I've come up with a decent outline for the game, but before i have a template made, and start coding it, i would like your guy's ideas. Here's the outline:
Code: Select all
Scenario:
You are a hacker. You are connected to the internet, amongst many other hackers. You have the capabilities to purchase hardware updates, new software, better internet connections, pc peripherals, a car, a new computer, etc. You can sell most of the things that you have (run your own 'shop'). You have a place of residence, where people can stop and connect to your wlan, and attempt to hack your computer without internet speed limitations. You may have clans, but they are limited to [20] people. The benefits of having a clan are as follows: You may share software, and cash, communicate privately with a small message board. Possible other clan features as well.
Main features:
-Community board
-Official Tutorial
-Virtual computer console (Emulate a shell)
-Buy/Sell items
Side features:
-Clans [max: 20 people]
-Certain things can only be done in the virtual console (VC)
-Hack opponents computers from their own wlan
-Ability to configure wireless router, if you own one.
-Private Message Board
-Computer MUST be running at least [2] services (to ensure a minimal amount of vulnerability)
Suggestions:
-Receive missions from NPC's?
-Bank account (hackable), only certain amount of money allowed to be stolen per person...
-Easter eggs, such as web servers with hidden ports that may contain free software, or tips for missions...
Questions:
-How will hacking work?
-Wireless - Will need several programs to sniff and send IV's, crack the iv's, retrieve wireless information (type of encryption, etc...)
-Virii, RATS? - Virii slowly leaches money from their bank account? RATS log the IP's the person visits, lists the programs on the persons drive, etc.
-Brute Forcing - Cannot be done while person is logged on due to the fact that this LIGHTS up the logs. Will leave a large log file.
-Exploits? - Will leave an 'odd' entry in the log, will bypass software, but in turn, your exploit script is copied to the enemies hard disk.
-Keylogger - Will send the username and password of all running services on the machine. Afterwards, a log entry is left with your IP and a warning that 'sensitive information' has been sent.
-Other possibilities/changes? Suggestions welcome.