Uplink/Missions

A variety of generic missions can be accepted from the listing on the Uplink Internal Services System. This guide will give you an idea of what software and techniques will be needed to complete each mission. The missions are listed by category, as many of them are nearly identical.

Delete a file

 * Mission Descriptions:
 * Break into a rival computer system and sabotage files
 * Hack into a computer and delete Key files
 * Find and destroy crucial data on a mainframe

Uplink Ranking: Beginner Difficulty Rating: 2 Required Software: Password Breaker, File Deleter

This mission type is the easiest by far. It's a good idea to bounce the connection a few times, as always, but not much time will be needed to complete the mission. Crack the password and access the file server. Locate the file mentioned in the mission e-mail, then delete it. Cover your tracks and send a reply to receive payment.

Copy a file

 * Mission Descriptions:
 * Access a remote system and copy important data files
 * Steal important data from a rival companies file server
 * Gain Access to a rival system and steal research files

Uplink Ranking: Beginner - Novice Difficulty Rating: 2 - 3 Required Software: Password Breaker, File Copier, Decrypter (for difficulty 3 only)

This mission type is very similar to previous one, however instead of deleting the file, copy it to the Gateway's memory. Cover your tracks as usual. If this was a difficulty 3 mission, the file may be encrypted. If so, use a decrypter program to remove the encryption. Then reply to the employer, including the file as an attachment.

Change Academic Records

 * Mission Descriptions:
 * Improve our associates' academic standing
 * Help us prove a fellow employee is over-rated
 * Generate a University Degree for a friend
 * Qualifications required for wealthy professional

Uplink Ranking: Novice Difficulty Rating: 3 Required Software: Password Breaker

This mission type requires hacking into the International Academic Database. This server has very low security. If you have a monitor bypass, log in as the "readwrite" user, since this will avoid triggering an active trace at all. It is important to note which type of qualifications the employer wants changed. If they want a grade changed (giving the target an 'A' in a class, for example), this goes in the first field. If they want a degree changed (perhaps giving the target a Class 1 degree), this goes in the second field. If they want a qualification added, this goes into the third field. Click on the "Commit" button to save any changes. Cover your tracks and reply for payment.

Tip: If the trace is slow enough, multiple records can be modified in one attempt. When finished with one record, click "Done" to return to the entry screen and perform another search.

Change Social Security Records

 * Mission Descriptions:
 * Create part of a new identity
 * Falsify a Social Security Document

Uplink Ranking: Confident Difficulty Rating: 4 - 5 Required Software: Password Breaker, Proxy Disable/Bypass v1.0

This mission type requires hacking into the International Social Security Database. This server has somewhat better security than the academic database. If using a proxy disable program, start that first, then start the password breaker as soon as the active trace begins. If you have both monitor and proxy bypass, log in as the "readwrite" user, since this will avoid triggering an active trace at all. Once in, search for the target. The last field, "Personal Status", is the one that needs to be modified. As before, click on the "Commit" button to save changes. Cover your tracks and reply for payment.

Tip: If the trace is slow enough, multiple records can be modified in one attempt. When finished with one record, click "Done" to return to the entry screen and perform another search.

Change Criminal Records

 * Mission Descriptions:
 * Help to stop a hacker from ever working again
 * Help to discredit one of our rivals
 * Clear a criminal record

Uplink Ranking: Intermediate Difficulty Rating: 5 Required Software: Password Breaker, Proxy Disable/Bypass v1.0, Decypher v1-v3

This mission type requires hacking into the Global Criminal Database. It has even better security than the previous government servers. If you have both monitor and proxy bypass, log in as the "readwrite" user, since this will avoid triggering an active trace at all. If using a proxy disable program, start this first, then start the password breaker as soon as the active trace begins. Use the decypher program to crack the elliptic curve encryption cypher. Once in, search for the target. To add to a criminal record, type the desired conviction into the field at the bottom and click on the "Add Conviction" button. To clear a record, click on the "Clear Record" button. Cover your tracks and reply for payment.

Tip: If the trace is slow enough, multiple records can be modified in one attempt. When finished with one record, click "Done" to return to the entry screen and perform another search.

Find Financial Details

 * Mission Descriptions:
 * Client interested in financial data on an enemy
 * Find Financial Details of one of our associates

Uplink Ranking: Intermediate Difficulty Rating: 5 Required Software: Password Breaker

This mission type requires hacking into one of the bank servers. Banks are notorious for their very quick passive traces, so be sure to cover your tracks quickly once you disconnect. The employer will include a the bank IP address and account number to be hacked. Connect to the bank, select modify existing account, then type in the account number before running the password breaker. Once in, access the account summary. The employer wants either the balance or loan amount, so be sure to get the right value. Reply with the requested value to receive payment.

Tip: If asked for the loan amount, try replying with "0" before beginning the hack. Many accounts don't have a loan, so this may save some time.

Destroy Database

 * Mission Descriptions:
 * Destroy corporate data of a rival company
 * Destroy customer records on a sales system
 * Destroy rival software in development

Uplink Ranking: Intermediate Difficulty Rating: 5 - 6 Required Software: Password Breaker, Firewall Bypass/Disable v5 and File Deleter OR Proxy Bypass/Disable v5

This mission type requires hacking into a corporate server with varying levels of security. If the target system is a LAN, that software will also be required. This mission can be completed in a number of different ways, depending upon software and preferences.


 * 1) If using only the proxy defeating software: Once the proxy is down, access the admin security settings and disable the firewall from there. Then either:
 * 2) access the file server and delete the all files on the server using a file deleter,
 * 3) or access the admin console and type "cd usr" to enter the user files directory, followed by "delete" to destroy all user files.
 * 4) If using firewall software and file deleter: Once the firewall is disabled, access the file server and delete all files using the file deleter.

Cover your tracks and fast-forward until a story appears on the news server of the Uplink Internal Services System. Then reply for payment.

Copy Database

 * Mission Descriptions:
 * Copy large and secure corporate database
 * Copy proprietary source code database
 * Steal valuable scientific research documents
 * Break into high security system and steal customer records

Uplink Ranking: Intermediate (12) - Knowledgeable (9) Difficulty Rating: 5 - 7 Required Software: Password Breaker, File Copier, Decrypter v7, Proxy Bypass/Disable v5 OR Firewall Bypass/Disable v5 Other Requirements: 60-120Gq of Memory Space

This mission type plays out very similarly to the previous one, except the files must be copied rather than deleted. As a result, it requires a large amount of open memory space. Difficulty 7 missions sometimes require hacking a LAN, but this will be shown in the mission's expanded description before accepting.

As before, there are two basic approaches:
 * 1) use a proxy bypass/disable, then disable the firewall from the admin security settings
 * 2) or simply use a firewall bypass/disable.

Once the firewall is down, copy the target files to your memory. The required files can be identified by their name and file size. They will be fairly large files (7 - 11Gq) and their names will include either "corp" for corporate data, "c???" for customer records, "r???" for research documents, or "softw" for software.

Then disconnect and cover your tracks. Finally, connect the the designated file server, log in with the provided credentials, and copy the files over to there. It is not necessary to bounce this connection, as you are accessing the server legally. Decrypt the files on the server, the reply for payment.

Trace Balance Transfer

 * Mission Descriptions:
 * Trace a recent balance transfer
 * Trace an unauthorised money transfer

Uplink Ranking: Intermediate (12) Difficulty Rating: 5 Required Software: Password Breaker Recommended Software: Monitor Bypass v5

This mission type requires hacking one or two bank servers. It begins just like earlier missions to find financial details. Hack into the bank server, bypass the monitor (if the program is available), then break the password for the target bank account. Access the account statement and find the recent large transfer. Note down the IP address and account number to which the money went.

If the IP address is for the same bank, you'll only need to hack the one server. Otherwise cover your tracks and hack into the bank it points to. Once you've gained access to the receiving account, look up the account details. Finally respond to the employer with the account holder's name to receive payment.

Destroy a Computer System

 * Missions Descriptions:
 * Elite agent required for destruction of computer system

Uplink Ranking: Skilled Difficulty Rating: 6 Required Software: Password Breaker, Voice Analyser, Decypher v1-v3, Proxy Bypass/Disable v5, Firewall Bypass/Disable v5

This mission type requires hacking into a high security system. Log into InterNIC first and look up the corporation's public access server. Add the address and connect to that system to find the administrator's phone number. Open the voice analyser and dial the number to obtain a voice recording - leave the analyser open, unless you have v2 and save the recording to memory.

With these preparations done, bounce your connection as normal, but make sure the final bounce goes through the public access server. High security systems do not accept connections from outside their corporation. Once in, break the password, play back the voice recording, and (if required) defeat the cypher in order to gain full access to the system.

Access the admin console and type "cd usr" then "delete" to delete all files on the server. Then type "cd sys" followed by "delete" to destroy the operating system. Finally, type "shutdown" to force a system reboot. Disconnect and cover your tracks. Log in to the Uplink Internal Services System and watch for the news article about the destroyed system, then reply for payment.

Money Transfer

 * Mission Descriptions:
 * Our Esteemed colleague wishes to make a donation

Uplink Ranking: Experienced Difficulty Rating: 7 - 8 Required Software: Password Breaker, Proxy Bypass/Disable v5 Recommended Software: Monitor Bypass v5

This mission type requires hacking into a bank server. If possible, bypass the monitor to prevent an active trace. Disable or bypass the proxy, then crack the password for the target account. Once in, go to transfer funds and enter the employer's bank IP and account number, along with the desired transfer amount. When the transfer completes, reply for payment. As always, cover your tracks afterward.

Tips: Usually when transferring money, it is critical to delete the transfer log in the bank statement for both the victim and destination accounts. Otherwise Uplink will disavow you within minutes. For this mission, since the destination account belongs to the employer, deleting statement records isn't necessary. In fact, the employer won't realize the job is complete unless these records remain in place.