I'm not even sure myself how it works, but I believe it goes like this
First you need to obtain the adresses of the lifting servers, ACS, Gateway system and backup servers related to the target, which you can usually find in the links section of an Internal Services Machine.
After that, you must break into the Lifting servers, access its file server, and ENCRYPT the system files. Do not delete them, because the purpose of a Lifting server is to restore deleted programs. If it can't run itself (because it's unable to decrypt itself), then it won't restore the system files to any system connected to it.
If you are unable to break into a Lifting server, then you need to hit the Lifiting servers with a Denial attack.
Next, you must break into the ACS file server, and copy ALL programs you need for breaking into the mainframe/PC into the ACS file server. Sometimes it will randomly delete some files, so you need to go back to the ACS and copy the files again.
Then you just crash the gateway system, the backup server, and do whatever you want with the target.
EDIT 5-1-2015
You need about 40 Denial users to deny Lifting servers.
As it turns out, there is a list of programs that have to be validated first.
The console is locked behind VSEC, so there must be something juicy there.
Since this is an unfamiliar filesystem, the ACS might have some console commands you were not aware of at first. Maybe you should type 'help' in the console, for that a-ha moment.
|