Studio Cime's hacking simulation/puzzle game/secret cyberpunk dream machine Mu Complex: Episode One delighted us with its text-based tale of espionage as you hacked your way from one computer to the next. Now, Mu Complex: Episode 2 is here, and it's time for you to blow the dust from another set of keyboards and dive deeper into the mysterious building hiding its secrets from you. To play, and you really should play the first episode before this one, just type commands and hit enter to execute them. Type "help" for a list of commands to get you started, but don't expect much hand-holding here, since Mu Complex is very much all on you when it comes to figuring things out. Its minimalistic presentation and somber atmosphere keep you hooked as you work your way through files and e-mails, and figuring out what you're supposed to do is always a thrill. The Mu Complex games aren't for players who prefer a lot of direction and hints, but if the thought of having to rely on your wits and (simulated) hacking abilities thrills you, this next installment is right up your alley.
170 Comments
Having some difficulty with
eddywolvers's timed game thing. Running the
Morse code thru an online translator gave me
{AR}5,X2,-2
but imagine the curly brackets are the HTML triangle brackets. They make the whole phrase in them only show up as a space in the comments.
but I don't know what to do with this message. Maybe some math stuff? What is the bracketed statement?
@Leopardmask
thats not a "{AR}" but a "+". And you're right about the math stuff ...
I'm currently stuck too
on the second part of eddywolvers game
What am I supposed to do with those flags? I'm guessing that it's some kind of equation as before ...
I tried counting the different patterns, but that doesn't work
@mitchyjt
I am working on the same problem with fredmorgan, everything else solved.
Here is what I am working with:
Obviously its his wifes nickname on the photo. Which when I looked at it is something like Horolucia. Then fred also emails eddywolvers to talk about how he loves the sea and her brother was in the navy. So I assume it is some sort of sea term/nickname.
For bobbylove, there is definite time pressure. The way to decode the first part is:
Braille. You end up being told to take the starting number and:
Multiply by 5987, then add 7117. For the second part, you get a weird picture which I'm trying to work out now. It looks similar to:
The Pigpen Cipher but it doesn't make sense if its that, so I'll keep looking.
Guys I really need help!
I made it to all the computers except the eddywolvers path.
I have all the molecules needed and all three other paths.
What I got in the first eddywolvers is :
+5,X2,-2 and it doesn't help me because it's not 8 or anything I tried.
I really need help because I'm so close to finishing this game!
That sure was a nice one! Hard, but definitely not impossible. Glad to have google nowadays ;)
Sure you can find all answers in the comments (e.g. here, or at Kongrate's), but I challenge you to find the answers yourselves by only using the in-game clues.
The answer itself doesn't give the satisfaction, the road to it does!
Well, I've finished the game, but it looks like there may be some additional secret. Does anybody know:
What the single letter at the end of each email means?
or
The password for the hidden .audio.mp3 on yacinehouri's computer?
Preliminary findings:
The email characters don't look like they're supposed to be formed into words. One possibility that I might try is that the .audio.mp3 password is just the email characters ordered by the date of the email. But there's no hint indicating that and I'm not sure I want to put the time in to go and find them all out if that turns out to be completely wrong
Also note that if you want to look into the above, you're not allowed to leave the mainframe once you ssh into it after unlocking all four features, so be careful!
Can't take credit for this but here's a link to the report she hides from you: http://imgur.com/zZGu5RZ
Someone managed to get a picture of the report.txt - its on
I did also read the password for .audio.mp3 but can't remember or find it...
Neat, thanks!
Also, I just tore some hair out on elizajones. Turns out,
The most recent tweet was not correct yet - I had to use the second in the list, and that got me right in. I won't say how long it took for me to try that, but it was definitely more than an hour. So try that if you're having trouble getting the password to work.
I'm not sure if I'm doing something wrong or not after I unlock all the terminals...
At the end where I'm adding all the molecules to the door, I add in the five molecules that the life.crypt file tells me I need.
Once I type in "door start" and hit enter, the game makes a noise, all the text from the screen disappears, and then it just stays like that. Is this some sort of bug, or am I missing something?
Do you have:
the ability to see hidden files yet?
If you do,
then you should be able to see some grayed out .mol files when you type in "ls" at the mainframe. Those hidden files contain the two missing molecules that you need. However, you might also notice
that the hidden files all start with a "." So if the hidden file you need is 1001.mol, then type in
door add .1001.mol
So I actually took the time to look into 'the email code' idea @Stereotomy suggested. The thing is, there's a few files that also have a random letter at the end you need to find, such as the pdf file on yacinehouri to get everything.
HOWEVER, if you do spend the time, it does contain a message. Sort of.
The first thing you get off the bat is 'base 64' and if you take everything after that, in chronological order through a base 64 decoder you get 'the password is: sterilizecomplex'
So @mitchyjt was very close.
I'm loving this so far! But I'm stuck unlocking eddywolvers' computer. I used the hints and got past the first part, but I'm stuck on the second part. I've
translated the flags to read "square minus seven" and am assuming that it's another math problem, but the subtracting seven from the number in the corner isn't working.
anyone got any hints?
Walkthrough for those who get stuck in first part: Please PLAY Episode 1 to understand how this all works.
Game opens and you are told that to identify use ssh willterk
Using
sudo cat password we are told the password is peterobrian
we can now move forward by moving computers. Use help command if you forget commands.
ssh willterk leads to
mainframe. To go to the mainframe we need the password. Use the camera and light effects to get the password
5823BA1
and move onto the mainframe.
From the mainframe we can access a map which shows us other computers we can access. End Walkthrough
Here is the solution to the Yacinehouri bot puzzle:
http://imgur.com/d5pdQTH
Beat the game, started over to try accumulating the letters from the ends of emails/pdfs/text files and get them in date order to see if they could form a password. Except I wasn't paying attention and accidentally got locked back in the mainframe.
Can't wait for someone else to solve these mysteries.
So this happened
http://imgur.com/jt0Awz7
Correct guess for the audio file, someone paid the time to decrypt and here's the password:
And I suggest the Jayisgames admins to tune up the rating for this game for there's
vivid imitation of killing action and it's quite over my expectation to the game
Someone said about writing down the final letters from the emails,I did it but I can't solve the first eddywolvers puzzle,so I don't have his emails,and idk if that would give more emails
here it is
I just ordered then based on date,not time,the ones that I caughtwith the same date,I put them in () in order,example:(N=04/05/64 b=04/06/64),N comes first and b comes second on that date
b=8/13/61 6=11/05/61 4=06/10/62 G=06/12/62 J=05/04/64 z=06/03/64 z=07/11/64 y=08/03/64 e=09/09/64 h=12/24/62 V=06/11/62 G=05/11/64 p=09/02/64 k=05/04/64 c=03/18/64 x=09/01/64 3=04/06/64 (N=04/05/64 b=04/06/64) 3=04/10/64 V=08/02/64 m=09/10/64 H=12/04/63 i=06/29/64 j=09/30/64 d=07/21/64 a=08/12/64 (2=10/01/64 1=10/01/64) b=10/11/64 G=10/12/64 V=11/05/64 a=08/13/61 e=10/13/61 l=05/11/64 3=04/05/64 w=10/07/64 I=05/05/64 O=06/13/64 l=11/20/63 I=11/29/63 B=12/04/63
and I had this on my copy/paste,it's from yacinehouri's note,last line before his name
ID software: /Ad56g0ez4/to
btw,anyone to help me with eddywolvers?I got
+5,X2,-2
but idk what to do next
For the vigenere cypher:
finally found a site that gave an actual message!
http://rumkin.com/tools/cipher/vigenere-keyed.php
use subatomicreaction as the passphrase and whatever the tweet is for the message. leave key empty.
For those who want the map for ninafez
@Akailv, do you perhaps remember what the other files (not emails) are that have a letter/number at the end? There´s the pdf file from Eric Bolan on Yacine Houri´s computer, the crypted file from Will Terk on Glen Risson´s computer, but there has to be another one. There´s only 47 .mail files and I know the code needs 50 letters/numbers, so I am still missing 1 file. And I just HAVE to know!
I also cannot find one letter. But you can try decipher it also with few letters missing. All you need to know about base64 is
that every four letters of base64 maps to three letters of decoded text. So you can find where are missing letters.
Simply by trying to insert letters to the base64 until you get readable fragments of text.
I used this method to figure out what letters are in wrong place, so I was able to correct typos in the dates.
The last letter can be obtained the same way.
Simply by trying which letters gives readable output.
I'm also missing one letter. Here is count of letters for each computer
5 bobbylove
3 dolanskanvo
3 eddywolvers
3 elizajones
3 evanice
3 fredmorgan
5 fuhong
5 glenrisson
3 kyletopz
4 ninafez
4 olivierriddle
4 willterk
1 yacinehouri
1 NOT FOUND
and here is full letters list
12/24/62 08:04 AM h [jackparrot]
06/11/62 08:04 AM V [jackparrot]
05/11/64 06:47 AM G [jackparrot]
09/02/64 07:12 AM p |willterk|
05/04/64 01:44 PM k |willterk|
03/18/64 09:01 AM c |willterk|
09/01/64 02:01 PM x |willterk|
12/27/63 02:25 AM h |bobbylove|
07/08/64 12:12 PM B |bobbylove|
07/22/64 11:05 AM G |bobbylove|
10/01/64 09:45 AM b |bobbylove|
08/13/64 08:11 AM W |bobbylove|
08/15/61 03:03 PM s |yacinehouri|
08/13/61 08:23 PM a |glenrisson|
10/13/61 10:24 AM e |glenrisson|
04/05/64 08:26 AM 3 |glenrisson|
05/11/64 11:00 AM l |glenrisson|
11/09/64 09:10 AM 4 |glenrisson|
05/04/64 11:02 AM J |fuhong|
06/03/64 10:12 AM z |fuhong|
07/11/64 02:10 PM z |fuhong|
08/03/64 08:00 AM y |fuhong|
09/09/64 01:00 PM e |fuhong|
10/11/64 09:32 AM b |elizajones|
10/12/64 07:14 AM G |elizajones|
11/05/64 05:11 PM V |elizajones|
07/21/64 04:02 PM d |ninafez|
08/12/64 07:11 PM a |ninafez|
10/01/64 11:12 AM 1 |ninafez|
10/01/64 09:46 AM 2 |ninafez|
11/20/63 04:57 PM l |eddywolvers|
11/29/63 06:01 AM I |eddywolvers|
12/04/63 04:57 PM B |eddywolvers|
04/10/64 11:36 AM 3 |fredmorgan|
08/02/64 04:57 PM V |fredmorgan|
09/10/64 08:00 AM m |fredmorgan|
10/07/64 01:44 PM w |evanice|
05/05/64 01:44 PM I |evanice|
06/13/64 07:59 AM O |evanice|
04/06/64 09:13 AM 3 |kyletopz|
04/06/64 04:24 PM b |kyletopz|
04/05/64 01:59 PM N |kyletopz|
12/04/63 02:57 PM H |dolanskanvo|
06/29/64 02:11 PM i |dolanskanvo|
09/30/64 09:43 PM j |dolanskanvo|
08/13/61 09:01 AM b |olivierriddle|
11/05/61 09:54 AM 6 |olivierriddle|
06/10/62 03:41 PM 4 |olivierriddle|
06/12/62 07:14 AM G |olivierriddle|
09/29/64 03:49 PM V |??? NOT FOUND ???|
ebik, 09/29/64 03:49 PM V is exactly the file I can´t find. If you look at the list of files in the walkthrough on Youtube you will find that they have found that file on glen risson´s computer (gin), but it´s not there in my game. Or maybe I´m missing something. Well, I hope somebody else can help us with the very frustrating, :-), mystery.
I notice a lot of people struggling with eddywolvers...I am one of them!
Game one is easy.
translate the morse code and you get "+5, x2, -2".
You take the value given to you in the upper left side, do the math, and enter "solve (whatever your answer is)"
the second game has me perplexed. At first i thought they were country flags, then i decided to stick with the "morse code" theme and looked up "morse code flags." That helps but now I'm at a loss as to what to input to solve the puzzle. Any help?
Walktrough MU COMPLEX EPISODE 2
Hey! Ryuu here, I'm going to complete this wlktgh while I complete the game, any doubt no problem to contact me!
So far, I have this (when the game ends, you will be able to read complete)
NOTE: You can check all the files you want, I'm only giving you the steps to play (to the end) the game.
Friendly reminder: I'm a girl from Argentina, so pleeeeaaaase, forgive me for my horrible english n_nU
Let's begin.
THE CONTROLS ARE:
ls : files
cat : display file content
help : display the help (this menu)
motd : display last message (LYA messagge)
ssh : move to another computer
sudo : run a command as administrator.
To read a file, use "cat".
To read a file as admin (use it everytime), type "sudo cat"
Part 1:
You start with Lya saying to identify yourself
Introduce SSH WILLTERK (no tabs)
Password: peterobrian
Now you are on WILL TERK computer.
To unlock the mainframe door, you have to
Type camera. This will show you a door and the password with 2 blank spaces: 5823B__
To find the missing letters you have to
Type light black. This will show the pad of the door with the missing part of the code. It is: A1.
The complete order is: 5823BA1.
You are now on the mainframe.
Type kiletopz. You are now on that computer.
This computer has a challenge, it is called
THE BOT CHALLENGE. It's about the invaders trying to reach the door. The problem is: it does not move, and you can't see the moves. You have to use your mind or read the solution.
How to pass the BOT CHALLENGE:
You have to use a different command for this:
bot map: display the challenge map.
bot sequences : use this command to see what you've done so far (remember, the Invaders DOES NOT MOVE).
bot clear: start over
bot help: display this menu
bot play: start/end the challenge
bot push: use "bot push" to "move" the Invaders.
Use "bot push move" to move 2 steps forward.
Use "bot push cw" to turn clockwise
Use "bot push ccw" to turn counter-clockwise.
Now, the challenge changes everytime you fail/you are playing for the first time. The challenge is not the same. All I can say is that you have to count or imagine the moves and the sequences as if the invaders is moving. But, remember, he is not going to move by any chance.
Once you complete the challenge, you unlocked the Kyle Topz computer. You have to change to Fred Morgan computer, do this:
Type ls. Type "sudo cat database.txt". Read the file, it has the password and the name of the next computer.
USER: fredmorgan
Password: b1581
You have to unlock the computer.
It's the name of the dead wife.
It's: clara
You unlocked the computer now. You can go to eddywolvers
You are asked to complete a challenge. It's like this:
EDDYWOLVERS CHALLENGE (1/2)
If you type "cat method" it's going to give the solution, but morse code. (YEAH...............)
You have three boxes:
The level of the challenge (1/2).
The VALUE (this is VERY important, it's going to change every f*cking time you play the challenge) for example, let's say my value is 6.
And, the time box (30 sec. Just that. Yup. JUST 30 F*CKING SECONDS.)
If you translate the morse code it's going to give a math problem: AR + 5 x 2 - 2
The AR part, is our value. So, the solution is:
AR (my value) + 5 x 2 - 2. Solve this, and you will have 20.
Type "solve (and the result) and you end the first part of the challenge.
Mine it would be: 6 + 5 x 2 - 2
solve 20
Challenge Solved. Next Challenge.
EDDYWOLVERS CHALLENGE (2/2)
You have three boxes, again.
The level: 2/2
The Value: (VERY IMPORTANT) Again, let's say my value is 6.
The time: The faster you end the first part, more time is going to have left for finish the second part.
If you type "cat method2.jpg" is going to show you a picture with flags.
This represents the maritime flag, if you look a picture of them, each on represents a letter.
Once you read the flags, the solution that is going to give you is:
SQUARE MINUS SEVEN
And, you have the next math problem
You have the value (mine, for example, is 6) you have to "square the value" and then "minus 7".
That would be: 6^2-7
So, you have to
Type my example, but with your value with "solve" as the command.
You have now finished the second challenge.
You unlocked EDDY WOLVERS computer.
For fuhong, do
resetpass
fuhong
(insert the id here)
Send that to the email they give you on the website http://mailer.mucomplex.com/
So for dolanskanvo's first aptitude test, my commands were:
Commands in sequence main (10/10):
Rotate clockwise
Call function F1
Rotate clockwise
Call function F1
Rotate counter-clockwise
Call function F1
Rotate counter-clockwise
Call function F1
Rotate counter-clockwise
Call function F1
Commands in sequence F1 (3/3):
Move forward two spaces.
Move forward two spaces.
Move forward two spaces.
Well, dang. I finished it, but . . .
I *really* hated the ending. I mean, I figured it out about 20 minutes in based on the way Lya was talking and acting both in this episode and the first episode, but I was really, really hoping that I was wrong. Do all games/movies/etc. involving an AI aside from one video game I can think of and possibly one movie depict the AI as evil? (Not naming the game or the movie because it might be spoiler-ish.) Or have I just been exposed to a really small/poor selection? I wanted Lya to be good.... So I loved the gameplay, but the ending was, in my opinion, a total sucker punch, albeit pretty obvious. Oh, well.
Finally bothered to finish this, but only because of the badge on Kongregate. I am even less impressed with this episode than I was with the previous. And I am surprised this got such a high score here and over there, but I guess people are suckers for games with glaring errors, and high levels of tediousness for reasons I cannot begin to understand.
It seems like the developers can't decide what kind of game they want to make. It's a riddle game, it's a nerdish game, it's a text based game, it's a graphics based game. Why not just choose one, stick with it and actually make a better game?
And the tediousness of some of the tasks boggles my mind. Writing down info from 50 emails only to find out that it's only necessary if you want all the info, but not for completing the game. And having to translate some of the different codes. If this was a riddle game, that is what you would expect at every turn and then it would be fine. But this should not be a riddle game.
The only good thing is that at least I was expecting and prepared for having to use outside sources with this episode, something that was my biggest gripe with Episode 1. No game should make you do that, especially as this depends entirely on what websites the developers have chosen to use, and that their information is often faulty because they apparently didn't bother checking more than one website per puzzle for information.
Case in point, the morse puzzle. .-.-. does not mean a plus sign. It is a code, , meaning end of message. Wiki says that it is often written +, but that is simply not true. All decoders and images I could find list it as and nothing else.
And then it borrows quite heavily from a lot of media. Lolita, Terminator, Lightbot. And by borrows, I mean steals. Not graphics or audio, but concepts and ideas. There's hardly any originality in the game at all. By the time I got to the third bot puzzle, I ragequit.
And then there's a puzzle which can only be solved by guessing, something you apparently get voted down for pointing out on Kongregate. The metro puzzle.
Using triangulation to find the station located between the four mentioned stations means that the answer SHOULD be Arts et Metiers, as that is where the diagonal lines cross. But that answer is not accepted. So then you have to guess at which of the many stations around Arts et Metiers, that the developers thought of. I.e. that puzzle can only be solved by guessing. You would think that if you were gonna include puzzles in a game, that you would actually try to solve them before including them, to make sure they could actually be solved. But I guess that is too much to ask.
And just for clarity, I used an interactive map of the Paris metro, so I am sure I didn't not draw the lines wrong.
Also, I agree with Kyttynjirr.
It was obvious from the get go that Lya would turn out to be evil, as Kyttynjirr said, when has there ever been a good AI? They all turn evil eventually. Though I must admit that I didn't figure out what we had to do for her before I was finishing the game at the mainframe. And she keeps talking about freeing her.
But then there's the heavily Terminator inspired ending. Which was completely out of touch with the entire game. Why suddenly throw out a graphical ending when your game has been 99 % text based up until now. That's just inconsistent. And the ending is just Skynet all over again.
I also decided to decode the email code and listen to the audio before going to the mainframe for the last bit. After hearing that, why would the protagonist even help out Lya? Anyone with common sense would log out, and slowly walk away from their computer. She even talks about you helping with freeing her several times, which is never a good sign.
There was one thing that I liked about the game though, particularly about the ending.
That was the best use I have seen of a common programming phrase, and the best words that Lya could begin her speech with, considering she is an AI. So I gotta give them props for that.
The graph is in his files. It's like a disorganized pigpen cipher which is why it made no sense.
however, the answers i got "plus 4563 times 15822" give wrong solutions every time i manage to even write something under the time limit. i even wrote a program on my graphing calculator just to get this done in the given time and i still haven't passed just cause i always seem to get wrong results.
It would have been a bit more fun if I could copy and paste some of the strings. It seems like eddywolver's morse code is not translating correctly for me due to weird spacing, so I've been forced to look at the spoilers. Thank you Ryuuketsu for your walkthrough! According to that, the formula is
x + 5 * 2 - 2
but executed from left to right rather than the arithmetic standard order of operations. This is pretty annoying.
Other than this silliness and the fact that this is probably the most insecure network on the planet, this is a fantastic game. Brings me back to the old ARG days...
Super-quick walkthrough. Major sequence breaking within.
1) ssh evanice
2) ssh-agent
3) jupiter
4) ssh fredmorgan
5) unlock
6) clara
7) ssh eddywolvers
8) start
9) solve /*Take the value, add 5, times 2, minus 2*/
10) solve /*Take the value, square it, minus 7*/
NOTE: Steps 9 and 10 must be done with 30 seconds. Otherwise, go back to step 8.
11) cat content.lock
12) ssh mainframe
13) 5823ba1
14) cat molecules.tar
15) door add 3768.mol
16) door add 8017.mol
17) door add 2357.mol
18) door add .1001.mol
19) door add .2221.mol
20) door start
Got tired of waiting for a full text walkthrough, so I went ahead and made one. I used https://youtu.be/QkJQVv1vpnI for a basis, though I didn't include secrets or anything. I only explained puzzles that for which you need outside resources.
ssh willterk
peterobrian
ssh mainframe
5823BA1
ssh fuhong
resetpass
login
(varies. go to mailer.mucomplex.com, input [email protected], then "reset pass", "fuhong", and your reset id)
ssh fredmorgan
unlock
clara
ssh eddywolvers
start
cat method
(varies. use your value. add 5, multiply by 2, subtract 2 == answer).
solve answer
cat method2.jpg
"(value)^2-7"==answer (be quick!)
solve answer
cat content.lock
ssh mainframe
cat molecules.tar
ssh kyle topz
bot map
(varies. "bot push ccw" to turn counter clock wise, "bot push cw" to turn clockwise, "bot move" to move 2 spaces, "bot play" to move when done)
cat database.txt (note "password")
ssh dolanskanvo
"password"
bot map
(same as before)
bot push f1 move
bot push f1 move
bot push f1 move
bot push cw
bot push f1
bot push cw
bot push f1
bot push ccw
bot push move
bot push ccw
bot push f1
bot push ccw
bot push f1
bot play
cat database.txt (note "password")
ssh olivierriddle
"password"
unlock
nelsonriddle
ssh evanice
cat hint
(varies. use a caeser cipher, with the number after
ssh-agent
jupiter
ssh elizajones
cat ebolan.mail (note key "subatomicreaction")
(find a vigenere cipher code breaker, like this: http://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx--go to twitter @mcpltokgen and find the latest tweet. put that into the code breaker, using subatomicreaction as key)
(message should have "password")
power
"password"
ssh ninafez
cat private.key
temple
ssh mainframe
ssh glenrisson
sudo nano sec05ctrlconfig.txt
(edit name "cainmanister" to read "glenrisson", then hit escape)
unlock
cat hosts.lock (note "password")
ssh yacinehouri
"password"
bot map (ugh.)
bot push f3 move
bot push f3 light
bot push f2 f3
bot push f2 f3
bot push f1 ccw
bot push f1 f2
bot push f1 f2
bot push main ccw
bot push f1
bot push f1
bot push f1
bot push f1
bot play
cat database.txt (note "password")
ssh bobbylove
"password"
start
challenge|x5987|+7117|solve
challenge|+4563|x15822|solve
cat content.lock
ssh mainframe
door add 3768.mol
door add 8017.mol
door add 2357.mol
door add .1001.mol
door add .2221.mol
door start
What am I missing about eddywolvers?? I understand
that there are equations tied to codes, but I can't find the codes. No morse, no flag, nothing. One spoiler above mentioned "cat method", but there are no method files on any of the computers I've entered.
Frustrated, I'm just going to bash through based on spoilers, but I'd love to know what I missed.
It's only after you type 'start' to begin the challenge, that the method file appears. You have to access it (and screenshot it) while the counter is timing down. Once you solve the first challenge, a different method file will appear for the second part of the challenge. Using tab to complete the name of the file makes grabbing these a little easier under time pressure.
Mu Complex 2 Walkthrough
Start off by opening the “password” file. Use “sudo cat password” as it requires administrator rights. Type “ssh willterk” to move to the next computer and use “peterobrian” as password.
Will Terk
Once you’re ready to proceed to the mainframe, use the “camera” command and you’ll notice that only 2 symbols are missing from the security code. Change the light by typing “light black” and view the camera again. From here we can see that the last two symbols are 1 and A, making the password for the mainframe “5823ba1”.
Kyle Topz
“kyletopz” is secured by Houri Maze, so type in “bot help” to see the commands. Once the challenge is finished, open the “database.txt” file and move to fredmorgan.
Now we can open the “database.txt” file and use the info to move to the next computer.
Fredmorgan
Note: If you want to see what’s on the file “report.txt” be prepared to make a quick screenshot, as Lya will close it almost immediately.
If we read the files on Fred’s computer, we’ll find out that the password is the name of his passed away wife. Take a screenshot of the “pic.jpg” file. Open it in any program (Microsoft Word for example) and lower the brighness until you see the word “Clara” written right below the picture. Use it to unlock the computer and move to the next computer.
Eddywolvers
Challenge 1/2
To complete the first challenge , open the “method” file, once you’ve started. Take a screenshot of the morse code and use a translator to find out what the method is. The translation states “+5, x2, -2”. Use it to solve the first challenge.
Challenge 2/2
Once you’ve reached the second challenge open the file “method2.jpg” and take a screenshot. The flags you see here are all part of the system of international maritime signal flags, where each flag represents a letter. Google “maritime signal flags” and find a suitible image to translate the method. If the translation is correct you should have “square minus seven” or ^2–7.
Once you’re done with the challenges, you can unlock the “content.lock” file.
Evanice
If we open the “security.note” file, we can see that at the end Eva quotes Caesar. Open the “hint” file to find the encrypted password. This is the Caeser Cipher encryption technique. The number after the “http://www.simonsingh.net/The_Black_Chamber/caesar.html to quickly get the plaintext “Jupiter” which is the passphrase key to the ssh-agent.
Dolanskanvo
Bot challenge
In order to complete the bot challenge, we need to set the F1 function to move forward 3 times. When used in the Main function, F1 counts as only one move.
Solution:
Bot push f1 move
Bot push f1 move
Bot push f1 move
Bot push cw
Bot push f1
Bot push cw
Bot push f1
Bot push ccw
Bot push move
Bot push ccw
Bot push f1
Bot push ccw
Bot push f1
Bot play
You can now open the “database.txt” file and move to the next computer.
Olivierriddle
If you read the mail “ebolan.mail” you’ll find out that Olivier put the name of his brother, who recently worked on a film, as password. Google what’s written on the TV screen from the camera view and you’ll find it to be a quote from the 1962 movie “Lolita”. Check the film’s cast and crew and look for “Riddle”. Only one name should match the search and it’s “Nelson Riddle”, with “Nelsonriddle” being the password.
Fuhong
If you’ve read the emails on Fu’s computer, you should be aware of the fact that he had forgotten his password and needed to reset it.
Go to the mainframe and look inside the “ebolan.mail” file. The email states that there is an alternate mail server installed at mailer.mucomplex.com. Type the address in your browser to go to the server.
On computer Fuhong type “resetpass” to get all the info you need to get a new password. The mail you send should look like this:
Reset pass
Fuhong
“your reset ID”
Elizajones
First off, open the “ebolan.mail” file and you’ll find that a script updates Eliza’s password every 24 hours. The “Local status-update” that mr E. Bolan is refering to is Twitter. Search for @mcpltokgen to find the daily encrypted password.
From the email, we know that the encryption algorithm used is Vigenere. Go to http://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx and copy/paste the encrypted password. The key that dictates the shift of each letter is “subbatomicreaction” as stated in the “ebolan.mail” file. Break the code and use the password to enable the network card on Eliza’s computer.
Ninafez
Note: If you want to take a closer look at the camera view, take a quick screenshot as Lya will politely block your access to it.
As soon as we access Nina’s computer, we can see that she has a thing for Paris. In the “note” file Nina states that she’s worked on triangulation again in Paris and she used GPS coordinates of the subway stations. To find the password for the “private.key” file, we’ll use the locations from the probe report.
Go to Google Maps, create a new map and mark the four subway stations. Connect all four vertecies of the polygon and zoom in. You’ll find that the common is on the “Temple” station, which is the pasword for the locked file.
Glenrisson
In order to open the “hosts.lock” file, we need to give computer “glenrisson” a permisson to unlock. Open the “sec05ctrlconfig.txt” file by using “sudo nano sec05ctrlconfig.txt”. Change one of the last four names to “glenrisson: “true””. Press Esc to save and exit and use “unlock” to gain access to the hosts.lock file.
Yacinehouri
Note: The password for the “.audio.mp3” file is base 64 encrypted and it’s the last letter of all 50 emails arranged by date and time. The encoded message “VGhlIHBhc3N3b3JkIGlzOiBzdGVyaWxpemVjb21wbGV4” translates into “The password is: sterilizecomplex”
Bot challenge
In order to complete this challenge, we’ll need to put functions F2 and F3 into F1. In function F3, put a move and a light command. In F2, put the F3 function twice. Finally, in F1 put a ccw rotation and twice the F2 function. Start with a ccw in the main sequence, to ensure that the bot moves to the left first. This is how the solution should look like:
Bot push f3 ccw
Bot push f3 light
Bot push f2 f3
Bot push f2 f3
Bot push f1 ccw
Bot push f1 f2
Bot push f1 f2
Bot push ccw
Bot push f1
Bot push f1
Bot push f1
Bot push f1
Bot push play
Bobbylove
Challenge 1/2
Once you’ve read the files on Bobby’s computer, start the challenge and open the “method” file. What you see there is the Braille alphabet (for visually impaired people). Simply use an image from google to see what the file is saying. The translation should be “times #5987 plus #7117” or “challenge|x5987|+7117|solve”, where “challenge” is the current number.
Challenge 2/2
Open the file “method2.jpg” and take a screenshot. Next, open the “table.jpg” file. Notice that each symbol from “method2.jpg” represents a letter or a number from “table.jpg”. For example, the first symbol matches with the location of “P”, the second is an “L” and so on.
The final result for the method should be “plus 4563 times 15822” or “challenge|+4563|x15822|solve”.
Mainframe
Once you’ve unlocked all the features, open all the files on the Mainframe. In the file “life.crypt” you’ll find the molecules needed. Open the file “molecules.tar” to extract the data and use “ls” to view all new files.
Add the molecules stated in “life.crypt” by using “door add ….mol”.
Door add 3768.mol
Door add 8017.mol
Door add 2357.mol
Door add .1001.mol
Door add .2221.mol
Door start
Enjoy the plot twist.
Walkthrough by Stan!
To help with the bobbylove puzzle, I made an HTML file to do it for me, once I decoded the numbers. it also writes in the word 'solve' so that I can just copy the entire phrase and go.
The code is here. Simply paste the code into your favorite text editor and save it as an HTML file. Then run it, and press the buttons to open up a dialog that will ask you for the numbers. The results of the computations will then be put in below the button for that number, along with the word 'solve'.
It may take you a few times to get it, but I personally couldn't have done it without the script.
WARNING! This code contains javascript. If javascript is disabled in your browser, it WILL NOT work.
WARNING! The code also contains spoilers. Only look at the code if you don't care about decoding the numbers, or you already have.
That link is not working for me, so just in case I did it wrong, here is the URL.
Leave a comment [top of page]
Walkthrough Guide
(Please allow page to fully load for spoiler tags to be functional.)
Mu Complex 2 Walkthrough
Start off by opening the “password” file. Use “sudo cat password” as it requires administrator rights. Type “ssh willterk” to move to the next computer and use “peterobrian” as password.
Will Terk
Once you’re ready to proceed to the mainframe, use the “camera” command and you’ll notice that only 2 symbols are missing from the security code. Change the light by typing “light black” and view the camera again. From here we can see that the last two symbols are 1 and A, making the password for the mainframe “5823ba1”.
Kyle Topz
“kyletopz” is secured by Houri Maze, so type in “bot help” to see the commands. Once the challenge is finished, open the “database.txt” file and move to fredmorgan.
Now we can open the “database.txt” file and use the info to move to the next computer.
Fredmorgan
Note: If you want to see what’s on the file “report.txt” be prepared to make a quick screenshot, as Lya will close it almost immediately.
If we read the files on Fred’s computer, we’ll find out that the password is the name of his passed away wife. Take a screenshot of the “pic.jpg” file. Open it in any program (Microsoft Word for example) and lower the brighness until you see the word “Clara” written right below the picture. Use it to unlock the computer and move to the next computer.
Eddywolvers
Challenge 1/2
To complete the first challenge , open the “method” file, once you’ve started. Take a screenshot of the morse code and use a translator to find out what the method is. The translation states “+5, x2, -2”. Use it to solve the first challenge.
Challenge 2/2
Once you’ve reached the second challenge open the file “method2.jpg” and take a screenshot. The flags you see here are all part of the system of international maritime signal flags, where each flag represents a letter. Google “maritime signal flags” and find a suitible image to translate the method. If the translation is correct you should have “square minus seven” or ^2–7.
Once you’re done with the challenges, you can unlock the “content.lock” file.
Evanice
If we open the “security.note” file, we can see that at the end Eva quotes Caesar. Open the “hint” file to find the encrypted password. This is the Caeser Cipher encryption technique. The number after the “http://www.simonsingh.net/The_Black_Chamber/caesar.html to quickly get the plaintext “Jupiter” which is the passphrase key to the ssh-agent.
Dolanskanvo
Bot challenge
In order to complete the bot challenge, we need to set the F1 function to move forward 3 times. When used in the Main function, F1 counts as only one move.
Solution:
Bot push f1 move
Bot push f1 move
Bot push f1 move
Bot push cw
Bot push f1
Bot push cw
Bot push f1
Bot push ccw
Bot push move
Bot push ccw
Bot push f1
Bot push ccw
Bot push f1
Bot play
You can now open the “database.txt” file and move to the next computer.
Olivierriddle
If you read the mail “ebolan.mail” you’ll find out that Olivier put the name of his brother, who recently worked on a film, as password. Google what’s written on the TV screen from the camera view and you’ll find it to be a quote from the 1962 movie “Lolita”. Check the film’s cast and crew and look for “Riddle”. Only one name should match the search and it’s “Nelson Riddle”, with “Nelsonriddle” being the password.
Fuhong
If you’ve read the emails on Fu’s computer, you should be aware of the fact that he had forgotten his password and needed to reset it.
Go to the mainframe and look inside the “ebolan.mail” file. The email states that there is an alternate mail server installed at mailer.mucomplex.com. Type the address in your browser to go to the server.
On computer Fuhong type “resetpass” to get all the info you need to get a new password. The mail you send should look like this:
Reset pass
Fuhong
“your reset ID”
Elizajones
First off, open the “ebolan.mail” file and you’ll find that a script updates Eliza’s password every 24 hours. The “Local status-update” that mr E. Bolan is refering to is Twitter. Search for @mcpltokgen to find the daily encrypted password.
From the email, we know that the encryption algorithm used is Vigenere. Go to http://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx and copy/paste the encrypted password. The key that dictates the shift of each letter is “subbatomicreaction” as stated in the “ebolan.mail” file. Break the code and use the password to enable the network card on Eliza’s computer.
Ninafez
Note: If you want to take a closer look at the camera view, take a quick screenshot as Lya will politely block your access to it.
As soon as we access Nina’s computer, we can see that she has a thing for Paris. In the “note” file Nina states that she’s worked on triangulation again in Paris and she used GPS coordinates of the subway stations. To find the password for the “private.key” file, we’ll use the locations from the probe report.
Go to Google Maps, create a new map and mark the four subway stations. Connect all four vertecies of the polygon and zoom in. You’ll find that the common is on the “Temple” station, which is the pasword for the locked file.
Glenrisson
In order to open the “hosts.lock” file, we need to give computer “glenrisson” a permisson to unlock. Open the “sec05ctrlconfig.txt” file by using “sudo nano sec05ctrlconfig.txt”. Change one of the last four names to “glenrisson: “true””. Press Esc to save and exit and use “unlock” to gain access to the hosts.lock file.
Yacinehouri
Note: The password for the “.audio.mp3” file is base 64 encrypted and it’s the last letter of all 50 emails arranged by date and time. The encoded message “VGhlIHBhc3N3b3JkIGlzOiBzdGVyaWxpemVjb21wbGV4” translates into “The password is: sterilizecomplex”
Bot challenge
In order to complete this challenge, we’ll need to put functions F2 and F3 into F1. In function F3, put a move and a light command. In F2, put the F3 function twice. Finally, in F1 put a ccw rotation and twice the F2 function. Start with a ccw in the main sequence, to ensure that the bot moves to the left first. This is how the solution should look like:
Bot push f3 ccw
Bot push f3 light
Bot push f2 f3
Bot push f2 f3
Bot push f1 ccw
Bot push f1 f2
Bot push f1 f2
Bot push ccw
Bot push f1
Bot push f1
Bot push f1
Bot push f1
Bot push play
Bobbylove
Challenge 1/2
Once you’ve read the files on Bobby’s computer, start the challenge and open the “method” file. What you see there is the Braille alphabet (for visually impaired people). Simply use an image from google to see what the file is saying. The translation should be “times #5987 plus #7117” or “challenge|x5987|+7117|solve”, where “challenge” is the current number.
Challenge 2/2
Open the file “method2.jpg” and take a screenshot. Next, open the “table.jpg” file. Notice that each symbol from “method2.jpg” represents a letter or a number from “table.jpg”. For example, the first symbol matches with the location of “P”, the second is an “L” and so on.
The final result for the method should be “plus 4563 times 15822” or “challenge|+4563|x15822|solve”.
Mainframe
Once you’ve unlocked all the features, open all the files on the Mainframe. In the file “life.crypt” you’ll find the molecules needed. Open the file “molecules.tar” to extract the data and use “ls” to view all new files.
Add the molecules stated in “life.crypt” by using “door add ….mol”.
Door add 3768.mol
Door add 8017.mol
Door add 2357.mol
Door add .1001.mol
Door add .2221.mol
Door start
Enjoy the plot twist.
Walkthrough by Stan!
Posted by: Dora | June 22, 2015 4:23 PM