SHARE
Labyrinths

Hacknet is a refreshingly grounded take on the hacker-sim genre. With a crude, Linux-inspired interface and dark, driving soundtrack, it follows the story of a recently deceased hacker named Bit, who reaches out to you from beyond the grave. What follows quickly becomes a hive of building tension and a satisfying deep-dive down the rabbit hole of online security and its moral effects on society.

Initially released in August 2015, Hacknet is now seeing its first expansion: Labyrinths. This entirely new chapter takes place alongside the main story and opens up soon after you’ve cleared the tutorials of the main game. In addition to granting you new hacking tools and techniques, it provides even more challenging investigations that require some serious attention to detail.

Missions in both Hacknet and Labyrinths range from straight-forward break, enter, and delete jobs to thorough investigations that involve finding vulnerabilities in order to crack into secure networks with numerous, heavily-encrypted servers. You’ll read files you shouldn’t be reading, steal confidential software, rummage through memory dumps for valuable information, and counter incoming hacker attacks amongst myriad other activities. Labyrinths is far tougher than the main campaign in this regard, though, since it doesn’t waste any time throwing you into the deep end and relies on experience with previous puzzles.

Hacknet’s reliance on typing to navigate means you’ll want to break out a real-life notepad or smartphone camera to keep track of the commands available to you. Almost all the puzzles involve breaking through network security to find a specific piece of information, which means first cracking that system’s ports by using various executables from the command-line to grant you administrator access. Once in, you are free to browse, move, rename, delete or copy files, as well as scan for other linked systems on the network.

The challenge is that on top of taking up valuable time, these executables also take up a chunk of system memory while they’re running, so identifying the most economical order to run them is key to hacking efficiently. It doesn’t take long for hostile tracers to start pushing back on your progress,

 » Read more