--- setup to the mail server (aka walkthrough text), feel free to skip down to "getting the password" if you KNOW you've searched everything.
well, when you scan
biolabs.org (the suggested site), you find no open ports... so you have to think of a different top level domain (com, org, edu, gov, biz ...) to scan... the one most likely to come to mind now days (after .com anyways) is 'net'. So scanning it for ports 1 to 1000 you see 3 open ports, 80, 89, and 712. since port 80 is typically the public website (it's the one browsers automatically connect to now days), let's try it first. You'll receive a directory listing and then your connection is killed. not immediately useful, but that filename (
network.info) seems interesting, you should keep it in mind (or write it down in notepad like I did, I kept ALOT of notes when playing through, some were useless, some saved having to go back through numerous menus to find key information I couldn't quite remember). The other two ports were 89 and 712, well 89 was the XNull modem connection on
biolabs.com and we learned from
security.com that it has a vulnerability that allows us to download any file we want. THAT, along with the filename we just discovered, would be useful, let's find out if
biolabs.net's port 89 is also XNull. Let's go grab that file. ok, downloaded. now a quick cat of it (
cat /share/network.info) gives a listing of the domains that biolabs uses. There's only 1 new one we haven't tried, but first, let's see what port 712 is on the
biolabs.net domain. Hm, looks like a mail server... unfortunately we need a username and password... well, maybe that new site will provide those for us :) a quick scan reveals only port 80... that doesn't seem too hopeful (what idiot would put such important info on a port used for the public?) but let's check anyways. telnet to it and we're greeted with the prompt "Password required for Biolabs research username: research". well well, it WAS useful (I guess they truly did assume that it was a 'private' server, fools :) good for us though). That's half of what we need to get into the mail server... but how to find the other half...
--- getting the password
we've searched everything that's connected to biolabs... hm, let's check
security.com (the only other place we know of right now, besides zrio and decrypt, which aren't information sources). Hey, there's a "vulnerability" listed for Fuzzy Mail, the biolabs mail server didn't SAY it was a fuzzy mail server but, it's worth a shot! write down that vulnerability (that is, what the default username and pass are, lol) and let's try them on the mail server. telnet
biolabs.net 712 ... ... and.. well that didn't work either.
hm... well we can go back to
security.com again, but none of their other listed vulnerabilities seem useful right now. Well then. We've exhausted all other options and it's time to fall back on a time honored tradition. That's right, I'm talking about dumpster diving (figuratively). Go back through the websites and look at all of them for things that could be used as passwords (basically you're intelligently guessing what the pass is here, don't worry you won't do this much in Dark Signs, this might even be the only time that you do). as a big hint
what are they researching? Once you've figured out the password, make sure you remember that it can be used in two places (the private server and the mail server), you never know if a server is useful until you've checked it out (and, sometimes, it won't be useful until later).
extra, less useful, hint (for after pass):
when you've logged into the mail server you'll quickly see the important message, then you'll see that you have a menu option to forward it. Just in case you've forgotten, you are working for ZRIO