Tamara
Basics
Name: Tamara
Series/Fandom: Hacknet
Age: 21
Race/Species: Human
Gender: Female
Sexual Orientation: Bisexual
Occupation: CSEC Contractor
Basics
Name: Tamara
Series/Fandom: Hacknet
Age: 21
Race/Species: Human
Gender: Female
Sexual Orientation: Bisexual
Occupation: CSEC Contractor
- Personality
Kind and always willing to help out if she believes it's for a good cause. If asked about the morality of the CSEC operation 'Project Junebug', she simply replies "The man was in considerable pain. The hospital staff were torturing him. I did what I had to do."
She especially hates it when people try to penetrate her system's defenses, the first of such cases being of the cracker (Also known as a "Black Hat" hacker) Naix. Suffice it to say that his systems refused to boot up after she was done with them.
She also loves the Pokemon series, which spawned her internet name "Kirlivoir".
- History
Tamara was a normal girl living on her own, until about three months ago when her computer received a secondary operating system called "Hacknet". Not knowing what it was (And being somewhat clueless about computer security at the time), she started it up. Once it finished booting, a message showed on the screen:
- Hacknet Startup Message
-
-14 DAY TIMER EXPIRED : INITIALIZING FAILSAFE-
--------------------------------------------------------
Hi.
...
This is strange... Stranger than I expected.
I guess I'm supposed to write this in past tense, though I hardly feel like admitting it's over.
My name is Bit, and if you're reading this, I'm already dead.
The message then faded, and the OS booted up its UI. Tamara had no clue what was going on, but she, under her internet handle of "Kirlivoir", she set out to find out what happened to Bit and why she received this OS.
Bit's automated messages directed her to a group called Entropy, a small group of hackers set on improving the world and its view on the hacker society. After completing several contracts there, she was pointed to a more advanced group known as CSEC, who did similar things to Entropy, but contained much more advanced hackers, as they were an exclusive, invite-only group. She passed their test gauntlet, and has been working for them full-time to the present day.
As Tamara searched for any clues as to who Bit was and what he did, she was contacted by another CSEC member, Vap0r, who was friends with Bit before his disappearance. Together they poked around his servers, and discovered that he was working for EnTech (Who was at best known for, in Vap0r's words, "A mediocre security program").
More prodding led to the discovery that they were working on a much more secure program (Whose inclusion in their servers also prevented Tamara and Vap0r from poking around in several places) called EnSec, which is what Bit was helping them work on. Rather, he was building software to test EnSec, which led to the creation of the Hacknet OS, which was never meant to be released in the first place.
Bit started having concerns about Hacknet getting out to the general public by accident, and wanted to quit the project. One of the executives at EnTech wanted him to reconsider, and sent some unknown assailants to persuade him. Unfortunately, they misunderstood his request as an order for termination. By the time he could correct this misunderstanding, Bit had been killed.
As Bit's final request, he wanted anyone who could get into EnTech's mainframe to break in and delete all files related to Hacknet. Working together to exploit a flaw in the mainframe's security, Tamara and Vap0r managed to fulfill this request, leaving Tamara with the sole copy of Hacknet.
Tamara currently uses the Hacknet OS to help anyone she can, by doing what she now does best: Hacking into remote systems and modifying/downloading/deleting their contents. - Equipment
The Hacknet OS. This operating system is equipped with many programs that attack and open ports on remote computers, including:
SSHcrack (Port 22)
FTPBounce (Port 21)
SMTPoverflow (Port 25)
WebServerWorm (Port 80)
KBT_PortTest (Port 104)
SQL_MemCorrupt (Port 1433)
Hacknet also contains a program called "PortHack" which, once enough ports are opened (Amount depends on system security) can break in and log her computer in as an administrator on the remote computer.
These programs cannot be run if there is a firewall or proxy in their way, however Tamara has ways to bypass each of those as well:
- To bypass proxies, she creates Shells on computers where she is already an admin. These shells can then be told to overload a given system's proxy server, allowing her to disable it.
- To bypass firewalls, Hacknet has the "Analyze" command, which examines the header of the firewall. The first analysis pass contains random letters and numbers given by the firewall, with a row for every digit in the password. Consecutive analyses examine the digits, and rules out ones it knows for sure are not part of the password. Once she finds and inputs the password, she is allowed through.
In addition, it also has two security measures built into it. Shells can be placed on computers where she is an administrator, which applies to her computer as well. If she finds an unwanted connection to her computer, a shell may be trapped and triggered. Once triggered, the shell will execute the "ForkBomb" command on any connected computers, crashing them. She can also use ForkBomb on her own as well, to force a reboot on a given computer.
Hacknet also has one more defensive measure built into it. It can detect when a computer is tracing its signal, and will show how long Tamara has left before a trace is completed. If it detects a completed trace, it will initiate a failsafe system - Using automated screening procedures, it will delay the trace temporarily, to keep her geographical location hidden. As the completed trace means that her IP address is now known by her attackers, she must connect to her ISP's server, hack into it, and change her IP address. If she cannot complete this action by the time the failsafe procedures are bypassed, Hacknet's final resort is to wipe her computer clean. If she succeeds, the system immediately disconnects to remove the active trace, and reboots.
no slide - To bypass proxies, she creates Shells on computers where she is already an admin. These shells can then be told to overload a given system's proxy server, allowing her to disable it.
- no slide
She has obtained one more program from her work at CSEC, which is called TraceKill. When active, it completely halts the progress of any active trace. However, it is an extremely advanced program, and takes up nearly all of her computer's memory in order to run. No other programs can be run while TraceKill is active. As a result, she rarely uses it, and commonly forgets that it's even on her system in the first place.
- Skills
Using the Hacknet OS, she can penetrate almost any system's security, with the exception of systems that have the security program "EnSec" installed. Other than that, she's just a regular Human.
Theme Song
[media]
[/media]
Last edited by a moderator: