Painful IT bot
TwitcHack¶
-
Boss / party system into this game
- where the streamer is the boss with set hit points
- viewers attack and also have hit points
- Chat rolling ~d20 to land an attack
- it chat rolls fail, they take damage.
- if chat rolls succeed, you take damage
- When I roll then a random viewer is selected for damage
- ticker that heals both chat and the streamer over time
- chat rolls
- over 12
- 19+ rolls land a critical blow
- hp scale
-
Points System
- Players earn points/items for successful attacks
- Successful attacks with be determined randomly
- points are tiered random amount
- and/or random item
- Players lose points for failed attempts or getting caught.
- Players earn points/items for successful attacks
- Leveling Up:
- Players can level up
- Unlocking more advanced commands and abilities.
- fix leveling, losing points then leveling again
- Leaderboards:
- Display top players based on points.
-
Random Events:
- Introduce random events that can help or hinder players
- Windows and/or Linux updates
- all firewalls deactivate
- (e.g., security updates, user errors).
-
Movement to location
-
- System command once at location
-
- !hack - shows location
- !hack email
- !hack /etc/shadow
- !hack website
- !hack database
- !hack server
- !hack network
- !hack evilcorp
Locations & Attacks¶
- Locations
- *Attacks
- Email - Target email accounts and perform phishing attacks.
- !phish: Perform a phishing attack.
- !spoof: Send an email from a spoofed address.
- !dump: Dump all emails from a compromised account.
- /etc/shadow - Access and crack hashed passwords.
- !crack: Crack hashed passwords.
- !stealth: Hide your tracks by modifying log files.
- !bruteforce: Perform a brute force attack on password hashes.
- Website - Target websites to find vulnerabilities.
- !burp: Scan for vulnerabilities using Burp Suite techniques.
- !sqliw: Perform an SQL injection attack.
- !xss: Execute a cross-site scripting attack.
- Database - Access and manipulate databases.
- !dumpdb: Dump all data from the database.
- !sqlidb: Perform an SQL injection.
- !admin: Try to escalate privileges to gain admin access.
- Server - Gain control over servers to execute commands.
- !revshell: Gain a reverse shell on the server.
- !root: Attempt to escalate privileges to root.
- !ransom: Encrypt files and demand a ransom.
- Network - Monitor and intercept network traffic.
- !sniff: Capture and analyze network traffic.
- !mitm: Perform a man-in-the-middle attack.
- !ddos: Launch a distributed denial-of-service attack.
- EvilCorp - Physical engagement
- !drop: USB drop attack in the breakroom, parking lot and l
- !tailgate: Hold 2 boxes of donuts, pretend you are on the phone and hope someone holds the door open for you.
- !socialengineer: Wear a fake badge and act like you own the place
Defense and Countermeasures¶
- !firewall [location]: Set up a firewall to protect a location.
- !patch [location]: Apply security patches to a location, slows down next attack
- !monitor [location]: Monitor a location for suspicious activity.
- !encrypt [location]: Encrypt sensitive data at a location.
Easter Eggs¶
- Successful !phish against brad.theodore@gmail.com drops rare item
- Random items drop