Advertisement
Guest User

Untitled

a guest
Jul 19th, 2018
344
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.68 KB | None | 0 0
  1. 'hacknet_viewer.exe' (CLR v4.0.30319: DefaultDomain): Loaded 'C:\WINDOWS\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.dll'. Skipped loading symbols. Module is optimized and the debugger option 'Just My Code' is enabled.
  2. 'hacknet_viewer.exe' (CLR v4.0.30319: DefaultDomain): Loaded 'C:\Users\thete\Source\Repos\Hacknet-Viewer\bin\Debug\hacknet_viewer.exe'. Symbols loaded.
  3. 'hacknet_viewer.exe' (CLR v4.0.30319: hacknet_viewer.exe): Loaded 'C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System.Xml\v4.0_4.0.0.0__b77a5c561934e089\System.Xml.dll'. Skipped loading symbols. Module is optimized and the debugger option 'Just My Code' is enabled.
  4. 'hacknet_viewer.exe' (CLR v4.0.30319: hacknet_viewer.exe): Loaded 'C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll'. Skipped loading symbols. Module is optimized and the debugger option 'Just My Code' is enabled.
  5. <advExamplePC (computer)
  6. name: Extension Example PC
  7. ip: 167.194.132.7
  8. icon: chip
  9. type: 1
  10. security: 2
  11. allowsDefaultBootModule: False
  12. files: <Test_File.txt(File)
  13. path: home
  14. content: This is a test file in the home directory>
  15. <asdf.txt(File)
  16. path: home
  17. content: This is
  18. A Multiline
  19. File.
  20.  
  21. Note that it doesn't have whitespace on the left side.
  22. That causes formatting issues!>
  23. <downloadFile.txt(File)
  24. path: home
  25. content: This is a file for some of the goals in ExampleMission.xml>
  26. <changeFile.txt(File)
  27. path: home
  28. content: This is too! A
  29. other a! B>
  30. <Binary_File(File)
  31. path: bin
  32. content: #BINARY#>
  33. <Test_File(File)
  34. path: home/NewDirectory
  35. content:
  36. This is a longer file that also creates a new directory by adding something to path
  37.  
  38. #BINARY#
  39. This generates some binary (2000 chars of it)
  40.  
  41. #BINARYSMALL#
  42. This generates some binary (1000 chars of it)
  43.  
  44. #PLAYER_IP#
  45. Becomes the IP of the player's computer
  46.  
  47. #PLAYERNAME#
  48. the above string converts itself into the player's name
  49.  
  50. #RANDOM_IP#
  51. A fresh, randomly generated IP Address
  52.  
  53. test test
  54. >
  55. <SSHCrack.exe(File)
  56. path: bin
  57. content: #SSH_CRACK#>
  58. <FTPBounce.exe(File)
  59. path: bin
  60. content: #FTP_CRACK#>
  61. <WebServerWorm.exe(File)
  62. path: bin
  63. content: #WEB_CRACK#>
  64. <SMTPOverflow.exe(File)
  65. path: bin
  66. content: #SMTP_CRACK#>
  67. <SQLBufferOverflow.exe(File)
  68. path: bin
  69. content: #SQL_CRACK#>
  70. <HexClock.exe(File)
  71. path: bin
  72. content: #HEXCLOCK_EXE#>
  73. <Clock.exe(File)
  74. path: bin
  75. content: #CLOCK_PROGRAM#>
  76. <Decypher.exe(File)
  77. path: bin
  78. content: #DECYPHER_PROGRAM#>
  79. <DECHead.exe(File)
  80. path: bin
  81. content: #DECHEAD_PROGRAM#>
  82. <KBTPortTest.exe(File)
  83. path: bin
  84. content: #MEDICAL_PROGRAM#>
  85. <ThemeChanger.exe(File)
  86. path: bin
  87. content: #THEMECHANGER_EXE#>
  88. <eosDeviceScan.exe(File)
  89. path: bin
  90. content: #EOS_SCANNER_EXE#>
  91. <SecurityTracer.exe(File)
  92. path: bin
  93. content: #SECURITYTRACER_PROGRAM#>
  94. <Tracekill.exe(File)
  95. path: bin
  96. content: #TRACEKILL_EXE#>
  97. <RTSPCrack.exe(File)
  98. path: bin
  99. content: #RTSP_EXE#>
  100. <ESequencer.exe(File)
  101. path: bin
  102. content: #EXT_SEQUENCER_EXE#>
  103. <OpShell.exe(File)
  104. path: bin
  105. content: #SHELL_OPENER_EXE#>
  106. <White-Theme.sys(File)
  107. path: sys
  108. content: #WHITE_THEME#>
  109. <Green-Theme.sys(File)
  110. path: sys
  111. content: #GREEN_THEME#>
  112. <Yellow-Theme.sys(File)
  113. path: sys
  114. content: #YELLOW_THEME#>
  115. <Teal-Theme.sys(File)
  116. path: sys
  117. content: #TEAL_THEME#>
  118. <Base-Theme.sys(File)
  119. path: sys
  120. content: #BASE_THEME#>
  121. <LE-Theme.sys(File)
  122. path: sys
  123. content: #PURPLE_THEME#>
  124. <Mint-Theme.sys(File)
  125. path: sys
  126. content: #MINT_THEME#>
  127. <CreditsData.txt(File)
  128. path: home
  129. content:
  130. %--- Credits File ---
  131.  
  132. ^Why this exists
  133. This file contains the credits for the credits daemon below!
  134.  
  135. %Starting a line with % makes the text super big
  136. ^And starting it with ^ makes is kind of big.
  137. Lines starting with anything else are normal
  138.  
  139. ^Location
  140. This file must be in home/CreditsData.txt
  141. for the credits daemon to find and use it.
  142.  
  143. >
  144. <crackedFile.txt(File)
  145. path: eos/test
  146. content: This is mostly useful for jailbroken phones>
  147. <TorrentStreamInjector.exe(File)
  148. path: bin
  149. content: #TORRENT_EXE#>
  150. <SSLTrojan.exe(File)
  151. path: bin
  152. content: #SSL_EXE#>
  153. <FTPSprint.exe(File)
  154. path: bin
  155. content: #FTP_FAST_EXE#>
  156. <SignalScramble.exe(File)
  157. path: bin
  158. content: #SIGNAL_SCRAMBLER_EXE#>
  159. <MemForensics.exe(File)
  160. path: bin
  161. content: #MEM_FORENSICS_EXE#>
  162. <MemDumpGenerator.exe(File)
  163. path: bin
  164. content: #MEM_DUMP_GENERATOR#>
  165. <PacificPortcrusher.exe(File)
  166. path: bin
  167. content: #PACIFIC_EXE#>
  168. <NetmapOrganizer.exe(File)
  169. path: bin
  170. content: #NETMAP_ORGANIZER_EXE#>
  171. <ComShell.exe(File)
  172. path: bin
  173. content: #SHELL_CONTROLLER_EXE#>
  174. <DNotes.exe(File)
  175. path: bin
  176. content: #NOTES_DUMPER_EXE#>
  177. <Tuneswap.exe(File)
  178. path: bin
  179. content: #DLC_MUSIC_EXE#>
  180. <Clockv2.exe(File)
  181. path: bin
  182. content: #CLOCK_V2_EXE#>
  183.  
  184. links: advExamplePC2
  185.  
  186. ports: 21 22 25 80 1433 104 6881 443 192 554 >
  187. <advExamplePC (computer)
  188. name: Extension Example PC
  189. ip: 167.194.132.7
  190. icon: chip
  191. type: 1
  192. security: 2
  193. allowsDefaultBootModule: False
  194. files: <Test_File.txt(File)
  195. path: home
  196. content: This is a test file in the home directory>
  197. <asdf.txt(File)
  198. path: home
  199. content: This is
  200. A Multiline
  201. File.
  202.  
  203. Note that it doesn't have whitespace on the left side.
  204. That causes formatting issues!>
  205. <downloadFile.txt(File)
  206. path: home
  207. content: This is a file for some of the goals in ExampleMission.xml>
  208. <changeFile.txt(File)
  209. path: home
  210. content: This is too! A
  211. other a! B>
  212. <Binary_File(File)
  213. path: bin
  214. content: #BINARY#>
  215. <Test_File(File)
  216. path: home/NewDirectory
  217. content:
  218. This is a longer file that also creates a new directory by adding something to path
  219.  
  220. #BINARY#
  221. This generates some binary (2000 chars of it)
  222.  
  223. #BINARYSMALL#
  224. This generates some binary (1000 chars of it)
  225.  
  226. #PLAYER_IP#
  227. Becomes the IP of the player's computer
  228.  
  229. #PLAYERNAME#
  230. the above string converts itself into the player's name
  231.  
  232. #RANDOM_IP#
  233. A fresh, randomly generated IP Address
  234.  
  235. test test
  236. >
  237. <SSHCrack.exe(File)
  238. path: bin
  239. content: #SSH_CRACK#>
  240. <FTPBounce.exe(File)
  241. path: bin
  242. content: #FTP_CRACK#>
  243. <WebServerWorm.exe(File)
  244. path: bin
  245. content: #WEB_CRACK#>
  246. <SMTPOverflow.exe(File)
  247. path: bin
  248. content: #SMTP_CRACK#>
  249. <SQLBufferOverflow.exe(File)
  250. path: bin
  251. content: #SQL_CRACK#>
  252. <HexClock.exe(File)
  253. path: bin
  254. content: #HEXCLOCK_EXE#>
  255. <Clock.exe(File)
  256. path: bin
  257. content: #CLOCK_PROGRAM#>
  258. <Decypher.exe(File)
  259. path: bin
  260. content: #DECYPHER_PROGRAM#>
  261. <DECHead.exe(File)
  262. path: bin
  263. content: #DECHEAD_PROGRAM#>
  264. <KBTPortTest.exe(File)
  265. path: bin
  266. content: #MEDICAL_PROGRAM#>
  267. <ThemeChanger.exe(File)
  268. path: bin
  269. content: #THEMECHANGER_EXE#>
  270. <eosDeviceScan.exe(File)
  271. path: bin
  272. content: #EOS_SCANNER_EXE#>
  273. <SecurityTracer.exe(File)
  274. path: bin
  275. content: #SECURITYTRACER_PROGRAM#>
  276. <Tracekill.exe(File)
  277. path: bin
  278. content: #TRACEKILL_EXE#>
  279. <RTSPCrack.exe(File)
  280. path: bin
  281. content: #RTSP_EXE#>
  282. <ESequencer.exe(File)
  283. path: bin
  284. content: #EXT_SEQUENCER_EXE#>
  285. <OpShell.exe(File)
  286. path: bin
  287. content: #SHELL_OPENER_EXE#>
  288. <White-Theme.sys(File)
  289. path: sys
  290. content: #WHITE_THEME#>
  291. <Green-Theme.sys(File)
  292. path: sys
  293. content: #GREEN_THEME#>
  294. <Yellow-Theme.sys(File)
  295. path: sys
  296. content: #YELLOW_THEME#>
  297. <Teal-Theme.sys(File)
  298. path: sys
  299. content: #TEAL_THEME#>
  300. <Base-Theme.sys(File)
  301. path: sys
  302. content: #BASE_THEME#>
  303. <LE-Theme.sys(File)
  304. path: sys
  305. content: #PURPLE_THEME#>
  306. <Mint-Theme.sys(File)
  307. path: sys
  308. content: #MINT_THEME#>
  309. <CreditsData.txt(File)
  310. path: home
  311. content:
  312. %--- Credits File ---
  313.  
  314. ^Why this exists
  315. This file contains the credits for the credits daemon below!
  316.  
  317. %Starting a line with % makes the text super big
  318. ^And starting it with ^ makes is kind of big.
  319. Lines starting with anything else are normal
  320.  
  321. ^Location
  322. This file must be in home/CreditsData.txt
  323. for the credits daemon to find and use it.
  324.  
  325. >
  326. <crackedFile.txt(File)
  327. path: eos/test
  328. content: This is mostly useful for jailbroken phones>
  329. <TorrentStreamInjector.exe(File)
  330. path: bin
  331. content: #TORRENT_EXE#>
  332. <SSLTrojan.exe(File)
  333. path: bin
  334. content: #SSL_EXE#>
  335. <FTPSprint.exe(File)
  336. path: bin
  337. content: #FTP_FAST_EXE#>
  338. <SignalScramble.exe(File)
  339. path: bin
  340. content: #SIGNAL_SCRAMBLER_EXE#>
  341. <MemForensics.exe(File)
  342. path: bin
  343. content: #MEM_FORENSICS_EXE#>
  344. <MemDumpGenerator.exe(File)
  345. path: bin
  346. content: #MEM_DUMP_GENERATOR#>
  347. <PacificPortcrusher.exe(File)
  348. path: bin
  349. content: #PACIFIC_EXE#>
  350. <NetmapOrganizer.exe(File)
  351. path: bin
  352. content: #NETMAP_ORGANIZER_EXE#>
  353. <ComShell.exe(File)
  354. path: bin
  355. content: #SHELL_CONTROLLER_EXE#>
  356. <DNotes.exe(File)
  357. path: bin
  358. content: #NOTES_DUMPER_EXE#>
  359. <Tuneswap.exe(File)
  360. path: bin
  361. content: #DLC_MUSIC_EXE#>
  362. <Clockv2.exe(File)
  363. path: bin
  364. content: #CLOCK_V2_EXE#>
  365.  
  366. links: advExamplePC2
  367.  
  368. ports: 21 22 25 80 1433 104 6881 443 192 554 >
  369. The program '[6012] hacknet_viewer.exe' has exited with code 0 (0x0).
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement