From 604c3ddbdecb17673ce65956c76488bfeb74d314 Mon Sep 17 00:00:00 2001 From: c7309830 Date: Wed, 26 Mar 2025 12:33:52 +0000 Subject: [PATCH] workstation update pt 2 --- assets/scenarios/scenario1.json | 9 ++++++- assets/scenarios/scenario2.json | 7 ++++++ assets/scenarios/scenario3.json | 7 ++++++ assets/scenarios/scenario4.json | 7 ++++++ scenario_select.html | 44 ++++++++++++++++----------------- 5 files changed, 51 insertions(+), 23 deletions(-) diff --git a/assets/scenarios/scenario1.json b/assets/scenarios/scenario1.json index 0360a4e..d35f3ed 100644 --- a/assets/scenarios/scenario1.json +++ b/assets/scenarios/scenario1.json @@ -14,6 +14,13 @@ "lockType": "password", "requires": "Professor Bark", "objects": [ + { + "type": "workstation", + "name": "Crypto Analysis Station", + "takeable": true, + "inInventory": true, + "observations": "A powerful workstation for cryptographic analysis" + }, { "type": "phone", "name": "Reception Phone", @@ -47,7 +54,7 @@ "south": "reception" }, "objects": [ - { + { "type": "pc", "name": "Office Computer", "takeable": false, diff --git a/assets/scenarios/scenario2.json b/assets/scenarios/scenario2.json index 09eb80e..71c0eb1 100644 --- a/assets/scenarios/scenario2.json +++ b/assets/scenarios/scenario2.json @@ -11,6 +11,13 @@ "lockType": "key", "requires": "briefcase_key", "objects": [ + { + "type": "workstation", + "name": "Crypto Analysis Station", + "takeable": true, + "inInventory": true, + "observations": "A powerful workstation for cryptographic analysis" + }, { "type": "phone", "name": "Recorded Conversation", diff --git a/assets/scenarios/scenario3.json b/assets/scenarios/scenario3.json index 24729a8..20c4987 100644 --- a/assets/scenarios/scenario3.json +++ b/assets/scenarios/scenario3.json @@ -11,6 +11,13 @@ "lockType": "key", "requires": "briefcase_key", "objects": [ + { + "type": "workstation", + "name": "Crypto Analysis Station", + "takeable": true, + "inInventory": true, + "observations": "A powerful workstation for cryptographic analysis" + }, { "type": "pc", "name": "AES Encrypted Terminal", diff --git a/assets/scenarios/scenario4.json b/assets/scenarios/scenario4.json index 8a8d921..2231597 100644 --- a/assets/scenarios/scenario4.json +++ b/assets/scenarios/scenario4.json @@ -9,6 +9,13 @@ "north": "room_office" }, "objects": [ + { + "type": "workstation", + "name": "Crypto Analysis Station", + "takeable": true, + "inInventory": true, + "observations": "A powerful workstation for cryptographic analysis" + }, { "type": "pc", "name": "Base64 Terminal", diff --git a/scenario_select.html b/scenario_select.html index 2c1b7d7..d8cb39b 100644 --- a/scenario_select.html +++ b/scenario_select.html @@ -213,18 +213,16 @@ // List of available scenarios const scenarios = [ { - id: "ceo_exfil", - title: "CEO Data Exfiltration", - description: "Infiltrate the CEO's office and exfiltrate sensitive company data. You'll need to bypass physical security and find ways to access restricted areas.", - difficulty: "medium", - file: "assets/scenarios/ceo_exfil.json" - }, - { - id: "biometric_breach", - title: "Biometric Security Breach", - description: "Test the company's biometric security systems by collecting and spoofing fingerprint data to gain unauthorized access.", - difficulty: "hard", - file: "assets/scenarios/biometric_breach.json" + id: "encoding_lab", + title: "Encoding and Encryption Lab", + description: "Recover your legendary cookie recipe from mischievous squirrels by solving various encoding and encryption challenges.", + difficulty: "beginner", + file: "assets/scenarios/scenario4.json", + cybok: [ + { ka: "AC", topic: "Algorithms, Schemes and Protocols", keywords: ["Encoding vs Cryptography", "Caesar cipher", "Vigenere cipher", "SYMMETRIC CRYPTOGRAPHY - AES (ADVANCED ENCRYPTION STANDARD)"] }, + { ka: "F", topic: "Artifact Analysis", keywords: ["Encoding and alternative data formats"] }, + { ka: "WAM", topic: "Fundamental Concepts and Approaches", keywords: ["ENCODING", "BASE64"] } + ] }, { id: "captain_meow", @@ -242,6 +240,13 @@ { ka: "AC", topic: "Algorithms, Schemes and Protocols", keywords: ["ADVANCED ENCRYPTION STANDARD (AES)", "ECB (ELECTRONIC CODE BOOK) BLOCK CIPHER MODE"] } ] }, + { + id: "ceo_exfil", + title: "CEO Data Exfiltration", + description: "Infiltrate the CEO's office and exfiltrate sensitive company data. You'll need to bypass physical security and find ways to access restricted areas.", + difficulty: "medium", + file: "assets/scenarios/ceo_exfil.json" + }, { id: "asymmetric_encryption", title: "Asymmetric Encryption with RSA", @@ -268,16 +273,11 @@ ] }, { - id: "encoding_lab", - title: "Encoding and Encryption Lab", - description: "Recover your legendary cookie recipe from mischievous squirrels by solving various encoding and encryption challenges.", - difficulty: "beginner", - file: "assets/scenarios/scenario4.json", - cybok: [ - { ka: "AC", topic: "Algorithms, Schemes and Protocols", keywords: ["Encoding vs Cryptography", "Caesar cipher", "Vigenere cipher", "SYMMETRIC CRYPTOGRAPHY - AES (ADVANCED ENCRYPTION STANDARD)"] }, - { ka: "F", topic: "Artifact Analysis", keywords: ["Encoding and alternative data formats"] }, - { ka: "WAM", topic: "Fundamental Concepts and Approaches", keywords: ["ENCODING", "BASE64"] } - ] + id: "biometric_breach", + title: "Biometric Security Breach", + description: "Test the company's biometric security systems by collecting and spoofing fingerprint data to gain unauthorized access.", + difficulty: "hard", + file: "assets/scenarios/biometric_breach.json" } ];