STATISTICS

Start Year: 1995
Current Year: 2004

Month: March

2 Weeks is 1 Month
Next Month: 14/04/2024

OUR STAFF

Administration Team

Administrators are in-charge of the forums overall, ensuring it remains updated, fresh and constantly growing.

Administrator: Jamie
Administrator: Hollie

Community Support

Moderators support the Administration Team, assisting with a variety of tasks whilst remaining a liason, a link between Roleplayers and the Staff Team.

Moderator: Connor
Moderator: Odinson
Moderator: Vacant


Have a Question?
Open a Support Ticket

AFFILIATIONS

RPG-D

[Taiwan]: Exercise Red Citadel

D

Deleted member 5

250px-ROC_National_Defense_University_Logo.svg.png

National Defense University
"Exercise Red Citadel"

TOP SECRET

Course Name: Advanced Cyber Warfare
Skills trained: Defensive & Counter Defensive Cyber Warfare
Location: Somewhere in Taoyuan City, Taiwan
Training Funds: $50,000,000.00
Exact Location: TOP SECRET

INVOLVED UNITS
Organization (Participant)Units & Number

National Security Bureau (NSB)

200x Cyber Warfare Specialist

Republic of China Army Special Force

200x Army Special Ops

EQUIPMENT EMPLOYED IN EXERCISE RED CITADEL

ASUS Latest Generation Laptops

eGuardian – A PKI-enabled Encryption Tool

Intranet Virtual Desktop Platform

Intelligent Surveillance System (ISS)

Cyber Security and Monitor

images

The course lasts 2 full weeks, afterwards the following their increments will increase, indicating they mastered the given skill: Cyber Warfare and will be a part of NSB Special Activities Division.
 
D

Deleted member 5

After the last Basic Cyber Warfare Course, 400 NSB Agents & Army Special Operatives were selected from both National Security Bureau and Republic of Chinese Army Special Forces to continue their training with the specialization in defensive and counter attacking countermeasures in cyber warfare. These agents would be enrolled into National Defense University as IT students, however, classes would be funded separately from the rest of the university, and classes would be taught separate. Both NSB agents would be taught advanced cyber warfare techniques, such as how to perform successful Brute Force SSH attacks, IP spoof effectively, how to locate IPs with relative ease, DDosing and creating proxy server. A variety of other skills would be taught to them, enhancing their ability to hack and defend from hacks.



Apart from these above skills, these NSB Agents and Army Special Operatives will learn the following topics to master the cyber warfare techniques:
  • Coding
  • Scanning for running programs or Open Ports for firewall exploitation
  • Virus Creation
  • Removing Digital Footprints and tracing attempts
  • Creation of Ransomware
  • Creating backdoor to systems

Furthermore, these techniques will be helpful for when counter attacking a nation or terror groups. By having cyber warfare techniques, these NSB agents and Republic of China Army Special Operations personnel can successfully prevent such an attack and keep Taiwanese soil and integrity safe from China and various belligerent nations in the future.
 
D

Deleted member 5

These agents' progress would be going ahead fine for the first section of the course, and agents would be learning computer codes, and advanced techniques for Cyber-warfare taught by many notorious hackers recruited for the course. The agents would have learned how to IP spoof more effectively, adding several layers on top of each other, so in case one IP spoof is unscrambled, the second layers would kick in to hide the IP, the third layers afterwards and so on.

Secondly, Agents had already got the hang of creating successful backdoor proxy servers with lower risks of being detected by systems, to test their ability to do so, they were allowed to use a test version of Taiwanese SIEM systems that is creating the proxy and systems continually scanning the servers. They would not stop until they could successfully create a backdoor proxy server which could not be detected.




These NSB agents & Army Special Force Operatives would take classes periodically throughout the day, they would be given sufficient meal times and break times. After classes had ended, agents would be assigned homework to complete and revise to help them remember things they had learned throughout the day. Their performances would be tracked, and any agents who were falling behind would be given extra homework and classes to help them catch up. Their first tasks would be in the advanced stages of DDoS attacks, and how to perform them automatically using scripts to do the work for them, making DDoS attacks quicker, more efficient and less likely to be blocked. The agents would be shown how to create such scripts, enhancing their knowledge in computer languages as well.
 

Jamie

Admin
GA Member
World Power
Jan 6, 2018
11,641
NATIONAL ECONOMICSBilled
THREAD HAS BEEN CHARGED
 
D

Deleted member 5

Student's progress would be going ahead fine for the first section of the course, and agents would be learning computer codes, and advanced techniques for Cyber-warfare taught by many notorious hackers recruited for the course. The agents would have learned how to IP spoof more effectively, adding several layers on top of each other, so in case one IP spoof is unscrambled, the second layers would kick in to hide the IP, the third layers afterwards and so on.

Secondly, Agents had already got the hang of creating successful backdoor proxy servers with lower risks of being detected by systems, to test their ability to do so, they were allowed to use a test version of AAI and SIEM systems, with AAI systems creating the proxy and SIEM systems continually scanning the servers. They would not stop until they could successfully create a backdoor proxy server which could not be detected.

Furthermore, the efficient uploading of viruses and junk mail, also known as 'Malware uploads' and 'DDosing' respectively would be taught to the NSB agents and Army Special Operations Personnel, however, they had not yet mastered, or even become experts in such techniques, still only grasping the basics. They would be taught these things at a later date in order to become more effective and ensure that there is a lower chance for the uploads or the DDoS to be blocked. The scenario would be given to hack the Communist Party of Egypt Server. This is the real life scenario that each agents should learn when their country fall under the cyber attack. NSB & Army Cyber Command Specialists would monitor the Intelligent Surveillance System (ISS).

IP address of Communist Party of Egypt has been spoofed by NSB Agents and Taiwanese Army Special Operations Cyber personnel. They would continue to strengthen their firewall, created a virus named "Anubis (أنوبيس)" which has been travelling through the Communist Party of Egypt servers. CPE would not know who has been hacked their system.After the servers infected by Anubis (أنوبيس) , the servers of CPE (Communist Party of Egypt) were shut down. Using Brute Force, the agents would get accessed all servers that is contained password, rerun the virus scan until complete. In the meantime, they would use following codes to learn that would solidify their attacks further. Firewall would be stronger again so that CPE can't attack the Taiwanese National Security Bureau and Army Special Operations Cyber Command.
 
D

Deleted member 5

Following the Scenario-based cyber attack, Anubis (أنوبيس) virus would freeze CPE website and placed with "How to make a Birthday Cake recipe". These NSB Agents and Army Special Operations Cyber Specialists would immediately made CPE website down and placed SpySheriff. SpySheriff is is malware that disguises itself as an anti-spyware program, which attempts to mislead a user into buying the program by repeatedly informing them of false threats to their system. As it is difficult to remove from the CPE servers, it created a fake infection warning that popped up in the system. If user clicked the fake warning system, it ultimately gives them blue screen. SpySheriff disguised as "ESET Antivirus Software" and making them purchase to removal of unnecessary virus and bots. As a result, all CPE networks were shut down and restarted with "How to make a Birthday Cake recipe".

NSB Agents and Army Special Operations Cyber Specialists would placed encrypted ransomware into Communist Party of Egypt servers and continue to monitor their servers. As this was done due to contact with Communist Party of Egypt to make them govern and replace the Egyptian Government.

These NSB agents & Army Special Operations Cyber Specialists would focus on quick reactions in order to detect the aggression as soon as possible and cut of the connections to reduce the damage as much as possible.They would work with books, guides and the new official communications system Taiwan is about to release for its internal communication, which has embedded multiple anti-DDoS attack measures to detect almost immediately any hostile attempt.
 
D

Deleted member 5

The agents would come to a point in the training where they were starting to grasp the intermediate levels of everything in their range. IP spoofing, MAC address tracking, Brute Force SSH attacks, Proxy servers, DDoS server, cyber nukes, malware uploads, downloads and other general hacking lingo. Furthermore, additional homework would be handed out to all students every day to ensure they remember what they had learned. All students would be studying hard to make sure they remember these things.

Their professional experience with AAI and SIEM systems grew evermore, they bonded with the systems to ensure that their ability was enhanced tenfold, and its was too. Nothing would be too particular about the middle of the training regime' for the agents, as it was the slowest part. They have mastered different way to shut down the enemy and negating them access to the local communications system. Agents would be approaching the final section of the course. At this point they would have learned several new computer languages and mastered some others, increased their experience in hacking and defense against hackers, and learned how to easily upload/download information to other IP Addresses.


Students would prepare for a final 'exam' on the subject, studying extra hard after class and returning for after school enrichment classes in the subjects they were struggling in. At this point, all Agents/Students had gained lots of experience in the field they were working in, and were on their way to being called 'experts' so to say. In the meantime they would secretly send a fake virus contained message to Egyptian Communist Party.
 
D

Deleted member 5

NSB Agents and Army Special Force Cyber Specialists would make their way to exam hall at 8 am. Prior coming to the exam hall, they sleep and eat well so that they don't have any pressuring regarding to exam mentally. They went over final preparations in their heads as they were briefed on the exam. The exam would start at 9:30 am and the students' fate would be in their own hands, as they had been taught everything they needed. The exam would feature questions written in computer languages, and some questions would ask how to create and IP spoof a proxy server, as well as mask it.

After the exam had finished, they would all be marked and two days later be sent back to be given to the students. Few students had gotten below a A-, many had gotten an A or a A-, and a few hundred had gotten A' s. The agents would get a pay rise and the training would be added to their service record.

Upon completion, these 200x NSB Agents and 200x Army Special Force Cyber Specialists would return their service where they would continue to work.
 

Latest posts

Todays Birthdays

Forum statistics

Threads
21,377
Messages
104,067
Members
359
Latest member
mikhail2001
Top