1. 3

    Back to working on a hacking simulator side-project. It’s a “game” per-se with the intent of being a rogue-like (systems are hacked through for some purpose). Exploits can be employed as counter-measures to system security, with the UI being a console with a chat window to lead the “player” along. Commands are UNIX-like, but simplified.

    1. 2

      Neat! I was working on a very similar game back in the day, but never really got too far past the initial UI (for time commitment reasons, frankly). I actually arrived on the idea of making the UI accessible by SSHing into a game server, which would then put you directly into a shell process, which itself was the game. This provided a zero-installation game experience that I thought would be neat.

      Anyway PM me if you want to chat more about your ideas!

      1. 1

        Very cool! Deploying through SSH is a great idea and could open the world up to multiplayer (network attack and defend).

        One area that I’ve struggled with is how to achieve balance. One of the first exploits that you can apply in the game is the “sleeper” exploit which puts a security process (like a sentry) to sleep so that it can be killed. Once security is removed, other operations are possible like getting files (bitcoin) or pivoting to other nodes accessible from this node. I assume that other security processes would have higher security and the sleeper exploit would not work. But finding that balance between measures and counter-measures is difficult (outside of simple rock-paper-scissors mechanics).