____ ____ ____ ____ ____ _________ ____ ____ ____
||E |||n |||t |||e |||r ||| |||t |||h |||e ||
||__|||__|||__|||__|||__|||_______|||__|||__|||__||
|/__\|/__\|/__\|/__\|/__\|/_______\|/__\|/__\|/__\|
____ ____ ____ ____ ____ ____
||M |||a |||t |||r |||i |||x ||
||__|||__|||__|||__|||__|||__||
|/__\|/__\|/__\|/__\|/__\|/__\|
____ ____ ____ ____ ____ ____ ____
||H |||a |||c |||k |||i |||n |||g ||
||__|||__|||__|||__|||__|||__|||__||
|/__\|/__\|/__\|/__\|/__\|/__\|/__\|
-------------------------------------------
E n t e r t h e M a t r i x
(H A C K I N G)
======================
The Complete FAQ/Walkthrough 3.1
For the Playstation2™
Written, formatted and researched by: Austineze
Questions? Comments? : BuzzyBastard@beer.com
Copyright © 2003 to Austineze
F i l e S u m m a r y
--------------------------
Guide Progress: 98% complete
Approximate File Size: 28.4 KB
Total Pages: 14
----------------Contents-------------------
This FAQ/Walkthrough contains:
Copyright Info
Version History
General Hacking Help
Story
Walkthrough
Asides
Cheats
Hexadecimal Codes
FAQs
Contact Info
Credits
-------------Copyright Info----------------
This guide may be distributed freely, if everything within this file is fully intact and proper credit is given. It may not be distributed for profit or anymeans of economical gain. Please do not modify this guide in any way, even if you find errors, inaccurate information, grammatical problems,etc. In the event you do discover any of the previously listed, write me so that I can correct this, the original.
Playstation 2 and Playstation 2 logos are registered trademarks of Sony Entertainment of America Inc. Enter the Matrix and all related characters areregistered trademarks of the Wachowski brothers. The game was created under lisence by Atari & Shiny Entertainment. The author of this document is in no way affiliated with Sony Entertainment of America, Atari, nor Shiny Entertainment.
-------------Version History---------------
Verson 1.0
Completed May 20, 2003. Includes complete walkthrough and a hacking
help section.
Verson 2.0
Completed May 22, 2003. Includes cheats, asides for the hacking game,
and a rather large FAQ section.
Verson 3.0
Completed June 2, 2003. Includes a new hexadecimal code section, more
asides for the hacking game, and updates to the FAQ section.
Verson 3.1
Completed June 19, 2003. Includes many updates for the hexadecimal code
section, several small improvements to several sections, and added the
ASCII title art - courtesy of the ASCII Generator (see credits)
-------------General Hacking Help-------------
Hacking is pretty straightforward, you continue moving from drive to drive, using the newly accessed commands to drive you deeper down the rabbit hole. If you decide to have a go at it by yourself, please note that any time you type in a command, it appears in the command column at the left, so just move over there and click on it instead of typing it out each time. There are even many commands that allow the seconday action to pop up over there as well (the DIR command for example will pop up the contents of any prev- iously listed drive or folder)
Below is a list of most of the commands (these are the .EXE files) found while hacking, and what they do. The prenthesis after each contains the drive you will find it on.
REBOOT (A) - restarts the system if you get stuck, start all over HELP (A) - if you type another command after HELP, it tells you what
the second command does (kind of like this guide) CLS (A) - clears the screen LOGIN (A) - allows you do get into the network DIR (A) - shows all of the files or folders in a specific drive or folder EXIT (A) - leave hacking READ (A) - used to view .TXT files ECHO (A) - repeats whatever you type after ECHO (useless?) VIBRATION (A) - vibrates the controller
BEEP(A) - makes a series of beeps
CHEAT(A) - enter cheat codes into the current save game file you are using VIEW (B) - used to look at images, maps, art, etc. VIRTUAL (B) - used to access the virtual network drive TRACEKILL (B) - will terminate a trace program DROP (B) - will stash weapons into your saved game file if you know the
appropriate codes
PLAY (B) - used to view the FMV files
DECODE (B) - can decode items found in 'the real world' ROOTSEARCH (V) - designed to find the password to the ROOT folder DIAL (V) - calling phone numbers MAIL (V) - access an email account
PORTKEY(V) - opens a PORT with an appropriate code
TRAINING (RAM) - can access training scenarios
HANDSHAKE (RAM) - reaches out to vessels patroling in 'the real world' READBIO (RAM) - can read BIOs of characters from the game EMP (LOGOS) - fires an Electro Magnetic Pulse (a weapon for Sentinels)
-----
* ENCODE - this allows you to code a word and use it in DECODE later
this command is only available in PAL (mostly European)
versions of the game
-------------------Story-------------------
Obviously, if you bought this game you are familiar with the story of the Matrix. However, if you have yet to see 'Final Flight of the Osiris' then you should know that the Osiris was a hover ship (like Morpheus' from the original movie) that goes to the surface of the Eart and finds that an army of Sentinels are massing around a huge digging machine. The machine is positioned above Zion, so the last sanctuary of humans is in serious jeopardy. The Osiris is detected, so they decide to jack into the Matrix to try and get the message out of what they witnessed. Just before their ship explodes, they manage to get a package in the mail.
Technically, you don't need to know any of this to play through the hacking section, but if you're like me, you will want to step over to the actual game once and awhile (if nothing else, to boost the amount of unlocked files you will find in the hacking section)
----------------Walkthrough----------------
Below is a copy of exactly what will appear on your TV screen. I took the shortest route possible to unlock all of the drives and folders. In a later version, I might include some of the other things you can play with while hacking, but for now, this will just get everything available to you. There are some areas where you will find five astericks (*****). This indicates that I have included something that is not directly on your screen (such as a voice talking to you). Finally, note the five astericks in the section for unlocking the B drive's tools with a binary code. This is to indicate that the code will be different every time you play. You will go through a few attempts before finding the one you need. Okay, let's turn that computer on!
ONS-T1 Personal Computer (c) 1999
ROM BIOS LOADED v8.19-rev 3.
RAM CRC check: (000000h)
Drive - Serial: D45855 - DETECTED
Booting.
Ports SECURE: [TAPS: 00]
Encryption: [ENABLED-256 BIT]
Virus Scan - 'CHECKING'
SCAN
Scan PASSED
WARNING - Virus Definition Database: ERROR 421
-Update needed
System Clean.
Type 'Help' for help
Logging into Drive A:
A:\> HELP
HELP: To show usage for any known system command.
Usage: HELP
Example: HELP DIR
A:\> DIR A:
DIRECTORY OF A:
SYSTEM
TOOLS
TEXT
A:\> DIR A:\SYSTEM
REBOOT.EXE
HELP.EXE
CLS.EXE
LOGIN.EXE
DIR.EXE
EXIT.EXE
READ.EXE
ECHO.EXE
A:\> DIR A:\TEXT
DIRECTORY OF A:\TEXT
NOTEZ.TXT
MANUAL1.TXT
MANUAL2.TXT
PASSWORD.TXT
A:\> READ A:\TEXT\NOTEZ.TXT
-Checked storage / need bigger drive for download
-Don't forget to backup/wipe disc
-Drive B needs attention
-B: Surveillance archive is progressing
Changed VIRTUAL DRIVE Password to: FROZENFISH
A:\> LOGIN
Enter Password: (If you are a guest, type 'GUEST')
>GUEST
Login Access Approved
Access to Media Drive B: - GRANTED
B: is now accessible
A:\> DIR B:
DIRECTORY OF B:
ID
GUNS
FMV
MAPS
CARS
TOOLS
A:\> DIR B:\TOOLS
Tools directory is binary encrypted.
Enter 5 digit access code: (Q to quit)
>11111
***** digits correct.
***** digits in their correct places.
Enter 5 digit access code: (Q to quit)
>*****
Five digits correct.
Five digits in their correct places.
Decryption process successful.
DIRECTORY OF B:\TOOLS
VIEW.EXE
VIRTUAL.EXE
TRACEKILL.EXE
DROP.EXE
PLAY.EXE
DECODE.EXE
A:\> VIRTUAL
Virtual Drive - SECURITY CHECK
Enter Password: FROZENFISH
Password accepted.
Dialing... Please Wait.
CONNECTING
Carrier Anomoly - Redirecting: 8080
.........................
AUTHENTICATION REQUIRED. You have a limited time .........................
*****Puzzle Solution
***** |
***** --|--
***** |
***** -----|-----
***** | |
***** / | | \
***** _| _|
Solution: RED
Auto Running: NEORED.BAT
>>>> Vectoring to waveform file. Approved, Card Detected. PLAYING
>>>> WAVEFORM: WELCOME.WAV
*****Morpheus says, "Welcome, you are in. You have access."
>>>>
Access Approved
Access to Virtual Drive V: - GRANTED
V: is now accessible
A;\> DIR V:
DIRECTORY OF V:
TOOLS
ROOT
A:\> DIR V:\TOOLS
DIRECTORY OF V:\TOOLS
ROOTSEARCH.EXE
DIAL.EXE
A:\> ROOTSEARCH
ROOTSEARCHER v1.1
Searching for ROOT ADMIN Password: THIISNOTREAL
Submitting Password: THISISNOTREAL
Administrator: Authenticated.
V:\ROOT access granted
A:\> DIR V:\ROOT
DIRECTORY OF V:\ROOT
MAIL.EXE
PORTKEY.EXE
A:\> MAIL
Enter ROOT ADMIN Password:> THISISNOTREAL
Password accepted.
MAIL v2.4 - (your free trial period has expired.)
Checking ADMIN Email Account.
(1) - eMail(s) in Inbox
Do you wish to read email(s)? Y
Email 1 of 1
-------------------------
DIAL:
001-949-555-0112
001-714-555-0187
001-213-555-0142
001-310-555-0111
-------------------------
A:\> DIAL 0013105550111
Dialing... Connected.
Playing message...
*****Trinity says, "You've tapped into a hard line
*****drop box. Do not leave a message. Use code 942.
*****Repeat 942."
A:\> PORTKEY 942
Communications Port 942 ADFLKJDFLHFNEIUDFNDCLKJDFNOINFLKFJB
DFHDFBODSFOIBUFOIDSUJUSDOIUOISDNFOISDUKRTHFDKJBNVDSONRFKJHV
*****This string of random characters continues for
*****about one hundred lines, then the screen clears
>Knock. Knock.
>Hi, it's me Trinity.
>Thanks for opening the Port.
>Been having any problems with the system?
>NO
Yeah, well that's no surprise, to get this far, you obviously have the knack.
>Do you know how to get to your RAM drive?
>NO
Even if you don't know, you do have one. I can't access it from here, but I can give you a Cracker to get at it.
>Here it comes...
NEW FILE OPEN
DOWNLOADING CONTENTS
.........................
File: CRACK.EXE downloaded to V:\ROOT
>To get to the RAM drive, type CRACK 8RAM
>Gotta go... ADFLKJDFLHFNEIUDOPGSQSLFKDFNDCLKJDFNOINFLKFJB
DFHDFBODSFOIBUFOIDSUJUSDOIUOISDNFOISDUKRTHFDKJBNVDSONRFKJHV
*****This string of random characters continues for
*****about twenty five lines, then the screen clears
>>>>FORCE#9 - closing PORT reset...
LINE DROPPED
A:\> CRACK 8RAM
Accessing RAM drive...
Encryption code: AGHR22M5
Entering code: UNLOCK RAM: - AGHR22M5
Code.... Accepted.
Access Approved
Access to RAM Drive: - GRANTED
RAM: is now accessible
A:\> DIR RAM:
DIRECTORY OF RAM:
TRINITY
PROG
BIO
A:\> DIR RAM:\TRINITY
TRAINING.EXE
HANDSHAKE.EXE
READBIO.EXE
A:\> HANDSHAKE
Pinging:
Nebuchadnezzar - - - LINK CLOSED
Moljinor - - - - - - LINK CLOSED
Logos - - - - - - - LINK OPEN
.
.
- Contacting Operator
Operator is typing.
Hi... Sparks here... I can't chat for long, I am monitoring Sentinel Activity in this area. What's up? NOTHING Hold on, I see you accessing my disk drive. You're getting good! Thanks for that file you just sent me... What is it? WHAT FILE Hold on, can't chat now, that file you gave me is corrupting the screen...
OH SHIT! -It was a Trojan. It's infecting our onboard computers... It's trying to find a broadcast output. Trying to shut it down... It's rung the bell, I'm scanning movement. -Sentinels inbound. The virus is spreading. It's locking down my controls... I've lost control of our EMP, my monitors are down... If you're reading this, run EMP.EXE on the LOGOS drive. You have the only port open to my onboard computer...
A:\> EMP
He he he... I was just kidding! Holy crap, no need to take me seriously! You would have left me without a pot to piss in if the EMP had really fired. Oops, I forgot. I have unlocked a present for you. Think of it as a gift, for doing so well. It's in the loading section. Enjoy! :) I also tried to record a message from Neo for you. Got most of it... File downloading... Audio file playing: 22Khr
*****Neo says,"I know you're there, I can feel you. You
*****possess great skills. Now its your turn - follow the
*****white rabbit."
I agree with him about the skills bit.
If you find any white rabbits, I'll do the cooking... :P
Time we both got back to the mission.
You're done here, Bye.
Disconnected.....
----------------Asides---------------------
*****When talking with Trinity and Sparks, they ask you questions.
*****If you put in any response then the one expected, you can get
*****an odd reply. Such as, when Trinity asks you if you're having
*****any trouble, and you say something like "I LOVE YOU" or "BITE
*****ME" she will respond with "Right back at you! :)"
A:\> LOGIN
Enter Password: (If you are a guest, type 'GUEST')
>FREEMIND
*****COWBOYBOB will activate the same response. If you are currently
*****logged in as someone else (GUEST maybe) you will have to REBOOT
*****and begin the hacking process over to input a new login name. Login Access Approved Access to Media Drive B: - GRANTED
B: is now accessible
Welcome friend
Would you like to hear a message from Morpheus?
>Y
Choose fragment 1,2,3,4 or 5? (9 to quit)
>
*****All five fragments are snippets from the first movie,
*****nothing new.
A:\> VIRTUAL
*****The same will load as indicated above, but if you solve
*****the puzzle as BLUE then the results are different.
*****Puzzle solution: BLUE
***** -|-
***** -|-
***** ---------
***** ___
***** |- |
***** |- |
***** | _|
Solution: BLUE
Auto Running: NEOBLUE.BAT
>>>>Vectoring to waveform file. Approved, Card Detected. PLAYING
>>>>WAVEFORM: CAREFUL.WAV
*****Morpheus says, "Whoever you are, you don't belong here. This
*****system is being monitored. If I can track you, so can they.
*****What you're doing is not safe. Use a backdoor."
>>>>RED was the backdoor.
>>>>Use TRACEKILL.EXE to kill trace programs.
>>>>
SYS: Intruder Detected.
WARNING - Your activity has been logged.
Trace program is running...
*****A timer begins to countdown. If it gets to zero, you are
*****thrown out of the hacking section.
A:\> TRACEKILL
Trace program killed.
Press any key to continue.
A:\> EMP
*****This only works after you have used EMP.EXE before with Sparks