06-16-2014, 07:03 AM
Spy_Guy Wrote:If you ask me, "big reveals" are just called for by people who have no clue what they're doing and want instant gratification. A change actually went in that's made su-spoofing so much easier nowadays.Piping things to a file isn't mentioned in any of the DWAINE help files, the TermOS help files, or the DWAINE book. It's something that you can't discover with any amount of sitting in tech storage playing around and reading help files - without having a "big reveal" from an outside source such as a forum post or a wiki article, it's impossible to discover that piping things to a file even exists, let alone why it's useful (and since it's required for maybe a third of the stuff DWAINE can do, that's a lot of totally undocumented functionality hidden behind a totally undocumented function).
Except nobody touches it because all they see are these strange, arcane terminals with letters on them and can't be bothered to find out how to use them. There are very comprehensive guides on the wiki that got me started down the road of spoofing shuttle call / recall requests. The rest was all applying pre-existing knowledge and trying to work out a solution.
DWAINE is unix-based. Find a guide on it and read up.
Use the help command and it'll tell you that you can use it with a parameter to find out more about a particular command.
Do you want to mess with packets? Go into tech storage, plop the packet sniffer down, then just do stuff to DWAINE and see what packets get sent.
In short, instead of complaining that the more advanced applications of DWAINE are impenetrable, spend the time actually learning how to use it.
For every person spending their rounds in tech storage poking at DWAINE there are at least five sitting at the forums complaining about how difficult it is.
Same goes for spoofing your access. Even with a big document full of sniffed packets, including several sniffed login packets, I never would have figured out how to spoof a login without someone telling me how, because having a copy of a packet isn't nearly the same as knowing how to get the system to send a similar packet on your own. It's not like PDA hacking where you can specify and send the exact packet you want down to the letter.