HELIOS

From Game Detectives Wiki
Revision as of 21:05, 5 December 2021 by BlueOrbit (talk | contribs) (Initial post - to be curated and improved in coming hours as more info is discovered)
Jump to: navigation, search


DSCS III A3
Active since 2021-12-05
NewExample3.png
Type Official
Creator Alice & Smith
Discovered 2021-12-05

Main Page > List of Investigations > HELIOS

Day 1

At 03:24 on 2021-12-05, the Alice & Smith (A&S) Twitter account tweeted "WARNING - DSCS III A3 access has been authorized. Good Luck and Godspeed." with a link to the A&S Discord.

This was followed up at 17:05 with a second tweet stating "UPDATES | Dec 5th | - DSCS III A3 IRC TOR uplink and RTMP FEED updated to version 636f-rev1.". The referance to an RTMP feed led players to a Twitch stream titled HELIOS Task Force on the dscs_iii_a3 channel.

The stream contained an interactive terminal which users could enter commands into and get responses from. The initial terminal upon loading the stream was:

Setting hostid: 636f-rev1...
Entropy harvesting: interrupt ethernet
Fast boot: skipping disk checks
Mounting remote file systems
Starting network: DVB-TEXT DSCS-III-A3
Uplink Parameters: 7600 mhz - 7604 mhz
Additional TCP/IP options: .sgov=1
Starting IRC TOR PID
Manual: www.intelink.sgov.gov/wiki-ts/cmd-636f
Starting background file system check in 60 seconds

Clicking on the icon to the right of the stream for the Helios terminal popped up a Twitch window describing it. This included a note saying that the command HELP should be used to start. Entering this into the terminal resulted in:

Available commands:
  version
  coredump
  help
  <ACCESS DENIED>
  <ACCESS DENIED>
  <ACCESS DENIED>
Enter ‘help <command>’ for more information

Typing in help version and help coredump resulted in the following:

help version
Command help for: version
Displays the version details for DSCS_III_A3

help coredump
Command help for: coredump
Output a module's memory state
Enter ‘coredump <module>’ to execute

Players then ran the version command, which gave them a hexadecimal code output.

DSCS_III_A3 Version
63 6f 6d 6d 61 6e 64
20 27 71 75 65 72 79
27 20 73 75 70 70 6f
72 74 20 3d 20 31 00

Converting the hexadecimal code to text produced the message command 'query' support = 1. This new command could be confirmed by typing in help query

Command help for: query
Displays data relating to query subject
Enter ‘query <module>’ to check for system status
Latest system inventory: chks1029

By querying the latest system inventory noted on the last line of the output, players received info regarding several key systems:

ERROR: chks1029 format type table
  31575 | Factory Main Door
  25798 | Security Terminal
  75879 | Main Control Room
  59579 | Nuclear Blast Door
  99879 | Lights Out Factory
  65548 | Assembly Line Alpha
  65549 | Assembly Line Beta
  65550 | Assembly Line Delta
  65551 | Assembly Line Gamma
  75998 | Site Alpha
Invalid query for module 'chks1029'

Attempting to query most of the provided ID numbers would result in unknown commands, however entering query 31575 would output:

Query Module 31575
Status Request - Factory Main Door
Authorized commands:
  execute 31575 -open -<door access code>
  execute 31575 -close -<door access code>
Please stand by...
Module Status: Online

Players who ran the command coredump 31575 would be provided with a list of 9 pages of data to sort through

WARNING: memory coredump for 31575
Generating files...
180 entries / GRID 20 by 9
  coredump -read 31575.page1
  coredump -read 31575.page2
  coredump -read 31575.page3
  coredump -read 31575.page4
  coredump -read 31575.page5
  coredump -read 31575.page6
  coredump -read 31575.page7
  coredump -read 31575.page8
  coredump -read 31575.page9
Process successful