Uplink/Missions

A variety of generic missions can be accepted from the listing on the Uplink Internal Services System. This guide will give you an idea of what software and techniques will be needed to complete each mission. The missions are listed by category, as many of them are nearly identical.

Delete a file

 * Mission Descriptions:
 * Break into a rival computer system and sabotage files
 * Hack into a computer and delete Key files
 * Find and destroy crucial data on a mainframe

Uplink Ranking: Beginner Difficulty Rating: 2 Required Software: Password Breaker, File Deleter

This mission type is the easiest by far. It's a good idea to bounce the connection a few times, as always, but not much time will be needed to complete the mission. Crack the password and access the file server. Locate the file mentioned in the mission e-mail, then delete it. Cover your tracks and send a reply to receive payment.

Copy a file

 * Mission Descriptions:
 * Access a remote system and copy important data files
 * Steal important data from a rival companies file server
 * Gain Access to a rival system and steal research files

Uplink Ranking: Beginner - Novice Difficulty Rating: 2 - 3 Required Software: Password Breaker, File Copier, Decrypter (for difficulty 3 only)

This mission type is very similar to previous one, however instead of deleting the file, copy it to the Gateway's memory. Cover your tracks as usual. If this was a difficulty 3 mission, the file may be encrypted. If so, use a decrypter program to remove the encryption. Then reply to the employer, including the file as an attachment.

Change academic records

 * Mission Descriptions:
 * Improve our associates' academic standing
 * Help us prove a fellow employee is over-rated
 * Generate a University Degree for a friend
 * Qualifications required for wealthy professional

Uplink Ranking: Novice Difficulty Rating: 3 Required Software: Password Breaker

This mission type requires hacking into the International Academic Database. This server has very low security. If you have a monitor bypass, log in as the "readwrite" user, since this will avoid triggering an active trace at all. It is important to note which type of qualifications the employer wants changed. If they want a grade changed (giving the target an 'A' in a class, for example), this goes in the first field. If they want a degree changed (perhaps giving the target a Class 1 degree), this goes in the second field. If they want a qualification added, this goes into the third field. Click on the "Commit" button to save any changes. Cover your tracks and reply for payment.

Tip: If the trace is slow enough, multiple records can be modified in one attempt. When finished with one record, click "Done" to return to the entry screen and perform another search.

Change social security records

 * Mission Descriptions:
 * Create part of a new identity
 * Falsify a Social Security Document

Uplink Ranking: Confident Difficulty Rating: 4 - 5 Required Software: Password Breaker, Proxy Disable/Bypass v1.0

This mission type requires hacking into the International Social Security Database. This server has somewhat better security than the academic database. If using a proxy disable program, start that first, then start the password breaker as soon as the active trace begins. If you have both monitor and proxy bypass, log in as the "readwrite" user, since this will avoid triggering an active trace at all. Once in, search for the target. The last field, "Personal Status", is the one that needs to be modified. As before, click on the "Commit" button to save changes. Cover your tracks and reply for payment.

Tip: If the trace is slow enough, multiple records can be modified in one attempt. When finished with one record, click "Done" to return to the entry screen and perform another search.

Change criminal records

 * Mission Descriptions:
 * Help to stop a hacker from ever working again
 * Help to discredit one of our rivals
 * Clear a criminal record

Uplink Ranking: Intermediate Difficulty Rating: 5 Required Software: Password Breaker, Proxy Disable/Bypass v1.0, Decypher v1-v3

This mission type requires hacking into the Global Criminal Database. It has even better security than the previous government servers. If you have both monitor and proxy bypass, log in as the "readwrite" user, since this will avoid triggering an active trace at all. If using a proxy disable program, start this first, then start the password breaker as soon as the active trace begins. Use the decypher program to crack the elliptic curve encryption cypher. Once in, search for the target. To add to a criminal record, type the desired conviction into the field at the bottom and click on the "Add Conviction" button. To clear a record, click on the "Clear Record" button. Cover your tracks and reply for payment.

Tip: If the trace is slow enough, multiple records can be modified in one attempt. When finished with one record, click "Done" to return to the entry screen and perform another search.

Find financial details

 * Mission Descriptions:
 * Client interested in financial data on an enemy
 * Find Financial Details of one of our associates

Uplink Ranking: Intermediate Difficulty Rating: 5 Required Software: Password Breaker

This mission type requires hacking into one of the bank servers. Banks are notorious for their very quick passive traces, so be sure to cover your tracks quickly once you disconnect. The employer will include a the bank IP address and account number to be hacked. Connect to the bank, select modify existing account, then type in the account number before running the password breaker. Once in, access the account summary. The employer wants either the balance or loan amount, so be sure to get the right value. Reply with the requested value to receive payment.

Tip: If asked for the loan amount, try replying with "0" before beginning the hack. Many accounts don't have a loan, so this may save some time.

Destroy a database

 * Mission Descriptions:
 * Destroy corporate data of a rival company
 * Destroy customer records on a sales system
 * Destroy rival software in development

Uplink Ranking: Intermediate Difficulty Rating: 5 - 6 Required Software: Password Breaker, Firewall Bypass/Disable v5 and File Deleter OR Proxy Bypass/Disable v5

This mission type requires hacking into a corporate server with varying levels of security. If the target system is a LAN, that software will also be required. This mission can be completed in a number of different ways, depending upon software and preferences.


 * 1) If using only the proxy defeating software: Once the proxy is down, access the admin security settings and disable the firewall from there. Then either:
 * 2) access the file server and delete the all files on the server using a file deleter,
 * 3) or access the admin console and type "cd usr" to enter the user files directory, followed by "delete" to destroy all user files.
 * 4) If using firewall software and file deleter: Once the firewall is disabled, access the file server and delete all files using the file deleter.

Cover your tracks and fast-forward until a story appears on the news server of the Uplink Internal Services System. Then reply for payment.

Copy a database

 * Mission Descriptions:
 * Copy large and secure corporate database
 * Copy proprietary source code database
 * Steal valuable scientific research documents
 * Break into high security system and steal customer records

Uplink Ranking: Intermediate (12) - Knowledgeable (9) Difficulty Rating: 5 - 7 Required Software: Password Breaker, File Copier, Decrypter v7, Proxy Bypass/Disable v5 OR Firewall Bypass/Disable v5 Other Requirements: 60-120Gq of Memory Space

This mission type plays out very similarly to the previous one, except the files must be copied rather than deleted. As a result, it requires a large amount of open memory space. Difficulty 7 missions sometimes require hacking a LAN, but this will be shown in the mission's expanded description before accepting.

As before, there are two basic approaches:
 * 1) use a proxy bypass/disable, then disable the firewall from the admin security settings
 * 2) or simply use a firewall bypass/disable.

Once the firewall is down, copy the target files to your memory. The required files can be identified by their name and file size. They will be fairly large files (7 - 11Gq) and their names will include either "corp" for corporate data, "c???" for customer records, "r???" for research documents, or "softw" for software.

Then disconnect and cover your tracks. Finally, connect the the designated file server, log in with the provided credentials, and copy the files over to there. It is not necessary to bounce this connection, as you are accessing the server legally. Decrypt the files on the server, the reply for payment.

Trace a money transfer

 * Mission Descriptions:
 * Trace a recent balance transfer
 * Trace an unauthorised money transfer

Uplink Ranking: Intermediate (12) Difficulty Rating: 5 Required Software: Password Breaker Recommended Software: Monitor Bypass v5

This mission type requires hacking one or two bank servers. It begins just like earlier missions to find financial details. Hack into the bank server, bypass the monitor (if the program is available), then break the password for the target bank account. Access the account statement and find the recent large transfer. Note down the IP address and account number to which the money went.

Tips: If you need to hang on to information - an IP address and bank account number, for example - start a new email and type the information into the body. Don't bother with an address or subject line, but just click send. The message will be bounced back to your inbox, since there's no recipient. This way you can hang on to any notes until you're done with them.

If the IP address is for the same bank, you'll only need to hack the one server. Otherwise cover your tracks and hack into the bank it points to. Once you've gained access to the receiving account, look up the account details. Finally respond to the employer with the account holder's name to receive payment.

Destroy a computer system

 * Missions Descriptions:
 * Elite agent required for destruction of computer system

Uplink Ranking: Skilled Difficulty Rating: 6 Required Software: Password Breaker, Voice Analyser, Decypher v1-v3, Proxy Bypass/Disable v5, Firewall Bypass/Disable v5

This mission type requires hacking into a high security system. Log into InterNIC first and look up the corporation's public access server. Add the address and connect to that system to find the administrator's phone number. Open the voice analyser and dial the number to obtain a voice recording - leave the analyser open, unless you have v2 and save the recording to memory.

With these preparations done, bounce your connection as normal, but make sure the final bounce goes through the public access server. High security systems do not accept connections from outside their corporation. Once in, break the password, play back the voice recording, and (if required) defeat the cypher in order to gain full access to the system.

Access the admin console and type "cd usr" then "delete" to delete all files on the server. Then type "cd sys" followed by "delete" to destroy the operating system. Finally, type "shutdown" to force a system reboot. Disconnect and cover your tracks. Log in to the Uplink Internal Services System and watch for the news article about the destroyed system, then reply for payment.

Transfer money

 * Mission Descriptions:
 * Our Esteemed colleague wishes to make a donation

Uplink Ranking: Experienced Difficulty Rating: 7 - 8 Required Software: Password Breaker, Proxy Bypass/Disable v5 Recommended Software: Monitor Bypass v5

This mission type requires hacking into a bank server. If possible, bypass the monitor to prevent an active trace. Disable or bypass the proxy, then crack the password for the target account. Once in, go to transfer funds and enter the employer's bank IP and account number, along with the desired transfer amount. When the transfer completes, reply for payment. As always, cover your tracks afterward.

Tips: Usually when transferring money, it is critical to delete the transfer log in the bank statement for both the victim and destination accounts. Otherwise Uplink will disavow you within minutes. For this mission, since the destination account belongs to the employer, deleting statement records isn't necessary. In fact, the employer won't realize the job is complete unless these records remain in place.

Trace a hacker

 * Mission Descriptions:
 * Trace a hacker who recently broke into our systems
 * Trace an unauthorised money transfer

Uplink Ranking: Experienced Difficulty Rating: 7 Required Software: Password Breaker, Decypher v3, Voice Analyser, Log Un-Deleter, Proxy Bypass/Disable v5, IP Lookup

This mission type requires hacking into numerous systems. The employer gives you the IP of a system that was hacked and an approximate time. Begin by hacking into that system's admin account and looking up the access logs. The connection log may have been deleted and was slightly before the estimate time given by the employer. Disable or bypass the proxy, then run the log un-deleter to recover the entry, finally run the IP lookup program to add the originating IP to your list.

Tips: If you need to hang on to information - the exact time of the hack, for example - start a new email and type the information into the body. Don't bother with an address or subject line, but just click send. The message will be bounced back to your inbox, since there's no recipient. This way you can hang on to any notes until you're done with them.

Next, hack into the admin account of the new system. Check its access logs, exactly like before. Recover deleted logs, if necessary. Repeat this process until you come up with a personal computer. Reply with the name of the computer's owner in order to receive payment.

Ruin a life

 * Mission Descriptions:
 * Highly skilled agent required for removal job

Uplink Ranking: Knowledgeable Difficulty Rating: 8 Required Software: Password Breaker, Proxy Bypass/Proxy Disable v1.0, Decypher Recommended Software: Monitor Bypass v5.0

This mission type requires hacking into the Global Criminal Database. The employer will provide the name of the target. Connect to the database and disable or bypass the proxy, then hack into the "readwrite" account. Using a monitor bypass, this will not trigger an active trace. Search for the target. If he has fewer than two convictions on his record, then add a couple of things. Then add a "Parole violation" conviction or similar (it must have the word "parole" in it). Finally, click on the "Authorise Arrest" button. Cover your tracks.

Watch the news feed on the Uplink Internal Services System. Once the target's arrest is in the news, reply for payment.

Frame for bank fraud

 * Mission Descriptions:
 * Frame a man for bank fraud

Uplink Ranking: Uber-Skilled Difficulty Rating: 9 - 10 Required Software: Password Breaker, Log Modifier

This mission requires hacking a bank. The employer will specify a bank to hack into. Unlike with most missions, use only three or four bounces for this one. Make sure the first bounce is still InterNIC or another system with easily accessible logs. Break the admin password and wait until the trace get about 7-10 seconds from completion before disconnecting.

Get into the access logs at your first bounce. Use the log modifier to change the "from" entry of the bounce log to the target's IP address. Be sure to still delete the log for logging in as an admin. Watch the news feed until the target is arrested, then reply for payment.

Frame for data destruction
Mission Descriptions:
 * Frame a user for destruction of data

Uplink Ranking: Uber-Skilled Difficulty Rating: 9 - 10 Required Software: Password Breaker, File Deleter, Log Modifier, Firewall Bypass v5, Monitor Bypass v5, Voice Analyser, Decypher

This mission requires hacking into a server with varying levels of security. The employer will specify which server is to be hacked. As with the previous framing mission type, use only a few bounces. It's recommended to use a monitor and firewall bypass for this mission, since the limited number of bounces will leave little room for error. Access the file server and delete all files. Disconnect once the trace reaches 7-10 seconds remaining.

Go to your first bounce point and use the log modifier to change the "from" entry of the bounce log to the target's IP address. Delete the log for logging in as an admin. Then watch the news feed until the target is arrested and reply for payment.

Frame for computer crimes

 * Mission Descriptions:
 * Frame a user for computer crimes

Uplink Ranking: Uber-Skilled Difficulty Rating: 9 - 10 Required Software: Password Breaker, Proxy Bypass/Proxy Disable v1.0, Decypher OR Password Breaker, Log Modifier

This mission can be done in a number of ways:
 * 1) Break into the GCD and authorise the target's arrest, exactly like this the "Ruin a life" mission type (see above)
 * 2) Hack into any bank, letting them almost trace the connection, then modify the logs - exactly like the "Frame for bank fraud" mission type (see above)

As in other missions, reply for payment once the target has been arrested.