mirror of
https://github.com/cliffe/BreakEscape.git
synced 2026-02-20 13:50:46 +00:00
docs: Add comprehensive CTF flag narrative integration system
Create design document explaining how CTF flags integrate into Break Escape's narrative through ENTROPY's dead drop system. Key concepts: - Flags as ENTROPY coordination messages - Drop-site terminals hidden in plain sight - Why physical presence is required for infiltration - Flag reward categories (equipment, intel, access, story) - Complete gameplay loop from briefing to debrief - Sample Ink dialogue for character interactions This system allows SecGen CTF scenarios to be embedded narratively while providing tangible gameplay progression.
This commit is contained in:
965
story_design/flags/ctf-flag-narrative-system.md
Normal file
965
story_design/flags/ctf-flag-narrative-system.md
Normal file
@@ -0,0 +1,965 @@
|
||||
# CTF Flag Narrative Integration System
|
||||
|
||||
## Overview
|
||||
|
||||
This document explains how Break Escape integrates Capture The Flag (CTF) challenges and `flag{}` strings into the game's narrative through ENTROPY's dead drop communication system and hidden drop-site terminals.
|
||||
|
||||
**Core Concept:** CTF flags aren't arbitrary completion markers—they're ENTROPY's operational coordination messages that SAFETYNET agents intercept to steal resources, gain intelligence, and disrupt enemy operations.
|
||||
|
||||
---
|
||||
|
||||
## Table of Contents
|
||||
|
||||
1. [In-Universe Lore](#in-universe-lore)
|
||||
2. [Drop-Site Terminals](#drop-site-terminals)
|
||||
3. [Why Physical Presence is Required](#why-physical-presence-is-required)
|
||||
4. [Flag Types and Rewards](#flag-types-and-rewards)
|
||||
5. [Gameplay Loop](#gameplay-loop)
|
||||
6. [Sample Ink Dialogue](#sample-ink-dialogue)
|
||||
7. [Implementation Guidelines](#implementation-guidelines)
|
||||
|
||||
---
|
||||
|
||||
## In-Universe Lore
|
||||
|
||||
### ENTROPY's Communication Problem
|
||||
|
||||
ENTROPY operates as a distributed network of semi-autonomous cells conducting cyber-physical attacks worldwide. However, they face a critical challenge:
|
||||
|
||||
**Traditional communications are compromised.** SAFETYNET monitors:
|
||||
- Email services
|
||||
- Encrypted messaging apps
|
||||
- Phone networks
|
||||
- Dark web forums
|
||||
- Cryptocurrency transactions
|
||||
|
||||
**Solution: Dead Drop Communication System**
|
||||
|
||||
ENTROPY hides operational messages in plain sight by embedding them as `flag{}` strings within:
|
||||
- Compromised computer systems
|
||||
- Vulnerable network services
|
||||
- Training infrastructure
|
||||
- Staging servers
|
||||
- Backdoored applications
|
||||
|
||||
To most security researchers, `flag{something}` appears to be:
|
||||
- CTF competition artifacts
|
||||
- Developer test data
|
||||
- Placeholder strings
|
||||
- Training environment markers
|
||||
|
||||
But to ENTROPY operatives, each flag is an **encoded coordination message** containing:
|
||||
- Equipment cache unlock codes
|
||||
- Access credentials for next-stage operations
|
||||
- Decryption keys for stolen data
|
||||
- Rendezvous coordinates
|
||||
- Payment authorization codes
|
||||
- Target prioritization lists
|
||||
|
||||
### SAFETYNET's Counter-Strategy
|
||||
|
||||
**Operation: Dead Drop Interception**
|
||||
|
||||
SAFETYNET deploys field agents (like Agent 0x00) to:
|
||||
1. **Infiltrate ENTROPY systems** physically to access their infrastructure
|
||||
2. **Extract flag strings** before ENTROPY operatives retrieve them
|
||||
3. **Submit flags to drop-site terminals** for decryption and resource recovery
|
||||
4. **Deny ENTROPY coordination** by removing their messages
|
||||
5. **Sow paranoia** by making operatives suspect compromised communications
|
||||
|
||||
**Benefits:**
|
||||
- **Resource Theft:** Steal equipment, credentials, and funds from ENTROPY caches
|
||||
- **Intelligence Gathering:** Decrypt operational plans and cell structures
|
||||
- **Operational Disruption:** Break coordination between ENTROPY cells
|
||||
- **Psychological Warfare:** Create distrust within ENTROPY ranks
|
||||
|
||||
---
|
||||
|
||||
## Drop-Site Terminals
|
||||
|
||||
### What are Drop-Sites?
|
||||
|
||||
**Drop-sites** are ENTROPY's hidden access terminals disguised as ordinary computers in various locations. These terminals serve as:
|
||||
- **Dead drop collection points** where operatives submit proof-of-work
|
||||
- **Resource distribution systems** where cache codes are validated
|
||||
- **Communication relays** for cell coordination
|
||||
- **Training completion verification** for new recruits
|
||||
|
||||
### Physical Appearance
|
||||
|
||||
Drop-site terminals appear as normal PCs, workstations, or laptops within:
|
||||
- Corporate offices (seemingly legitimate workstations)
|
||||
- Research facilities (lab computers)
|
||||
- Server rooms (maintenance terminals)
|
||||
- Industrial sites (HMI/SCADA interfaces)
|
||||
- Coffee shops and co-working spaces (public computers)
|
||||
- Warehouses (inventory systems)
|
||||
|
||||
**The key:** ENTROPY embeds hidden functionality within these systems. They look legitimate, but contain ENTROPY's dead drop software.
|
||||
|
||||
### How SAFETYNET Identifies Drop-Sites
|
||||
|
||||
Intelligence gathering reveals drop-site locations through:
|
||||
- Network traffic analysis (encrypted connections to ENTROPY infrastructure)
|
||||
- Physical surveillance of ENTROPY operatives
|
||||
- Captured communications mentioning coordinates
|
||||
- Double agents within ENTROPY cells
|
||||
- Previously intercepted flags revealing new drop-site locations
|
||||
|
||||
### Why They're Hidden in Plain Sight
|
||||
|
||||
**ENTROPY's Strategy:**
|
||||
1. **Deniability:** If discovered, the terminal appears to be a normal business computer
|
||||
2. **Accessibility:** Operatives can access them during normal business hours
|
||||
3. **Blending:** No suspicious hardware or obvious modifications
|
||||
4. **Redundancy:** Multiple drop-sites ensure system resilience
|
||||
5. **Legitimacy:** Often placed in companies ENTROPY has infiltrated with insider operatives
|
||||
|
||||
**Examples:**
|
||||
- A "guest computer" in a corporate lobby (really a drop-site)
|
||||
- A "network monitoring station" in a server room (ENTROPY's coordination terminal)
|
||||
- A "research workstation" in a university lab (training completion verification)
|
||||
- A "inventory computer" in a warehouse (equipment cache code validator)
|
||||
|
||||
---
|
||||
|
||||
## Why Physical Presence is Required
|
||||
|
||||
### Technical Justification
|
||||
|
||||
**ENTROPY uses air-gapped security for drop-sites:**
|
||||
|
||||
1. **No Remote Access:** Drop-sites are intentionally isolated from remote networks
|
||||
2. **Physical Authentication:** Requires proximity-based authentication (RFID, Bluetooth, NFC)
|
||||
3. **Local Encryption:** Flag decryption keys only exist on the physical terminal
|
||||
4. **Network Segmentation:** Drop-sites connect to ENTROPY's hidden network only via local infrastructure
|
||||
5. **Anti-Forensics:** No internet-facing services means less digital footprint
|
||||
|
||||
**Why SAFETYNET Can't Just Hack Them Remotely:**
|
||||
- Drop-sites aren't connected to the public internet
|
||||
- They use local mesh networks or dead-drop USB transfers
|
||||
- Encryption keys are hardware-bound to the physical terminal
|
||||
- Remote attempts would alert ENTROPY's security systems
|
||||
|
||||
### Operational Justification
|
||||
|
||||
**SAFETYNET's field presence serves multiple purposes:**
|
||||
|
||||
1. **Flag Extraction:**
|
||||
- Access ENTROPY's compromised systems to find flags
|
||||
- Often requires physical network access (air-gapped training labs)
|
||||
- Need to be on-site to exploit vulnerable services
|
||||
|
||||
2. **Drop-Site Access:**
|
||||
- Submit intercepted flags at ENTROPY's own terminals
|
||||
- Decrypt dead drops using their infrastructure against them
|
||||
- Retrieve cached resources before ENTROPY operatives arrive
|
||||
|
||||
3. **Intelligence Gathering:**
|
||||
- Document ENTROPY's physical infrastructure
|
||||
- Identify insider threats (who has access to these locations?)
|
||||
- Collect forensic evidence from terminals
|
||||
|
||||
4. **Operational Disruption:**
|
||||
- Plant monitoring software on drop-sites
|
||||
- Sabotage communication channels
|
||||
- Create false flags to mislead ENTROPY
|
||||
|
||||
5. **Speed:**
|
||||
- ENTROPY operatives are en route to collect drops
|
||||
- Must intercept before they arrive
|
||||
- Race-against-time mission dynamic
|
||||
|
||||
### Narrative Drama
|
||||
|
||||
Physical infiltration creates compelling scenarios:
|
||||
- **Time Pressure:** "Extract the flags and reach the drop-site before their operative arrives"
|
||||
- **Stealth Requirements:** "Don't get caught accessing the terminal"
|
||||
- **Resource Management:** "You've got limited time at the terminal before security patrols return"
|
||||
- **Environmental Storytelling:** Physical locations reveal ENTROPY's methods and targets
|
||||
|
||||
---
|
||||
|
||||
## Flag Types and Rewards
|
||||
|
||||
### 1. Equipment Cache Flags
|
||||
|
||||
**Narrative:** Flags contain unlock codes for ENTROPY supply caches
|
||||
|
||||
**Example:**
|
||||
```
|
||||
flag{distcc_backdoor_operation_aurora}
|
||||
```
|
||||
|
||||
**Decryption Result:**
|
||||
```
|
||||
DEAD DROP DECRYPTED
|
||||
|
||||
Equipment Cache Location: Warehouse District, Bay 7
|
||||
Cache Code: AURORA-DISTCC-47X
|
||||
Contents: Advanced lockpick set (ENTROPY specialist issue)
|
||||
|
||||
SAFETYNET field agents have secured the cache.
|
||||
Equipment delivered to your inventory.
|
||||
|
||||
[NEW ITEM UNLOCKED: ENTROPY Specialist Lockpick Set]
|
||||
Effect: Reduces lockpicking difficulty by 1 level
|
||||
```
|
||||
|
||||
**Rewards:**
|
||||
- Advanced lockpicks (easier lockpicking)
|
||||
- PIN cracker devices (faster PIN breaking)
|
||||
- RFID cloners (better signal range)
|
||||
- Crypto analysis modules (CyberChef enhancements)
|
||||
- Stealth gear (reduced NPC detection radius)
|
||||
- Upgraded fingerprint scanners (lower quality thresholds)
|
||||
- Hacking tools (bypass minigames or make them easier)
|
||||
|
||||
### 2. Access Credential Flags
|
||||
|
||||
**Narrative:** Flags contain credentials for ENTROPY infrastructure or infiltrated targets
|
||||
|
||||
**Example:**
|
||||
```
|
||||
flag{nc_service_port_4444_compromised}
|
||||
```
|
||||
|
||||
**Decryption Result:**
|
||||
```
|
||||
DEAD DROP DECRYPTED
|
||||
|
||||
Target: Prometheus Industries - Executive Floor
|
||||
Access Code: 7394 (PIN lock, northeast entrance)
|
||||
Valid Until: 72 hours from intercept
|
||||
|
||||
SAFETYNET TACTICAL NOTE:
|
||||
This access code was meant for Digital Vanguard operative
|
||||
"Cipher". You can now use it for our own infiltration.
|
||||
|
||||
[NEW LOCATION UNLOCKED: Prometheus Industries Executive Floor]
|
||||
[MISSION AVAILABLE: Corporate Espionage - Counter-Operation]
|
||||
```
|
||||
|
||||
**Rewards:**
|
||||
- Building entry codes
|
||||
- Server room passwords
|
||||
- Biometric bypass codes
|
||||
- Safe combinations
|
||||
- Bluetooth pairing keys
|
||||
- VPN credentials for remote systems
|
||||
- Master key locations
|
||||
|
||||
### 3. Intelligence Flags
|
||||
|
||||
**Narrative:** Flags decrypt stolen data or reveal operational intelligence
|
||||
|
||||
**Example:**
|
||||
```
|
||||
flag{base64_encoded_operation_manifest}
|
||||
```
|
||||
|
||||
**Decryption Result:**
|
||||
```
|
||||
DEAD DROP DECRYPTED
|
||||
|
||||
Intelligence Package: Digital Vanguard Cell Roster
|
||||
Classification: ENTROPY INTERNAL - CELL LEADERS ONLY
|
||||
Decryption: SUCCESSFUL
|
||||
|
||||
This file contains identities, cover operations, and target
|
||||
lists for Digital Vanguard's North American operations.
|
||||
|
||||
[NEW INTEL FILE AVAILABLE: View in Mission Computer]
|
||||
[NPC BACKGROUND UPDATED: 3 characters now identifiable as ENTROPY]
|
||||
[STORY PROGRESSION: Haxolottle wants to discuss this intel]
|
||||
```
|
||||
|
||||
**Rewards:**
|
||||
- ENTROPY cell member identities
|
||||
- Upcoming operation schedules
|
||||
- Vulnerability databases
|
||||
- Target priority lists
|
||||
- Financial transaction records
|
||||
- Safe house locations
|
||||
- Dead drop site coordinates
|
||||
- Backdoor documentation
|
||||
|
||||
### 4. Training Completion Flags
|
||||
|
||||
**Narrative:** Flags from ENTROPY training labs prove recruit competency
|
||||
|
||||
**Example:**
|
||||
```
|
||||
flag{CVE-2004-2687_exploited_successfully}
|
||||
```
|
||||
|
||||
**Decryption Result:**
|
||||
```
|
||||
DEAD DROP DECRYPTED
|
||||
|
||||
Training Module: Legacy System Exploitation (DISTCC)
|
||||
Recruit ID: DV-047
|
||||
Completion Status: VERIFIED
|
||||
Training Stipend: $2,500 (authorization code included)
|
||||
|
||||
ANALYSIS:
|
||||
Digital Vanguard is training operatives on CVE-2004-2687.
|
||||
This ancient vulnerability suggests they're targeting legacy
|
||||
development environments at major corporations.
|
||||
|
||||
[+$2,500 CREDITS - Intercepted training payment]
|
||||
[INTEL UNLOCKED: Digital Vanguard Training Curriculum]
|
||||
[WARNING: Haxolottle has urgent information about this exploit]
|
||||
```
|
||||
|
||||
**Rewards:**
|
||||
- Credits/money (intercepted payments)
|
||||
- Training materials (cheat sheets, techniques)
|
||||
- Threat intelligence (what they're teaching)
|
||||
- Recruit identification (potential double agents)
|
||||
- Next-stage mission unlocks
|
||||
|
||||
### 5. Story Progression Flags
|
||||
|
||||
**Narrative:** Certain flags trigger story events, character conversations, or mission branches
|
||||
|
||||
**Example:**
|
||||
```
|
||||
flag{quantum_cabal_tesseract_phase_omega}
|
||||
```
|
||||
|
||||
**Decryption Result:**
|
||||
```
|
||||
DEAD DROP DECRYPTED
|
||||
|
||||
PRIORITY ALERT - DIRECTOR CLEARANCE REQUIRED
|
||||
|
||||
Operation: TESSERACT COLLAPSE
|
||||
Cell: Quantum Cabal
|
||||
Threat Level: EXISTENTIAL
|
||||
Status: PHASE OMEGA INITIATED
|
||||
|
||||
WARNING: This flag references the Quantum Cabal's dimensional
|
||||
research program. Director Netherton is being notified immediately.
|
||||
|
||||
[URGENT MISSION UNLOCKED: The Tesseract Incident]
|
||||
[CHARACTER EVENT: Netherton Emergency Briefing]
|
||||
[STORY ARC ACTIVATED: Quantum Cabal Investigation]
|
||||
```
|
||||
|
||||
**Rewards:**
|
||||
- New missions unlocked
|
||||
- Story chapters activated
|
||||
- Character conversations triggered
|
||||
- Multiple endings paths opened
|
||||
- Late-game content revealed
|
||||
|
||||
### 6. Combo Bonus Flags
|
||||
|
||||
**Narrative:** Collecting all flags from a mission reveals bigger picture
|
||||
|
||||
**Example:** After collecting all 4 flags from scanning scenario:
|
||||
|
||||
```
|
||||
ALL FLAGS INTERCEPTED - ANALYSIS COMPLETE
|
||||
|
||||
By intercepting all dead drops from this operation, SAFETYNET
|
||||
has reconstructed Digital Vanguard's complete training cycle:
|
||||
|
||||
Phase 1: Network Reconnaissance [flag 1 & 2]
|
||||
Phase 2: Service Exploitation [flag 3]
|
||||
Phase 3: Legacy System Targeting [flag 4]
|
||||
|
||||
CONCLUSION: Digital Vanguard is preparing a coordinated attack
|
||||
on Fortune 500 companies using unpatched development servers.
|
||||
|
||||
Director Netherton has authorized Operation: LEGACY SHIELD
|
||||
to proactively defend potential targets.
|
||||
|
||||
[SPECIAL MISSION UNLOCKED: Operation Legacy Shield]
|
||||
[SPECIAL ITEM: Digital Vanguard Recruit Badge - Use to infiltrate DV operations]
|
||||
[ACHIEVEMENT: Dead Drop Denial - Intercept all drops in a single operation]
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Gameplay Loop
|
||||
|
||||
### Complete Player Experience
|
||||
|
||||
**1. Mission Briefing (In-Game)**
|
||||
```
|
||||
Location: SAFETYNET HQ or phone call from Haxolottle
|
||||
|
||||
"Agent 0x00, we've identified a Digital Vanguard training server
|
||||
at 172.16.0.10. Intelligence suggests 4 dead drops are active.
|
||||
|
||||
Your mission:
|
||||
- Infiltrate their network from our Kali system at 172.16.0.2
|
||||
- Extract all flag strings before their operatives retrieve them
|
||||
- Submit the flags at the drop-site terminal in the server room
|
||||
- Intercept whatever resources they were distributing
|
||||
|
||||
The drop-site is hidden in plain sight - look for a terminal
|
||||
labeled 'Network Monitoring Station' in the server room."
|
||||
```
|
||||
|
||||
**2. Physical Infiltration (Scenario Gameplay)**
|
||||
Player navigates through the facility:
|
||||
- Pick locks to reach server room
|
||||
- Avoid or neutralize guards
|
||||
- Gather tools (fingerprint kit, access cards)
|
||||
- Reach the computer where they'll access the CTF environment
|
||||
|
||||
**3. VM Access (Transition to CTF)**
|
||||
Player interacts with a specific PC in the game world:
|
||||
- "Network Monitoring Station" (really an ENTROPY drop-site)
|
||||
- "Research Workstation" (training environment)
|
||||
- "Guest Computer" (dead drop collection point)
|
||||
|
||||
Interface shows:
|
||||
```
|
||||
╔══════════════════════════════════════════════════════════╗
|
||||
║ SYSTEM LOGIN ║
|
||||
║ Terminal ID: DV-DROPSITE-ALPHA-07 ║
|
||||
╠══════════════════════════════════════════════════════════╣
|
||||
║ ║
|
||||
║ [1] Access ENTROPY Training Network (172.16.0.2) ║
|
||||
║ [2] Submit Dead Drop Interception ║
|
||||
║ [3] View Cached Intelligence ║
|
||||
║ [4] Exit Terminal ║
|
||||
║ ║
|
||||
╚══════════════════════════════════════════════════════════╝
|
||||
```
|
||||
|
||||
**4. CTF Challenge (VM Environment)**
|
||||
Player selects option [1], which launches/connects to the SecGen VM:
|
||||
- Kali terminal interface appears
|
||||
- Player performs scanning, enumeration, exploitation
|
||||
- Finds `flag{}` strings in service banners, exploits, files
|
||||
- Copies flags to clipboard/notes
|
||||
|
||||
**5. Flag Submission (Back to Game)**
|
||||
Player returns to option [2] on the terminal:
|
||||
```
|
||||
╔══════════════════════════════════════════════════════════╗
|
||||
║ DEAD DROP INTERCEPTION SYSTEM ║
|
||||
╠══════════════════════════════════════════════════════════╣
|
||||
║ Enter intercepted flag string: ║
|
||||
║ > flag{distcc_backdoor_operation_aurora}___ ║
|
||||
║ ║
|
||||
║ Flags Intercepted: 1/4 ║
|
||||
║ [DECRYPT] [CANCEL] ║
|
||||
╚══════════════════════════════════════════════════════════╝
|
||||
```
|
||||
|
||||
**6. Reward Distribution (Immediate Feedback)**
|
||||
```
|
||||
╔══════════════════════════════════════════════════════════╗
|
||||
║ DECRYPTION SUCCESSFUL ║
|
||||
╠══════════════════════════════════════════════════════════╣
|
||||
║ DEAD DROP DECODED: ║
|
||||
║ ║
|
||||
║ Equipment Cache Code: AURORA-DISTCC-47X ║
|
||||
║ Location: Warehouse District, Bay 7 ║
|
||||
║ Contents: Advanced Lockpick Set (ENTROPY issue) ║
|
||||
║ ║
|
||||
║ SAFETYNET field agents have secured the cache. ║
|
||||
║ Equipment is being delivered to your inventory. ║
|
||||
║ ║
|
||||
║ [NEW ITEM UNLOCKED: ENTROPY Specialist Lockpick Set] ║
|
||||
║ Effect: Lockpicking difficulty reduced by 1 level ║
|
||||
║ ║
|
||||
║ [CONTINUE] ║
|
||||
╚══════════════════════════════════════════════════════════╝
|
||||
```
|
||||
|
||||
**7. Mission Completion (After All Flags)**
|
||||
After submitting all flags, phone rings:
|
||||
```
|
||||
Haxolottle: "Excellent work, Agent 0x00! All four dead drops
|
||||
intercepted. Digital Vanguard's training cycle is completely
|
||||
disrupted. Any recruit trying to complete this module will find
|
||||
empty dead drops and assume their cell leader is testing them
|
||||
with an impossible challenge. Chaos and paranoia - my favorite!"
|
||||
```
|
||||
|
||||
**8. Progression (Unlocks)**
|
||||
- Equipment added to inventory (use in future missions)
|
||||
- Intelligence files unlocked (read in mission computer)
|
||||
- New missions become available
|
||||
- Character relationships improve
|
||||
- Story progresses
|
||||
|
||||
---
|
||||
|
||||
## Sample Ink Dialogue
|
||||
|
||||
### Initial System Explanation (Onboarding)
|
||||
|
||||
```ink
|
||||
=== netherton_explains_dead_drops ===
|
||||
Netherton: Agent 0x00, before we send you into the field, you need to understand ENTROPY's communication methods.
|
||||
|
||||
Netherton: Per handbook section 4.7: "Know your enemy's coordination mechanisms."
|
||||
|
||||
+ [How does ENTROPY communicate, sir?]
|
||||
Netherton: They don't. Not through conventional channels, anyway.
|
||||
-> entropy_dead_drops
|
||||
|
||||
= entropy_dead_drops
|
||||
Netherton: SAFETYNET monitors all traditional communication channels. Email, phones, messaging apps, dark web forums.
|
||||
|
||||
Netherton: ENTROPY knows this. So they adapted.
|
||||
|
||||
Netherton: They hide operational messages in compromised systems as flag strings.
|
||||
|
||||
+ [Flag strings, sir?]
|
||||
Netherton: Format: flag{encoded_message}
|
||||
Netherton: To most security researchers, it looks like CTF competition artifacts or test data.
|
||||
Netherton: To ENTROPY operatives, each flag is a dead drop containing critical information.
|
||||
-> what_flags_contain
|
||||
|
||||
= what_flags_contain
|
||||
Netherton: These dead drops contain:
|
||||
|
||||
Netherton: Equipment cache unlock codes. Access credentials. Decryption keys. Target lists. Payment authorizations.
|
||||
|
||||
Netherton: An ENTROPY operative compromises a system, leaves a flag, and their handler or next operative retrieves it.
|
||||
|
||||
+ [Can't we intercept them remotely?]
|
||||
Netherton: Good question. No.
|
||||
-> why_physical_access
|
||||
|
||||
= why_physical_access
|
||||
Netherton: ENTROPY uses air-gapped drop-site terminals. They're not accessible remotely.
|
||||
|
||||
Netherton: These drop-sites are hidden in plain sight - ordinary computers in offices, labs, warehouses.
|
||||
|
||||
Netherton: To an outsider, they appear legitimate. But they contain ENTROPY's dead drop software.
|
||||
|
||||
Netherton: You'll need to physically infiltrate their facilities to access these systems.
|
||||
|
||||
+ [What do I do when I find a drop-site?]
|
||||
Netherton: Two objectives:
|
||||
-> agent_objectives
|
||||
|
||||
= agent_objectives
|
||||
Netherton: First - infiltrate ENTROPY's compromised systems and extract flag strings.
|
||||
|
||||
Netherton: This might mean accessing their training servers, exploiting their own vulnerabilities, or searching their infrastructure.
|
||||
|
||||
Netherton: Second - submit those flags at their drop-site terminals before their operatives retrieve them.
|
||||
|
||||
+ [What happens when I submit a flag?]
|
||||
Netherton: Our cyberwarfare team decrypts the dead drop in real-time.
|
||||
-> benefits
|
||||
|
||||
= benefits
|
||||
Netherton: If it's an equipment cache code, we raid it and deliver the gear to you.
|
||||
|
||||
Netherton: If it's intelligence, we decrypt it and add it to your mission briefing.
|
||||
|
||||
Netherton: If it's access credentials, you can use them to penetrate deeper into their operations.
|
||||
|
||||
Netherton: If it's payment authorization, we intercept the funds and add them to your field budget.
|
||||
|
||||
+ [So I'm stealing their resources?]
|
||||
Netherton: Precisely.
|
||||
-> strategic_impact
|
||||
|
||||
= strategic_impact
|
||||
Netherton: Every flag you intercept denies ENTROPY coordination and resources.
|
||||
|
||||
Netherton: Their operative arrives at the drop-site, finds it empty, and has no idea what went wrong.
|
||||
|
||||
Netherton: Is their handler testing them? Did someone steal the drop? Has their cell been compromised?
|
||||
|
||||
Netherton: Paranoia spreads. Trust breaks down. Operations fail.
|
||||
|
||||
+ [Psychological warfare through dead drop denial.]
|
||||
Netherton: Exactly. Welcome to modern counter-espionage, Agent 0x00.
|
||||
-> mission_prep
|
||||
|
||||
= mission_prep
|
||||
Netherton: Your first assignment involves infiltrating a Digital Vanguard training facility.
|
||||
|
||||
Netherton: Four dead drops are active. Extract the flags, submit them at the drop-site, and intercept whatever resources they were distributing.
|
||||
|
||||
Netherton: Agent Haxolottle will provide tactical support. Report to her for mission briefing.
|
||||
|
||||
+ [Yes, sir. I won't let you down.]
|
||||
Netherton: See that you don't. Dismissed.
|
||||
#unlock_mission scanning_basics_001
|
||||
#conversation_complete
|
||||
-> DONE
|
||||
```
|
||||
|
||||
### Mission Briefing (Scanning Scenario)
|
||||
|
||||
```ink
|
||||
=== haxolottle_scanning_mission_brief ===
|
||||
// Phone rings
|
||||
Haxolottle: Agent 0x00! Ready for your first dead drop interception?
|
||||
|
||||
+ [Ready as I'll ever be.]
|
||||
Haxolottle: That's the spirit, little axolotl!
|
||||
-> mission_overview
|
||||
|
||||
= mission_overview
|
||||
Haxolottle: SAFETYNET has identified a Digital Vanguard training server at a corporate facility.
|
||||
|
||||
Haxolottle: Address: Prometheus Industries, 247 Tech Parkway, Server Room B
|
||||
|
||||
Haxolottle: The target system is at IP 172.16.0.10. They're training recruits on network reconnaissance.
|
||||
|
||||
+ [What's my objective?]
|
||||
Haxolottle: Infiltrate the facility, access the drop-site terminal, and complete their training before their recruits do.
|
||||
-> specific_objectives
|
||||
|
||||
= specific_objectives
|
||||
Haxolottle: You'll find a drop-site terminal in Server Room B. It's labeled "Network Monitoring Station" - looks legit, but it's theirs.
|
||||
|
||||
Haxolottle: From that terminal, you can access their training network. It's air-gapped, so you need to be physically there.
|
||||
|
||||
Haxolottle: Intel suggests four dead drops are active in that training environment.
|
||||
|
||||
+ [What kind of challenges am I looking at?]
|
||||
Haxolottle: Classic reconnaissance training. Ping sweeps, port scanning, service enumeration, banner grabbing.
|
||||
Haxolottle: They might have vulnerable services running - distcc, netcat listeners, that sort of thing.
|
||||
Haxolottle: Exploit what you find, extract the flags, submit them at the drop-site.
|
||||
-> tools_and_support
|
||||
|
||||
= tools_and_support
|
||||
Haxolottle: The drop-site terminal will give you access to a Kali system at 172.16.0.2.
|
||||
|
||||
Haxolottle: Full toolkit available: nmap, netcat, metasploit, everything you need.
|
||||
|
||||
Haxolottle: Remember - you're not just completing training exercises. You're intercepting operational resources.
|
||||
|
||||
+ [What rewards should I expect?]
|
||||
Haxolottle: Could be anything. Equipment cache codes, training materials, even payment authorizations.
|
||||
Haxolottle: We won't know until you submit the flags and we decrypt them.
|
||||
Haxolottle: But here's the fun part - every flag you grab is one less for their recruits.
|
||||
-> infiltration_plan
|
||||
|
||||
= infiltration_plan
|
||||
Haxolottle: Now, getting to that server room is your first challenge.
|
||||
|
||||
Haxolottle: Prometheus Industries has standard corporate security. Badge readers, PIN locks, maybe some cameras.
|
||||
|
||||
Haxolottle: I'm sending you building blueprints and guard schedules. Use your usual skills.
|
||||
|
||||
+ [Lockpick my way in, access the terminal, complete the CTF.]
|
||||
Haxolottle: You're learning! One more thing...
|
||||
-> time_pressure
|
||||
|
||||
= time_pressure
|
||||
Haxolottle: Time is a factor. Digital Vanguard has recruits scheduled to complete this training module soon.
|
||||
|
||||
Haxolottle: If they extract the flags before you do, we lose the opportunity to intercept.
|
||||
|
||||
Haxolottle: So move fast, but stay sharp. Don't let their security catch you.
|
||||
|
||||
+ [I'll be in and out before they know I'm there.]
|
||||
Haxolottle: That's my little axolotl! I'll be monitoring. Call me when you've got all four flags.
|
||||
#start_mission scanning_basics_001
|
||||
#set_objective "Infiltrate Prometheus Industries Server Room B"
|
||||
#set_objective "Access the drop-site terminal"
|
||||
#set_objective "Extract 4 flags from training network"
|
||||
#set_objective "Submit flags and intercept resources"
|
||||
-> DONE
|
||||
```
|
||||
|
||||
### During Mission (First Flag Submitted)
|
||||
|
||||
```ink
|
||||
=== haxolottle_first_flag_reaction ===
|
||||
// Player submits first flag, phone rings immediately
|
||||
Haxolottle: Nice! I just saw your first flag submission come through!
|
||||
|
||||
Haxolottle: flag{nc_banner_port_1234} - that's a netcat service banner flag.
|
||||
|
||||
Haxolottle: Digital Vanguard teaches banner grabbing as their first recon technique. Classic.
|
||||
|
||||
+ [What did the dead drop contain?]
|
||||
Haxolottle: Running decryption now... ah! It's a training manual.
|
||||
Haxolottle: "ENTROPY Netcat Reference Guide" - all their advanced techniques.
|
||||
Haxolottle: I'm adding it to your notes. Might come in handy later.
|
||||
-> continue_mission
|
||||
|
||||
= continue_mission
|
||||
Haxolottle: Three more flags to go. Keep scanning that network.
|
||||
|
||||
Haxolottle: And remember - each flag you grab makes their recruits more confused when they find nothing.
|
||||
|
||||
+ [Creating chaos. I like it.]
|
||||
Haxolottle: That's the spirit! Now get back to work, Agent.
|
||||
#add_item netcat_cheatsheet
|
||||
-> DONE
|
||||
```
|
||||
|
||||
### Mission Complete (All Flags Submitted)
|
||||
|
||||
```ink
|
||||
=== haxolottle_scanning_debrief ===
|
||||
// Player submits final flag
|
||||
Haxolottle: And that's four! Excellent work, Agent 0x00!
|
||||
|
||||
Haxolottle: All dead drops intercepted. Digital Vanguard's reconnaissance training cycle is completely disrupted.
|
||||
|
||||
+ [What did we get?]
|
||||
Haxolottle: Let me break it down for you...
|
||||
-> rewards_breakdown
|
||||
|
||||
= rewards_breakdown
|
||||
Haxolottle: Flag 1: Training manual - already sent to your notes.
|
||||
|
||||
Haxolottle: Flag 2: Another banner grab flag. Confirms they're teaching systematic service enumeration.
|
||||
|
||||
Haxolottle: Flag 3: Base64 encoded credential - decrypted to give you access to their online training portal. You can browse their course materials now.
|
||||
|
||||
Haxolottle: Flag 4: This one's interesting - distcc exploitation flag from CVE-2004-2687.
|
||||
|
||||
+ [That's an ancient vulnerability.]
|
||||
Haxolottle: Exactly! Which means they're targeting legacy development servers.
|
||||
-> strategic_analysis
|
||||
|
||||
= strategic_analysis
|
||||
Haxolottle: Here's what concerns me: they're not just teaching modern attacks.
|
||||
|
||||
Haxolottle: They're training recruits on ancient, forgotten vulnerabilities.
|
||||
|
||||
Haxolottle: Which Fortune 500 company do you think still has unpatched development servers from 2004?
|
||||
|
||||
+ [Probably more than we'd like to think.]
|
||||
Haxolottle: Bingo. This isn't just training - this is target selection.
|
||||
Haxolottle: They're preparing for a coordinated attack on legacy infrastructure.
|
||||
-> next_steps
|
||||
|
||||
= next_steps
|
||||
Haxolottle: Director Netherton wants a full briefing on this. He's authorizing a new operation.
|
||||
|
||||
Haxolottle: We're going to proactively defend potential targets before Digital Vanguard strikes.
|
||||
|
||||
Haxolottle: But first - let's talk about your bonus reward.
|
||||
|
||||
+ [Bonus?]
|
||||
Haxolottle: You intercepted ALL four dead drops. Complete denial of their training cycle.
|
||||
-> bonus_reward
|
||||
|
||||
= bonus_reward
|
||||
Haxolottle: Our cyberwarfare team found something special in their drop-site database.
|
||||
|
||||
Haxolottle: A digital recruit badge, issued to trainees who complete this module.
|
||||
|
||||
Haxolottle: We've cloned it. You can now impersonate a Digital Vanguard recruit.
|
||||
|
||||
Haxolottle: This badge will grant you access to other Digital Vanguard operations.
|
||||
|
||||
+ [So I can infiltrate deeper into their organization.]
|
||||
Haxolottle: Exactly! One mission down, and you're already becoming a valuable asset.
|
||||
-> wrap_up
|
||||
|
||||
= wrap_up
|
||||
Haxolottle: Alright, Agent 0x00. Head back to HQ for debriefing.
|
||||
|
||||
Haxolottle: Take some time to review the intel you gathered. More missions coming soon.
|
||||
|
||||
Haxolottle: And hey - you did great. Really great. I'm proud of you, little axolotl.
|
||||
|
||||
+ [Thanks, Haxolottle. Couldn't have done it without your support.]
|
||||
Haxolottle: Aww, you're going to make this old handler tear up. Now get out of there before security shows up.
|
||||
#mission_complete scanning_basics_001
|
||||
#add_item digital_vanguard_recruit_badge
|
||||
#unlock_mission legacy_shield_operation
|
||||
#increase_friendship haxolottle 15
|
||||
#add_credits 2500
|
||||
-> DONE
|
||||
```
|
||||
|
||||
### Optional: Discovery During Gameplay
|
||||
|
||||
```ink
|
||||
=== discover_drop_site_terminal ===
|
||||
// Player clicks on "Network Monitoring Station" PC in server room
|
||||
// Game displays observation text, then triggers this dialogue
|
||||
|
||||
The computer screen shows an unfamiliar login prompt:
|
||||
|
||||
"ENTROPY DROP-SITE TERMINAL - DV-ALPHA-07"
|
||||
|
||||
This must be the hidden terminal Haxolottle mentioned!
|
||||
|
||||
+ [Access the terminal]
|
||||
-> access_terminal
|
||||
+ [Examine it more closely first]
|
||||
-> examine_terminal
|
||||
|
||||
= examine_terminal
|
||||
It looks like a normal network monitoring station, but the software is clearly custom.
|
||||
|
||||
You recognize the interface from SAFETYNET intelligence briefings - this is definitely an ENTROPY drop-site.
|
||||
|
||||
+ [Access the terminal]
|
||||
-> access_terminal
|
||||
|
||||
= access_terminal
|
||||
You log in using SAFETYNET's override credentials. The terminal unlocks:
|
||||
|
||||
╔══════════════════════════════════════════════════════════╗
|
||||
║ ENTROPY DROP-SITE TERMINAL ║
|
||||
║ LOCATION: DV-ALPHA-07 ║
|
||||
╠══════════════════════════════════════════════════════════╣
|
||||
║ [1] Access Training Network (172.16.0.2) ║
|
||||
║ [2] Submit Dead Drop Interception ║
|
||||
║ [3] View Cached Intelligence ║
|
||||
║ [4] Exit Terminal ║
|
||||
╚══════════════════════════════════════════════════════════╝
|
||||
|
||||
// This transitions player to CTF interface
|
||||
#enable_flag_submission
|
||||
#enable_vm_access scanning_basics
|
||||
-> DONE
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Implementation Guidelines
|
||||
|
||||
### 1. Scenario Integration Checklist
|
||||
|
||||
For each SecGen CTF scenario:
|
||||
|
||||
- [ ] Create mission briefing Ink dialogue (Haxolottle or Netherton)
|
||||
- [ ] Design physical infiltration level (office/facility layout)
|
||||
- [ ] Place drop-site terminal in accessible location
|
||||
- [ ] Map all flags to appropriate rewards (equipment, intel, access, story)
|
||||
- [ ] Write flag decryption messages for each flag
|
||||
- [ ] Create mission complete debrief dialogue
|
||||
- [ ] Define what new content unlocks after completion
|
||||
- [ ] Test flag submission UI and reward distribution
|
||||
|
||||
### 2. Flag Reward Design Principles
|
||||
|
||||
**Balance reward types:**
|
||||
- 40% Equipment/Tools (tangible gameplay benefits)
|
||||
- 30% Intelligence/Lore (story progression, world-building)
|
||||
- 20% Access/Credentials (unlock new areas or shortcuts)
|
||||
- 10% Story Triggers (major plot progression)
|
||||
|
||||
**Ensure progression:**
|
||||
- Early flags: Basic equipment, simple intel
|
||||
- Mid-game flags: Advanced tools, cell structure intel
|
||||
- Late-game flags: Unique equipment, major story revelations
|
||||
|
||||
**Maintain narrative consistency:**
|
||||
- Flag rewards should match the ENTROPY cell (Digital Vanguard = corporate espionage tools)
|
||||
- Difficulty of CTF challenge should match reward value
|
||||
- Multiple flags from same operation should tell a coherent story
|
||||
|
||||
### 3. Drop-Site Terminal Placement
|
||||
|
||||
**Location guidelines:**
|
||||
- Place in naturally quiet areas (server rooms, storage closets, back offices)
|
||||
- Provide multiple approach paths (pick lock, steal keycard, exploit password)
|
||||
- Add environmental storytelling (ENTROPY operative notes nearby, suspicious equipment)
|
||||
- Create risk/reward scenarios (guard patrols, time limits, camera coverage)
|
||||
|
||||
**Visual design:**
|
||||
- Terminal should look mostly normal (don't make it obviously evil)
|
||||
- Subtle ENTROPY branding (small logo, color scheme, terminology)
|
||||
- Interface shows this isn't standard corporate software
|
||||
- Clear indication when player can submit flags
|
||||
|
||||
### 4. Pacing and Flow
|
||||
|
||||
**Mission structure:**
|
||||
1. Briefing (2-3 min): Character explains mission via dialogue
|
||||
2. Infiltration (5-10 min): Physical puzzle-solving to reach terminal
|
||||
3. CTF Challenge (15-30 min): VM-based hacking exercises
|
||||
4. Flag Submission (1-2 min per flag): Enter flags, see rewards
|
||||
5. Debrief (2-3 min): Character analyzes results, unlocks new content
|
||||
|
||||
**Total mission length:** 25-50 minutes depending on player skill
|
||||
|
||||
### 5. Technical Integration Points
|
||||
|
||||
**Game Systems Required:**
|
||||
- `FlagValidationSystem` - Verify submitted flags against database
|
||||
- `RewardDistributionSystem` - Grant items, intel, access based on flag
|
||||
- `MissionProgressionSystem` - Track flags per mission, unlock new missions
|
||||
- `DropSiteTerminalUI` - Interface for flag submission and VM access
|
||||
- `VMIntegrationSystem` - Launch/connect to SecGen VMs from game
|
||||
- `IntelDatabaseSystem` - Store and display unlocked intelligence files
|
||||
|
||||
**Data Structures:**
|
||||
```javascript
|
||||
{
|
||||
"mission_id": "scanning_basics_001",
|
||||
"flags": {
|
||||
"flag{nc_banner_port_1234}": {
|
||||
"type": "intel",
|
||||
"reward": {...},
|
||||
"decryptionMessage": "..."
|
||||
},
|
||||
// ... more flags
|
||||
},
|
||||
"drop_site_location": "prometheus_industries_server_room",
|
||||
"vm_config": {
|
||||
"scenario": "scanning_basic.xml",
|
||||
"kali_ip": "172.16.0.2",
|
||||
"target_ip": "172.16.0.10"
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### 6. Writing Guidelines for Dialogue
|
||||
|
||||
**Haxolottle's voice:**
|
||||
- Warm, mentoring, uses axolotl metaphors
|
||||
- Encouraging and proud of player achievements
|
||||
- Explains tactical details with enthusiasm
|
||||
- Adds emotional weight to victories
|
||||
|
||||
**Netherton's voice:**
|
||||
- Formal, stern, references handbook sections
|
||||
- Explains strategic importance of operations
|
||||
- Rare approval is meaningful
|
||||
- Focuses on SAFETYNET's mission and protocols
|
||||
|
||||
**Dr. Chen's voice:**
|
||||
- Rapid-fire technical explanations
|
||||
- Excited about interesting exploits and techniques
|
||||
- Provides deep-dive analysis of flags
|
||||
- Makes connections between technical and strategic aspects
|
||||
|
||||
### 7. Testing and Validation
|
||||
|
||||
**Test each flag:**
|
||||
- [ ] Flag string is correct format and validated
|
||||
- [ ] Decryption message is clear and narratively appropriate
|
||||
- [ ] Reward is granted correctly (item appears, door unlocks, etc.)
|
||||
- [ ] Mission progression tracking updates
|
||||
- [ ] No duplicate flag submission possible
|
||||
- [ ] Wrong flags provide helpful error messages
|
||||
|
||||
**Test complete missions:**
|
||||
- [ ] All flags can be found in VM
|
||||
- [ ] Dialogue flows naturally from briefing to debrief
|
||||
- [ ] Rewards feel appropriate for effort invested
|
||||
- [ ] Story progression makes sense
|
||||
- [ ] New content unlocks as expected
|
||||
|
||||
---
|
||||
|
||||
## Conclusion
|
||||
|
||||
The dead drop interception system transforms CTF flags from arbitrary completion markers into narratively meaningful game resources. By explaining flags as ENTROPY's coordination mechanism and requiring physical presence at drop-site terminals, we create a cohesive experience that blends:
|
||||
|
||||
- **Realistic cyber security training** (actual CTF challenges)
|
||||
- **Spy thriller narrative** (infiltration, interception, disruption)
|
||||
- **Progression mechanics** (equipment, intel, access unlocks)
|
||||
- **Character relationships** (handlers providing context and encouragement)
|
||||
|
||||
This system allows Break Escape to incorporate educational SecGen scenarios while maintaining narrative immersion and providing tangible gameplay rewards for success.
|
||||
Reference in New Issue
Block a user