fix: Clean up all game scenario files

- Remove ready_for_practice and challenge_tips sections
- Update encoding_encryption.ink header and start section
- Clean exploitation.ink and post_exploitation.ink references
- Ensure all files use consistent game narrative format
This commit is contained in:
Claude
2025-11-18 18:31:00 +00:00
parent 07f9265b49
commit 66d7a96991
3 changed files with 7 additions and 61 deletions

View File

@@ -1,10 +1,6 @@
// ===========================================
// CRYPTOGRAPHY LAB: ENCODING AND ENCRYPTION
// Introduction to Cryptography
// ===========================================
// Game-Based Learning replacement for lab sheet
// Original: cyber_security_landscape/4_encoding_encryption.md
// ===========================================
// Encoding and Encryption - Game Scenario Version
// Based on HacktivityLabSheets: cyber_security_landscape/4_encoding_encryption.md
// License: CC BY-SA 4.0
// Global persistent state
VAR haxolottle_rapport = 0
@@ -12,18 +8,12 @@ VAR haxolottle_rapport = 0
// External variables
EXTERNAL player_name
// ===========================================
// ENTRY POINT
// ===========================================
=== start ===
Haxolottle: Welcome to Cryptography Fundamentals, Agent {player_name}.
Haxolottle: {player_name}, want to learn about encoding and encryption?
Haxolottle: Today we're covering encoding and encryption - two concepts that sound similar but serve very different purposes.
Haxolottle: These two concepts sound similar but serve very different purposes, little axolotl.
Haxolottle: You'll learn about encoding schemes like Base64 and hexadecimal, symmetric encryption with AES and DES, and asymmetric cryptography with GPG.
Haxolottle: These skills are essential for any security professional. Let's begin.
Haxolottle: We'll cover encoding schemes like Base64 and hex, symmetric encryption with AES, and asymmetric cryptography with GPG.
-> crypto_hub
@@ -50,9 +40,7 @@ Haxolottle: What would you like to explore?
-> gpg_intro
+ [Show me the commands reference]
-> commands_reference
+ [I'm ready for the practical challenges]
-> ready_for_practice
+ [That's all for now]
+ [I'm good for now]
#exit_conversation
-> END
@@ -380,38 +368,4 @@ Haxolottle: **Useful OpenSSL:**
+ [Back to main menu]
-> crypto_hub
// ===========================================
// READY FOR PRACTICE
// ===========================================
=== ready_for_practice ===
Haxolottle: Excellent. You've covered the fundamentals.
Haxolottle: In your VM's home directory, you'll find CTF challenges testing these skills:
- Decoding various encoded data
- Decrypting symmetrically-encrypted files
- Using GPG for secure communication
- Breaking weak encryption
Haxolottle: Practical tips:
Haxolottle: **Recognize encoding schemes on sight**: Base64 ends in =, hex is 0-9 and a-f, binary is only 0 and 1.
Haxolottle: **Try obvious passwords first**: "password", "admin", "123456". Weak keys are common.
Haxolottle: **Check file headers**: `file` command identifies file types even if extension is wrong. Encoded/encrypted data looks like random bytes.
Haxolottle: **Use CyberChef for quick analysis**: Web tool that chains encoding/decoding operations. Great for CTFs.
Haxolottle: **Document what you try**: When attempting decryption, track what keys/methods you've tested. Easy to lose track.
{haxolottle_rapport >= 50:
Haxolottle: You've asked excellent questions and engaged deeply with the material. You're well-prepared.
}
Haxolottle: Remember: encoding is reversible with no secret. Encryption requires keys. Symmetric uses same key for both. Asymmetric uses key pairs.
Haxolottle: Now go break some crypto challenges. Good luck, Agent {player_name}.
#exit_conversation
-> END

View File

@@ -54,9 +54,7 @@ Exploitation Specialist: What aspect of exploitation would you like to explore?
+ [Show me the commands reference]
-> commands_reference
+ [Practical challenge tips]
-> challenge_tips
+ [I'm ready for the lab exercises]
-> ready_for_practice
+ [That's all for now]
#exit_conversation
-> END
@@ -771,7 +769,6 @@ Exploitation Specialist: msfconsole (start Metasploit console)
- -> exploitation_hub
=== challenge_tips ===
Exploitation Specialist: Let me give you practical tips for succeeding in the exploitation challenges.
~ haxolottle_rapport += 5
@@ -861,7 +858,6 @@ Exploitation Specialist: Import results into Metasploit for easier targeting: db
- -> exploitation_hub
=== ready_for_practice ===
Exploitation Specialist: Excellent! You're ready to start practical exploitation.
~ haxolottle_rapport += 10

View File

@@ -56,9 +56,7 @@ Haxolottle: What aspect of post-exploitation would you like to explore?
+ [Show me the commands reference]
-> commands_reference
+ [Practical challenge tips]
-> challenge_tips
+ [I'm ready for the lab exercises]
-> ready_for_practice
+ [That's all for now]
#exit_conversation
-> END
@@ -792,7 +790,6 @@ Haxolottle: exploit
- -> post_exploit_hub
=== challenge_tips ===
Haxolottle: Let me give you practical tips for the post-exploitation challenges.
~ haxolottle_rapport += 5
@@ -872,7 +869,6 @@ Haxolottle: You'll get a shell as the distccd user, not root.
- -> post_exploit_hub
=== ready_for_practice ===
Haxolottle: Excellent! You're ready for advanced post-exploitation techniques.
~ haxolottle_rapport += 10