mirror of
https://github.com/cliffe/BreakEscape.git
synced 2026-02-21 11:18:08 +00:00
workstation update pt 2
This commit is contained in:
@@ -14,6 +14,13 @@
|
||||
"lockType": "password",
|
||||
"requires": "Professor Bark",
|
||||
"objects": [
|
||||
{
|
||||
"type": "workstation",
|
||||
"name": "Crypto Analysis Station",
|
||||
"takeable": true,
|
||||
"inInventory": true,
|
||||
"observations": "A powerful workstation for cryptographic analysis"
|
||||
},
|
||||
{
|
||||
"type": "phone",
|
||||
"name": "Reception Phone",
|
||||
@@ -47,7 +54,7 @@
|
||||
"south": "reception"
|
||||
},
|
||||
"objects": [
|
||||
{
|
||||
{
|
||||
"type": "pc",
|
||||
"name": "Office Computer",
|
||||
"takeable": false,
|
||||
|
||||
@@ -11,6 +11,13 @@
|
||||
"lockType": "key",
|
||||
"requires": "briefcase_key",
|
||||
"objects": [
|
||||
{
|
||||
"type": "workstation",
|
||||
"name": "Crypto Analysis Station",
|
||||
"takeable": true,
|
||||
"inInventory": true,
|
||||
"observations": "A powerful workstation for cryptographic analysis"
|
||||
},
|
||||
{
|
||||
"type": "phone",
|
||||
"name": "Recorded Conversation",
|
||||
|
||||
@@ -11,6 +11,13 @@
|
||||
"lockType": "key",
|
||||
"requires": "briefcase_key",
|
||||
"objects": [
|
||||
{
|
||||
"type": "workstation",
|
||||
"name": "Crypto Analysis Station",
|
||||
"takeable": true,
|
||||
"inInventory": true,
|
||||
"observations": "A powerful workstation for cryptographic analysis"
|
||||
},
|
||||
{
|
||||
"type": "pc",
|
||||
"name": "AES Encrypted Terminal",
|
||||
|
||||
@@ -9,6 +9,13 @@
|
||||
"north": "room_office"
|
||||
},
|
||||
"objects": [
|
||||
{
|
||||
"type": "workstation",
|
||||
"name": "Crypto Analysis Station",
|
||||
"takeable": true,
|
||||
"inInventory": true,
|
||||
"observations": "A powerful workstation for cryptographic analysis"
|
||||
},
|
||||
{
|
||||
"type": "pc",
|
||||
"name": "Base64 Terminal",
|
||||
|
||||
@@ -213,18 +213,16 @@
|
||||
// List of available scenarios
|
||||
const scenarios = [
|
||||
{
|
||||
id: "ceo_exfil",
|
||||
title: "CEO Data Exfiltration",
|
||||
description: "Infiltrate the CEO's office and exfiltrate sensitive company data. You'll need to bypass physical security and find ways to access restricted areas.",
|
||||
difficulty: "medium",
|
||||
file: "assets/scenarios/ceo_exfil.json"
|
||||
},
|
||||
{
|
||||
id: "biometric_breach",
|
||||
title: "Biometric Security Breach",
|
||||
description: "Test the company's biometric security systems by collecting and spoofing fingerprint data to gain unauthorized access.",
|
||||
difficulty: "hard",
|
||||
file: "assets/scenarios/biometric_breach.json"
|
||||
id: "encoding_lab",
|
||||
title: "Encoding and Encryption Lab",
|
||||
description: "Recover your legendary cookie recipe from mischievous squirrels by solving various encoding and encryption challenges.",
|
||||
difficulty: "beginner",
|
||||
file: "assets/scenarios/scenario4.json",
|
||||
cybok: [
|
||||
{ ka: "AC", topic: "Algorithms, Schemes and Protocols", keywords: ["Encoding vs Cryptography", "Caesar cipher", "Vigenere cipher", "SYMMETRIC CRYPTOGRAPHY - AES (ADVANCED ENCRYPTION STANDARD)"] },
|
||||
{ ka: "F", topic: "Artifact Analysis", keywords: ["Encoding and alternative data formats"] },
|
||||
{ ka: "WAM", topic: "Fundamental Concepts and Approaches", keywords: ["ENCODING", "BASE64"] }
|
||||
]
|
||||
},
|
||||
{
|
||||
id: "captain_meow",
|
||||
@@ -242,6 +240,13 @@
|
||||
{ ka: "AC", topic: "Algorithms, Schemes and Protocols", keywords: ["ADVANCED ENCRYPTION STANDARD (AES)", "ECB (ELECTRONIC CODE BOOK) BLOCK CIPHER MODE"] }
|
||||
]
|
||||
},
|
||||
{
|
||||
id: "ceo_exfil",
|
||||
title: "CEO Data Exfiltration",
|
||||
description: "Infiltrate the CEO's office and exfiltrate sensitive company data. You'll need to bypass physical security and find ways to access restricted areas.",
|
||||
difficulty: "medium",
|
||||
file: "assets/scenarios/ceo_exfil.json"
|
||||
},
|
||||
{
|
||||
id: "asymmetric_encryption",
|
||||
title: "Asymmetric Encryption with RSA",
|
||||
@@ -268,16 +273,11 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
id: "encoding_lab",
|
||||
title: "Encoding and Encryption Lab",
|
||||
description: "Recover your legendary cookie recipe from mischievous squirrels by solving various encoding and encryption challenges.",
|
||||
difficulty: "beginner",
|
||||
file: "assets/scenarios/scenario4.json",
|
||||
cybok: [
|
||||
{ ka: "AC", topic: "Algorithms, Schemes and Protocols", keywords: ["Encoding vs Cryptography", "Caesar cipher", "Vigenere cipher", "SYMMETRIC CRYPTOGRAPHY - AES (ADVANCED ENCRYPTION STANDARD)"] },
|
||||
{ ka: "F", topic: "Artifact Analysis", keywords: ["Encoding and alternative data formats"] },
|
||||
{ ka: "WAM", topic: "Fundamental Concepts and Approaches", keywords: ["ENCODING", "BASE64"] }
|
||||
]
|
||||
id: "biometric_breach",
|
||||
title: "Biometric Security Breach",
|
||||
description: "Test the company's biometric security systems by collecting and spoofing fingerprint data to gain unauthorized access.",
|
||||
difficulty: "hard",
|
||||
file: "assets/scenarios/biometric_breach.json"
|
||||
}
|
||||
];
|
||||
|
||||
|
||||
Reference in New Issue
Block a user