WHATIS
CHAQS is an instructive CTF (Capture The Flag) game that performs the basic functions of an operating system. While it meets your expectations from an operating system to a certain extent with the applications it contains, CHAQS progresses in the direction of more challenges in terms of gameplay. Therefore, it meets the visual needs of the user with its graphical interface, but the terminal creates the entire game aspect of CHAQS. Although all of the terminal commands are written to meet gaming needs, some of them can operate outside of these needs. The prepared challenges do not fully reflect real-world ethical hacking, they are similar. The interface, the challenges and the entire game are designed to suit all users.
COMMANDS AND COMMAND LINE UTILITIES
amorse : morse encoded audio file analyzer and morse audio encoder
ascii : a character encoding standard for electronic communication
audiodecoder : creates frequency spectrograms from pre-recorded signals
base32 : encoding method that uses printable ASCII characters
base58 : an encoding scheme with an alphabet of 58 characters
base64 : encode/decode data and print to standard output
binary : represent text as a sequence of binary digits 0 and 1
brainfuck : brainfuck programming language interpreter
calculate : command line calculator
cal : displays a calendar and the date
cat : concatenate files and print on the standard output
cd : change current directory
challenges : opens challenge window
charon : a very fast network logon cracker which supports many different services
clone : clones file in the CHAQS repository
count : counts files and directories
cp : copy files
cpdir : copy directories
cronjob : a job scheduler
curl : transfer a file
df : report file system disk space usage
diff : compare files line by line
dig : DNS lookup utility
dirbuster : force URIs including directories and files as well as DNS subdomains.
disconnect : terminates the remote server connection
dna : code sequence encoder/decoder
dtmf : dual tone multifrequency signaling analyzer
du : estimate file space usage
echo : display a line of text
enum4chaqs : attempts to get the userlist and OS information from the IP
execute : C# code compiler
exifsm : shows EXIF information in JPEG files
extract : a file transfer tool from CHAQS to user OS
fibonacci : returns the nth number in the sequence
file : determine file type
find : search for files in a directory hierarchy
free : display amount of free and used memory in the system
grep : print lines that match patterns
hash-identifier : identify the different types of hashes
head : output the first part of files
hex : hexadecimal converter
hostname : show the system's host name
imager : image creator
imap : network exploration tool and port scanner
import : a file transfer tool from user OS to CHAQS
interface : menu interface adapter
ip : shows the current ip address.
linq2chaqs : string manipulation utility.
logname : print user's login name
ls : list directory contents
mkdir : make directories
morse : a code for translating letters to dots and dashes
mv : move files
mvdir : move directories
nc : line utility for reading and writing data between two computer networks
nevr : a tool to find weak passwords of your users
permutation : permutations of a string
ping : send ICMP ECHO_REQUEST to network host
piet : piet programming language interpreter
pwd : print name of current/working directory
pwsh+ : line shell and .NET REPL
qrsm : qr code decoder and qr code generator
rename : rename file
renamedir : rename directory
rm : remove files
rmdir : remove directories
rot : replaces a letter in the alphabet according to its shift number
service : run a System V init script
sort : sort lines of text file contents
sqlmap : a penetration testing tool for SQL injection vulnerability
ssh : OpenSSH remote login client
steg : steganography program which hides string in some of the least significant bits of image file
stegoimage : a steganography program
strings : print the strings of printable characters in files
submit : checks the correctness of user input
sysinfo : return system information
tail : output the last part of files
touch : create an empty file
traceroute : print the route packets trace to network host
trash : moves the file or directory to the trash
tree : recursive directory listing command
uname : print system information
unzip : list, test and extract compressed files in a ZIP archive
upload : upload a file
uptime : system uptime
vigenere : alphabetic text encoder-decoder
wc : print newline, word, and byte counts for each file
wget : interactive network downloader
whatis : line manual page descriptions
whitespace : whitespace programming language interpreter
whoami : prints effective userid
whois : client for the whois directory service
xor : returns the xor result of the given expression
CHALLENGES
Invitation : Intruder
Fundamental 1 : Embark on the journey of learning the fundamentals of CHAQS
Fundamental 2 : Continue your learning CHAQS journey with part two.
Fundamental 3 : The last of the trilogy
Decryption : What is a hash and how to crack?
Reconnaissance : Learn to use dig, imap, nc, ping, traceroute and whois
Charon : Learn about Charon to bruteforce and obtain a website's credentials.
S#cr3T : Learn about ciphers, spectrogram and steganography
Hat : An exercise to repeat what you have learned
Essence : Sharpening up your CHAQS skill
I'm in the zone : Cauition!
Geolocating Images : The identification of geographic location from image
Regex : Regular Expression
DIRection : Simplicity in complexity
Permutations of white : Seeing the white in the white
C# : Programming language
Statements : Keep learning about the C# programming language
Hash me : If you can
Dark side of the moon : Keep it dark or shine a light
Don't forget your base : Recovery
Sql Injection : Understand how SQL injection attacks work and use sqlmap to exploit the web application
Emag : Different perspective
PCAP or it didn't happen: Capture the packets
Same but different : It's not what it seems
Rabbit hole : Follow the white rabbit
Congratulations : All done