastebin.com/tEh5DwxJ
KevStyle #39
Posted 03 April 2012 - 09:26 PM
Please open a server for this because everything is possible :)/>/>
strideynet #40
Posted 04 April 2012 - 08:53 AM
See my project team.
Called project netblock.
We are aiming to have 2 teams each battling each other for computer supremacy!!
Probably with a redpower flag!
It would be computer based ctf.
In the process developing better and better firewalls until we have one that's like avg for minecrAft !
And secretly developing better and better viruses when the minecrAft Internet comes out!
We are good and bad.we will happily fight against any team!
djblocksaway #41
Posted 04 April 2012 - 03:27 PM
Cyber warfare o.O
this i would like to see in action :)/>/>
Wolvan #42
Posted 04 April 2012 - 11:50 PM
If you don't mind, I bump

@djblocksaway
Me too
tommyroyall #43
Posted 05 April 2012 - 02:58 PM
Hey guys, an idea that I had:
A two team war, where one team has to safely transmit a very long story, and the other has to sponge in at least 100 words and then disrupt the signal.
Leo Verto #44
Posted 05 April 2012 - 06:41 PM
Sponge is easy, disrupting a signal?
Umm, you could spam the system, so no one can read the output, but i they save the program to a file, it is nearly impossible.
I might set something like this up on my server, I'm thinking about having a master computer that controls the team computers and starts sending data when the receiving team is ready.

But this is not easy and I'm busy with CC server and routers and hacking them.
1v2 #45
Posted 07 April 2012 - 01:25 PM
I can host the server.
strideynet #46
Posted 10 April 2012 - 07:55 AM
I wanna see this server . I'd happily set up serve rom good at perms
I could also help with the connecting network
That connects teams.
I'd happily enter my team
See project netblock
Leo Verto #47
Posted 10 April 2012 - 05:18 PM
Ok, I'll try to get up a not 24/7 tekkit server for projects like this after the next tekkit update. But probably only trusted players will be able to play on it.
strideynet #48
Posted 13 April 2012 - 02:20 PM
Cool leo
EmTeaKay #49
Posted 14 April 2012 - 01:03 AM
Let's say that all the stuff in your post was possible (Not saying it isn't). I would make a secret base with a computer, and have a computer hidden close to my base, next to bedrock that receives a message, then sends it to the next computer that is also next to bedrock. This process continues untill the signal reaches my allies computer. Once I did that, I would send the cordinates to my allies. Then say you go exploring and find one of my hidden computers that ferries my messages, you can A) Intercept them and spy on me or :P/>/> Destroy the computer and search for more of them. If you spied on me, you would be able to look at the messages I had sent my friends, thus making me vurnable. And if I had a password lock on my doors, and I sent them through the system, and you got a hold of it, then you would be able to sneak into my base and take what you wanted.

X = a chunk. O = A computer. M = The main computer. A = Allies computer.

MXXXOXXXOXXXOXXXA

I hope this "diagram" helped you understand my thoughts.
Leo Verto #50
Posted 14 April 2012 - 09:31 AM
You can just decrypt the messages and encrypt them at your allies computer.
TripleXPenguin #51
Posted 10 May 2012 - 03:11 AM
Hey, this seems like a REALLY cool idea. We can use my CC server, already running 24/7 on cc.rpempirerising.net . You can visit the page for it here. Its creative with no protection, but if we do this I can switch it to survival (if thats what majority wants) and start a new world.
PixelToast #52
Posted 14 May 2012 - 01:14 AM
i am currently working on a supervirus that sends out a series of DDoS, password guessing, malicious code over a network, it also does this silently and almost undetectable, i can also send new functions for infecting other computers to already infected computers
strideynet #53
Posted 14 May 2012 - 06:59 AM
Yeah use triples server.if triple wants any help with permissions tell me.
PixelToast #54
Posted 14 May 2012 - 08:23 PM
Hey, this seems like a REALLY cool idea. We can use my CC server, already running 24/7 on cc.rpempirerising.net . You can visit the page for it here. Its creative with no protection, but if we do this I can switch it to survival (if thats what majority wants) and start a new world.
-snip-
lol, gotta register i guess