The following is a list of Commands in Hacknet.
There are various commands that help the user to perform certain tasks. These commands are to be typed in the terminal of the game.
Commands Page 1 Edit
help [PAGE NUMBER] - Displays the specified page of commands. Edit
This command helps the user to navigate between the different pages of the help menu. There are three pages that is reached by replacing the [PAGE NUMBER] with 1,2 or 3.
Example: help 2
scp [filename] [OPTIONAL:destination] Edit
Downloads the selected file to the main server you are connected from. The downloaded files are by default placed in the ~/home directory. Programs(.exe), System files(.sys) are placed in ~/bin and ~/system respectively.\hack sit
Example Syntax: scp encrypt.dec bin/
This command will scan the computers that are connected to Machine you are currently accessing. This command requires admin access on the accessed Machine.
Example Syntax: scan
rm [filename (or use * for all files in the folder)] Edit
This command is to remove files within the current directory. Using the suffix "*" will remove all files from the current directory. This command cannot however delete the folders within the directory.
Example: rm Jhon_Boorman.txt
Example: rm *
Shows the current processes that are running. It also displays a number for each process, which is called the PID.
kill [PID] Edit
It is used to kill a process that is running. The PID of any process is added after the command to remove or abort the process.
Example: kill 102
The command is used to navigate between the folders of the machine. There are two variations on how to use this command. One is to navigate into a directory, and the other is to navigate out of the current directory. Adding the folder name as a suffix will allow the user to navigate into a directory. However, Adding two dots as the suffix allows the user to navigate out of the folder. Using the command followed by a slash "/" brings you immediately back to the root directory.
Example for navigating in: cd PRIVATE
Example for navigating out: cd ..
mv [FILE] [DESTINATION] Edit
The command is used to move or rename a file in the current working directory.
Example for renaming: mv home/FOF_screenplay.doc home/FOF231_screenplay2.dec
Example for moving: mv home/FOF_screenplay.doc bin/FOF_screenplay.doc
Connect [ip/hostname] Edit
This command is used to connect to different machines with an IP or Domain.
Example: connect 184.108.40.206
Commands Page 2 Edit
This command scans the ports that are open and also shows if there is a firewall and a proxy system present.
Shows the available programs, even the ones hidden, that are able to be executed. All executables are to be present within the ~/bin folder to be executed.
disconnect (dc) Edit
Cuts connection to the current remote machine, stopping a trace but usually resetting all hacked ports as well.
replace [filename] "target" "replacement" Edit
This command is to replace the text in a file. The file may or may not be specified if the file is currently open. If not specified, the command assumes the open file to be the working file. The target and the replacement should be written in between the quotes for long text.
This command is to analyze the firewall to find a password that allows the user to bypass the firewall of the connected computer. 6 passes are usually required to acquire the password of the firewall.
Each row (when sufficiently decoded) reveals a new letter in the password , read from top to bottom.
solve [FIREWALL SOLUTION] Edit
This command is user to enable the traffic of the computer after supping a password that is found using the "analyze" command.
Commands Page 3 Edit
This command is used to gain admin access of the connected computer if the user knows the login ID and the password of the user in the current system.
upload [LOCAL FILE PATH] Edit
uploads the file from the user's computer to the targeted location. The targeted location is assumed as the open folder in the current machine.
Example: upload home/FOF_screenplay.doc
Miscellaneous Commands Edit
Fills up the RAM of the target computer with garbage, crashing it.
Shows any notes stored on your server on RAM
Allows access to a system after opening all of the required ports
Starts up a shell, which can be used to overload a server's Proxy
Starts the tutorial sequence
Append [file] [string]Edit
Add string in a new line in the file