- Fixed regression bug when using connect_ethernet on the player's computer if the attempt to establish a new connection could not be made due to any error (occupied IP, etc.), leaving the current connection in a corrupted state, preventing the connection to the outside from visual programs.
- Improved handling of a player already online after a re-log if they had previously disconnected incorrectly (internet disconnection, power outage, etc.) without having given the server time for auto-removal, avoiding redundancy in the code and potential bugs.
- Fixed bug that could cause the player's computer to not be removed from the router it was connected to in cases such as abrupt server restarts, allowing duplications of the player's computer or even accessing a player's computer without them being connected to multiplayer mode.
- Fixed regression bug that caused ConfigLan to display the message "network mismatch" when applying changes if a hub had been added.
- Fixed bug when the player exited multiplayer mode, which could cause the player's connection to the server not to be properly removed if a crash occurred when closing the scripts.
- Fixed bug in user_input that could cause changes made in the Filesystem prior to the method call to not be updated in FileExplorer.
- Fixed bug that caused the first time a log was generated after being deleted to be empty, instead of containing the action that had created the log.
- Fixed bug that caused the ownership of rentals to be lost, preventing payment cancellation or network deletion from ConfigLan.
- Fixed bug that caused the cooldown information for credential and CTF missions to not persist after a Gameover or player reset.
- Fixed bug that caused the ethernet connection to the home network to not be established correctly when starting the game if it was the last connection used.
- Fixed bug in metalib.overflow that could cause crashes under certain conditions if the exploit had the requirement "Connected in the same local network as the target"
- Fixed bug in ConfigLan after resetting the network, that could cause network corruption after saving changes in portforward configuration.
- Fixed regression bug in ConfigLan when resetting rentals, causing an incorrect restoration and potentially causing crashes when trying to interact with other networks from any computer.
- Fixed bug in Single Player mode when obtaining an FTP shell, causing the terminal to stop responding.
- Fixed bug that caused mission NPC emails to not generate under certain circumstances, also preventing the use of social engineering.
- Fixed regression bug that could cause a crash when accessing a computer with a hidden or karma mission after performing certain actions.
- Fixed issue that prevented clicking on the "source code" checkbox when purchasing exploits.
- Fixed bug that could negatively affect game performance until the player connected to a Wi-Fi network.
- Fixed performance issue when interacting with networks that contained hidden or karma missions.
- Fixed crash when trying to use connect_ethernet while not connected to any network.
- Increased initial coupons to 40 during the nightly build.
- Fixed bug in connect_ethernet that caused a crash when used on an NPC computer.
- Fixed bug that caused the player's computer to not be deleted from the device it was connected to after exiting the game, potentially causing duplicates.
- When reactivating the ethernet card or starting the game, it correctly connects to the ISP network using the last data used instead of the forced IP and gateway addresses 192.168.0.2 and 192.168.0.1, respectively.
- Fixed bug that prevented the creation of email accounts for NPCs related to a hidden or karma mission.
- Fixed bug that caused repeated information to be added to the UI when using connect_ethernet from the ISP multiple times.
Hi people! As you may have noticed, there have been no changelogs on Steam for a while for the nightly build. Due to the special nature of this nightly build, new updates are being released almost every day, especially related to regression bugs caused by the massive changes made in the game's backend. So in order to not spam the news section during this time, the changelog have only been published on Discord.
Fortunately we are getting closer to the merge since the most critical bugs have been fixed, so I think it's a good idea to start posting the progress of the nightly build here again, although I will only publish the changelog here once a week with a summary of the previous updates to avoid spamming. Thank you for your constant support!
Changelog
- Fixed a regression bug that caused a crash when accepting a CTF mission.
- Fixed a bug in the hidden and karma missions that could cause a crash when accessing these networks multiple times.
Previous changelogs of the week
- Fixed Bug #1024: Hidden and Karma missions generating without files and attachments on first public router and can't be completed
- Improved backend for future database maintenance tasks
- Fixed bug in connect_service that did not allow connecting from the outside to a CTF network.
- Fixed bug that caused the rates to reset after unpublishing and republishing a CTF event.
- Fixed regression bug that could cause generated networks from hidden and karma missions to lose saved data after generation
- Removed restriction of not being able to obtain remote routers from CTF networks
- net_use cannot connect to external networks from CTF networks
- Fixed bug that could be exploited to obtain a reward multiple times
- rhsell_server cannot be started in CTF networks
- A window with information is displayed when opening the CTF website for the first time
- Fixed bug in ExploitReport.exe that could cause issues if the name of the exploit contained any HTML tag.
- Moved the creation and management of CTF events from scripting to the Hackshop web.
- The following scripting methods have been removed: CTF_Event.set_config, CTF_Event.publish, CTF_Event.unpublish, CTF_Event.delete_event.
- You cannot create CTF events using a template that is already in use in another event.
- Fixed Bug #915: Length of wallet password could exceed 16 characters.
- Fixed Bug #916: Wallet password reset does not update accounts information.
- Fixed bug that caused the player's computer to disconnect from WiFi when installing a new WiFi card in a rental with only one PCI slot.
Exploit system and apt-get changes has been reverted to the public version. Development of the partial objects will continue in future experimental builds. Thank you for the feedback!
Previous Server Updates
- Fixed bug that prevented the email and bank passwords of players from being deciphered.
- Fixed bug that could cause script actions such as creating files, deleting or renaming not to be saved correctly if there was another script calling file.set_content on a file in the same filesystem at the same time.
- Fixed regression bug that caused libraries in hackshops to not update correctly to the latest version, causing apt.check_upgrade to always return true for the libraries metaxploit.so, librshell.so, and crypto.so
- Fixed regression bug that caused the content of files to be lost when moving the folder containing them to another location
- Substantial improvement in the generation of vulnerabilities and results obtained from exploiting in order to have consistency in the blocking and unblocking of different exploits.
Server Updates
- Restored print replace_text option in scripting
- Fixed bug that caused prints called before certain actions to not be printed, such as deciphering or scanning libraries among others.
- Fixed bug in shell.launch causing sometimes the program to be launched to not be processed correctly, causing performance problems and unexpected behavior in some methods such as print.
- Fixed bug that could sometimes crash metalib.overflow when obtaining a pshell
- Improved the generation of requirements in vulnerabilities so that the player can activate or deactivate certain exploits based on their interaction with the system, creating a more dynamic attack and defense system.
- Added new vulnerabilities and modified some of the existing ones.
- Fixed bug that allowed to execute methods not available in the partial object.
- Removed prouter object.
- Fixed bug that allowed changing the version of a service only by manually replacing the libraries.
- Exploit System Expansion: New vulnerability added that can return any of the following partial objects: pcomputer, prouter, pshell, pfile. NOTE: this system will be adjusted and changed in future updates.
These partial objects have access to a limited number of methods of their normal variant. The methods that are accessed on each partial object depend on the vulnerability. metalib.overflow needs to be called like any other vulnerability to know what type of object it returns and what methods it can access. In the case of obtaining a pfile, metalib.overflow must be provided with a path to the desired file
- Added option to choose the version of the library that you want to install from the official repository. For example apt-get install libssh.so=1.0.2 NOTE: This option will be extended to player-created repositories in future updates.
- To change the version of a service you have to install it again, choosing the desired version. The code of ssh-server, chat-server, repository-server, ftp-server, rshell-server has been updated to reflect these changes.
- Trying to change the version of a service by copying another library into /lib after its installation will return an error when trying to connect to the service or "unknown" when scanning it.
- It is only allowed to install a service whose version of its associated library is among the last 20 most recent.
- Added the following methods in the net_session object: get_num_users, get_num_portforward, get_num_conn_gateway, is_any_active_user, is_root_active_user
- Fixed regression bug in aireplay when using the max acks argument, stopping the script instead of continuing its execution.