diff --git a/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_terminal_cyberchef.ink b/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_terminal_cyberchef.ink index 8f535dc..36e462b 100644 --- a/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_terminal_cyberchef.ink +++ b/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_terminal_cyberchef.ink @@ -12,7 +12,7 @@ VAR usb_drive_decoded_layer2 = false VAR first_time_tutorial = true // External variables -EXTERNAL player_name +EXTERNAL player_name() // =========================================== // MAIN TERMINAL INTERFACE @@ -30,11 +30,11 @@ EXTERNAL player_name [This workstation provides real-time encoding/decoding] [Use CyberChef operations to decode evidence] - Available operations: - - From Base64 - - ROT13 - - From Hex - - Multi-layer decoding (sequential operations) + [Available operations:] + [• From Base64] + [• ROT13] + [• From Hex] + [• Multi-layer decoding (sequential operations)] ~ first_time_tutorial = false } diff --git a/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_terminal_cyberchef.json b/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_terminal_cyberchef.json new file mode 100644 index 0000000..09d6c1c --- /dev/null +++ b/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_7/m03_terminal_cyberchef.json @@ -0,0 +1 @@ +{"inkVersion":21,"root":[[["done",{"#n":"g-0"}],null],"done",{"start":["#","^speaker:computer","/#","^╔═══════════════════════════════════════════╗","\n","^║ CYBERCHEF DECODING WORKSTATION ║","\n","^║ Encoding/Decoding Analysis Tools ║","\n","^╚═══════════════════════════════════════════╝","\n","ev",{"VAR?":"first_time_tutorial"},"/ev",[{"->":".^.b","c":true},{"b":["\n","^[This workstation provides real-time encoding/decoding]","\n","^[Use CyberChef operations to decode evidence]","\n","^[Available operations:]","\n","^[• From Base64]","\n","^[• ROT13]","\n","^[• From Hex]","\n","^[• Multi-layer decoding (sequential operations)]","\n","ev",false,"/ev",{"VAR=":"first_time_tutorial","re":true},{"->":"start.15"},null]}],"nop","\n","^Select evidence to decode:","\n",{"->":"hub"},null],"hub":[["ev","str","^Decode server room whiteboard message","/str",{"VAR?":"whiteboard_decoded"},"!","/ev",{"*":".^.c-0","flg":5},"ev","str","^Decode client roster file (from Victoria's computer)","/str",{"VAR?":"client_roster_decoded"},"!","/ev",{"*":".^.c-1","flg":5},"ev","str","^Decode USB drive message (double-encoded)","/str",{"VAR?":"usb_drive_decoded_layer2"},"!","/ev",{"*":".^.c-2","flg":5},"ev","str","^View decoding reference guide","/str","/ev",{"*":".^.c-3","flg":4},"ev","str","^Exit workstation","/str","/ev",{"*":".^.c-4","flg":4},{"c-0":["\n",{"->":"decode_whiteboard"},null],"c-1":["\n",{"->":"decode_client_roster"},null],"c-2":["\n",{"->":"decode_usb_drive"},null],"c-3":["\n",{"->":"reference_guide"},null],"c-4":["\n","#","^exit_conversation","/#","done",null]}],null],"decode_whiteboard":[["#","^speaker:computer","/#","^EVIDENCE: Server room whiteboard message","\n","^INPUT (Raw):","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^ZRRG JVGU GUR NEPUVGRPG'F CERSBEERQ PYVRAGF","\n","^CEBWRPG CUNFR 1: URNYGUNERENCCYVPNGVBAF","\n","^CEBWRPG CUNFR 2: RARETL TEVQ VPF","\n","^PBAGNPG: PVCURE SBE CEPRFG NCCEBI NY","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^ENCODING DETECTED: Character substitution pattern","\n","^RECOMMENDATION: Apply ROT13 operation","\n","ev","str","^Apply ROT13 decoding","/str","/ev",{"*":".^.c-0","flg":4},"ev","str","^Try different decoding method","/str","/ev",{"*":".^.c-1","flg":4},{"c-0":["\n",{"->":"whiteboard_rot13_result"},null],"c-1":["\n",{"->":"whiteboard_wrong_method"},null]}],null],"whiteboard_rot13_result":[["#","^speaker:computer","/#","^Applying \"ROT13\" operation...","\n","^OUTPUT (Decoded):","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^MEET WITH THE ARCHITECT'S PREFERRED CLIENTS","\n","^PROJECT PHASE 1: HEALTHCARE APPLICATIONS","\n","^PROJECT PHASE 2: ENERGY GRID ICS","\n","^CONTACT: CIPHER FOR PRIEST APPROVAL","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^ANALYSIS:","\n",["^\"The Architect\" - ENTROPY leadership reference","\n",["^Phase 1: Healthcare applications (aligns with M2 attack)","\n",["^Phase 2: Energy grid ICS (future attack vector)","\n",["^\"Cipher\" = Victoria Sterling's ENTROPY codename","\n",["^\"Priest approval\" - pricing authorization process?","\n","^CRITICAL INTELLIGENCE:","\n","^Confirms multi-phase attack campaign coordinated by","\n","^\"The Architect\" with Victoria Sterling as operational lead.","\n","^Evidence logged. Objective updated.","\n","ev",true,"/ev",{"VAR=":"whiteboard_decoded","re":true},"#","^complete_task:decode_whiteboard","/#","ev","str","^Save evidence and return","/str","/ev",{"*":".^.c-0","flg":4},{"c-0":["\n","^Evidence saved to SAFETYNET database.","\n",{"->":"hub"},null],"#n":"g-4"}],{"#n":"g-3"}],{"#n":"g-2"}],{"#n":"g-1"}],{"#n":"g-0"}],null],null],"whiteboard_wrong_method":[["#","^speaker:computer","/#","^Applying alternative decoding...","\n","^ERROR: Output is garbled nonsense.","\n","^TIP: This appears to be a simple character substitution.","\n","^Try ROT13 - a common cipher that shifts letters 13 positions.","\n","ev","str","^Try ROT13 instead","/str","/ev",{"*":".^.c-0","flg":4},"ev","str","^Return to evidence selection","/str","/ev",{"*":".^.c-1","flg":4},{"c-0":["\n",{"->":"whiteboard_rot13_result"},null],"c-1":["\n",{"->":"hub"},null]}],null],"decode_client_roster":[["#","^speaker:computer","/#","^EVIDENCE: Client roster file (victoria_clients.hex)","\n","ev",{"VAR?":"client_roster_decoded"},"!","/ev",[{"->":".^.b","c":true},{"b":["\n","^PREREQUISITE: Access Victoria Sterling's executive computer","\n","^FILE LOCATION: Documents/victoria_clients.hex","\n","^Have you accessed Victoria's computer and retrieved this file?","\n",{"->":".^.^.^.10"},null]}],"nop","\n","ev","str","^File already decoded - view results","/str",{"VAR?":"client_roster_decoded"},"/ev",{"*":".^.c-0","flg":5},"ev","str","^Decode hex file","/str","/ev",{"*":".^.c-1","flg":4},"ev","str","^Return to evidence selection","/str","/ev",{"*":".^.c-2","flg":4},{"c-0":["\n",{"->":"client_roster_result"},null],"c-1":["\n",{"->":"decode_client_roster_hex"},null],"c-2":["\n",{"->":"hub"},null]}],null],"decode_client_roster_hex":[["#","^speaker:computer","/#","^INPUT (Raw hex):","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^5a 45 52 4f 20 44 41 59 20 53 59 4e 44 49 43 41","\n","^54 45 20 2d 20 43 4c 49 45 4e 54 20 52 4f 53 54","\n","^45 52 0a 51 33 20 32 30 32 34 0a 0a 43 6c 69 65","\n","^6e 74 20 49 44 3a 20 47 48 4f 53 54 0a 4f 72 67","\n","^61 6e 69 7a 61 74 69 6f 6e 3a 20 52 61 6e 73 6f","\n","^6d 77 61 72 65 20 49 6e 63 6f 72 70 6f 72 61 74","\n","^65 64 0a 50 75 72 63 68 61 73 65 73 3a 20 50 72","\n","^6f 46 54 50 44 20 65 78 70 6c 6f 69 74 20 28 24","\n","^31 32 2c 35 30 30 29 0a 44 65 70 6c 6f 79 6d 65","\n","^6e 74 3a 20 53 74 2e 20 43 61 74 68 65 72 69 6e","\n","^65 27 73 20 48 6f 73 70 69 74 61 6c 0a 0a 43 6c","\n","^69 65 6e 74 20 49 44 3a 20 53 4f 43 49 41 4c 5f","\n","^46 41 42 52 49 43 0a 50 75 72 63 68 61 73 65 73","\n","^3a 20 4d 75 6c 74 69 70 6c 65 20 65 78 70 6c 6f","\n","^69 74 73 0a 0a 43 6c 69 65 6e 74 20 49 44 3a 20","\n","^43 52 49 54 49 43 41 4c 5f 4d 41 53 53 0a","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^ENCODING DETECTED: Hexadecimal (ASCII hex values)","\n","^RECOMMENDATION: Apply \"From Hex\" operation","\n","ev","str","^Apply From Hex decoding","/str","/ev",{"*":".^.c-0","flg":4},{"c-0":["\n",{"->":"client_roster_result"},null]}],null],"client_roster_result":[["#","^speaker:computer","/#","^Applying \"From Hex\" operation...","\n","^OUTPUT (Decoded):","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^ZERO DAY SYNDICATE - CLIENT ROSTER","\n","^Q3 2024","\n","^Client ID: GHOST","\n","^Organization: Ransomware Incorporated","\n","^Purchases: ProFTPD exploit ($12,500)","\n","^Deployment: St. Catherine's Hospital","\n","^Client ID: SOCIAL_FABRIC","\n","^Purchases: Multiple exploits","\n","^Client ID: CRITICAL_MASS","\n","^Purchases: Infrastructure targeting exploits","\n","^Client ID: DARK_PATTERN","\n","^Purchases: [Data redacted]","\n","^TOTAL Q3 REVENUE: $847,000 (23 exploits)","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^ANALYSIS:","\n","^⚠ CRITICAL EVIDENCE ⚠","\n","^Direct confirmation of ENTROPY cross-cell collaboration:","\n",["^Ransomware Incorporated (GHOST) - M2 hospital buyer","\n",["^Social Fabric - Misinformation cell","\n",["^Critical Mass - Infrastructure targeting","\n",["^Dark Pattern - Unknown operations","\n","^$12,500 ProFTPD exploit explicitly linked to","\n","^St. Catherine's Hospital deployment.","\n","^This evidence proves:","\n","^1. Zero Day sold M2 hospital exploit","\n","^2. GHOST = Ransomware Incorporated","\n","^3. Multi-cell ENTROPY coordination","\n","^4. $847K quarterly revenue from exploit sales","\n","^PROSECUTION VALUE: Maximum. Smoking gun evidence.","\n","ev",true,"/ev",{"VAR=":"client_roster_decoded","re":true},"#","^complete_task:decode_client_roster","/#","ev","str","^Save evidence and return","/str","/ev",{"*":".^.c-0","flg":4},{"c-0":["\n","^Evidence saved. This is powerful prosecution material.","\n",{"->":"hub"},null],"#n":"g-3"}],{"#n":"g-2"}],{"#n":"g-1"}],{"#n":"g-0"}],null],null],"decode_usb_drive":[["#","^speaker:computer","/#","^EVIDENCE: Hidden USB drive (from executive office desk)","\n","ev",{"VAR?":"usb_drive_decoded_layer1"},"!","/ev",[{"->":".^.b","c":true},{"b":["\n","^PREREQUISITE: Find hidden USB drive in Victoria's desk","\n","^ENCODING DETECTED: Multi-layer encoding","\n","^WARNING: This will require multiple decoding operations","\n","^Have you found the USB drive?","\n",{"->":".^.^.^.10"},null]}],"nop","\n","ev",{"VAR?":"usb_drive_decoded_layer1"},{"VAR?":"usb_drive_decoded_layer2"},"!","&&","/ev",[{"->":".^.b","c":true},{"b":["\n","^LAYER 1 DECODING COMPLETE","\n","^The output from Base64 decoding is still encoded!","\n","^This is a nested encoding - you need to decode again.","\n",{"->":".^.^.^.19"},null]}],"nop","\n","ev",{"VAR?":"usb_drive_decoded_layer2"},"/ev",[{"->":".^.b","c":true},{"b":["\n","^USB drive fully decoded. View results?","\n",{"->":".^.^.^.25"},null]}],"nop","\n","ev","str","^Decode USB drive - Layer 1 (Base64)","/str",{"VAR?":"usb_drive_decoded_layer1"},"!","/ev",{"*":".^.c-0","flg":5},"ev","str","^Decode Layer 2 (ROT13)","/str",{"VAR?":"usb_drive_decoded_layer1"},{"VAR?":"usb_drive_decoded_layer2"},"!","&&","/ev",{"*":".^.c-1","flg":5},"ev","str","^View fully decoded message","/str",{"VAR?":"usb_drive_decoded_layer2"},"/ev",{"*":".^.c-2","flg":5},"ev","str","^Return to evidence selection","/str","/ev",{"*":".^.c-3","flg":4},{"c-0":["\n",{"->":"decode_usb_layer1"},null],"c-1":["\n",{"->":"decode_usb_layer2"},null],"c-2":["\n",{"->":"usb_final_result"},null],"c-3":["\n",{"->":"hub"},null]}],null],"decode_usb_layer1":[["#","^speaker:computer","/#","^USB DRIVE - LAYER 1 DECODING","\n","^INPUT (Raw Base64):","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^R2VhejogR3VyIE5lcHV2Z3JwZydmIEVldmpycnZpcnJmCgpQdW5n","\n","^YWUsIFJhbmdlcmUgcmtjYWJicmdncGEgY2V2YmV2Z3ZyZiBzYmU","\n","^gTTQ6CgoxLiBWQVNFTkZHSEhQR0hFUiBFS0NHQlZHRiAoUEVWQk","\n","^VWR0wpCiAgIFNicGgmZnYgYmEgbnJyZ3BuZXIgbnJwZ2JlIEZQTl","\n","^FOWSB2bGZ2cnpmCiAgIFJhcmV0bCB0ZXZjIFZQRiBpcGFhcmVv","\n","^YWF2Z3ZyZmdpcmYuCgoyLiBQRUJGRi1QUkxZWS BQQQJCRFBFUEV","\n","^HVkJBCiAgIENlYml2cXIgRWFuZmJ6emplciBWYXAgbmFnIGFiZmN","\n","^2Z25nIGJ5IGVSZ3lib250cmdnLgogICBGYnB2bm95IFNub295IGV","\n","^nZ3lib25nZyBlZWFmYnpudi5ndCBnYXJleWwgdmd2Y2dtcWdnLgo","\n","^KMy4gUEJFUlhHVkJBTlkgRlJQSGVWR0wKICAgSnV2dnJVbmcgRm","\n","^NwaGVWZ2cgc2ViYWcgenVmZyBlcm5hbnZhIHBiYWl2YXBycS4KI","\n","^CAgSXZwZ2JldnYgRmdyZXl2YXQgbmhyYnJ2bXJxIGdiIGVycGho","\n","^dnQgcWJoeXIgbmFyYWdmLgo=","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^Applying \"From Base64\" operation...","\n","^OUTPUT (Layer 1 decoded):","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^Geare: Gur Nepuvgrpg'f Qverpgvir","\n","^Pvcure, Shegure rkcybvgngvba cevbevgvrf sbe D4:","\n","^1. VASENFGEHPGHER RKCYBVGF (CEVBEVGL)","\n","^Sbphf ba urnyguner frpgbe FPNQN flfgrzf","\n","^Raretl tevq VPF ihyarenoyvgvrf.","\n","^2. PEBFF-PRYY PBBBEQVANGVBA","\n","^Cebivqr Enafsbjner Vap naq ubfcvgny gnetrgrq rkcybvgf.","\n","^Fbpvny Snoevp rkcybvgf enafsbjner raret vpneqf.","\n","^3. BCRENGVBANY FRPHEVGL","\n","^JuvgrUng Frpphevgl sebag zhfg erznva pbaivnaprq.","\n","^Ivpgbevn Fgreyvat nhgubevmrq gb erpehvg qbhoyr ntragf.","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^ANALYSIS:","\n","^Still encoded! The Base64 layer revealed another cipher.","\n","^PATTERN DETECTED: Character substitution (likely ROT13)","\n","^RECOMMENDATION: Apply ROT13 to this output","\n","ev",true,"/ev",{"VAR=":"usb_drive_decoded_layer1","re":true},"ev","str","^Continue to Layer 2 decoding","/str","/ev",{"*":".^.c-0","flg":4},{"c-0":["\n",{"->":"decode_usb_layer2"},null]}],null],"decode_usb_layer2":[["#","^speaker:computer","/#","^USB DRIVE - LAYER 2 DECODING","\n","^INPUT (From Layer 1):","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^Geare: Gur Nepuvgrpg'f Qverpgvir","\n","^Pvcure, Shegure rkcybvgngvba cevbevgvrf sbe D4:","\n","^1. VASENFGEHPGHER RKCYBVGF (CEVBEVGL)","\n","^Sbphf ba urnyguner frpgbe FPNQN flfgrzf","\n","^Raretl tevq VPF ihyarenoyvgvrf.","\n","^2. PEBFF-PRYY PBBBEQVANGVBA","\n","^Cebivqr Enafsbjner Vap naq ubfcvgny gnetrgrq rkcybvgf.","\n","^Fbpvny Snoevp rkcybvgf enafsbjner raret vpneqf.","\n","^3. BCRENGVBANY FRPHEVGL","\n","^JuvgrUng Frphevgl sebag zhfg erznva pbaivpaprq.","\n","^Ivpgbevn Fgreyvat nhgubevmrq gb erpehvg qbhoyr ntragf.","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^Applying \"ROT13\" operation...","\n","^OUTPUT (Fully decoded):","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^Title: The Architect's Directive","\n","^Cipher, Further exploitation priorities for Q4:","\n","^1. INFRASTRUCTURE EXPLOITS (PRIORITY)","\n","^Focus on healthcare sector SCADA systems","\n","^Energy grid ICS vulnerabilities.","\n","^2. CROSS-CELL COORDINATION","\n","^Provide Ransomware Inc and hospital targeted exploits.","\n","^Social Fabric exploits ransomware energy impacts.","\n","^3. OPERATIONAL SECURITY","\n","^WhiteHat Security front must remain convinced.","\n","^Victoria Sterling authorized to recruit double agents.","\n","^PHASE 2 TARGETS (Q4 2024 - Q1 2025):","\n","^Healthcare SCADA Systems:","\n",["^Hospital ventilation control (15 facilities identified)","\n",["^Patient monitoring networks (critical care units)","\n","^Energy Grid ICS:","\n",["^Substation automation (427 vulnerable units mapped)","\n","^PROJECTED IMPACT ANALYSIS:","\n",["^Healthcare disruption: 50,000+ patient treatment delays","\n",["^Energy disruption: 1.2M residential customers (winter)","\n",["^Combined chaos amplification factor: 3.7x","\n","^The Architect's Vision:","\n","^\"Each cell operates independently. But coordinated,","\n","^they become inevitable. Systems fail. Society fragments.","\n","^Entropy accelerates.\"","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","ev",true,"/ev",{"VAR=":"usb_drive_decoded_layer2","re":true},{"->":"usb_final_result"},{"#n":"g-5"}],{"#n":"g-4"}],{"#n":"g-3"}],{"#n":"g-2"}],{"#n":"g-1"}],{"#n":"g-0"}],null],null],"usb_final_result":[["#","^speaker:computer","/#","^⚠⚠⚠ CRITICAL INTELLIGENCE - MAXIMUM PRIORITY ⚠⚠⚠","\n","^ANALYSIS:","\n","^━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━","\n","^This is a direct communication from \"The Architect\" -","\n","^ENTROPY's leadership figure.","\n","^KEY REVELATIONS:","\n","^1. PHASE 2 ATTACK PLANS","\n",["^15 healthcare facilities targeted (SCADA control)","\n",["^427 energy substations mapped for attack","\n",["^Q4 2024 - Q1 2025 timeline (IMMINENT)","\n","^2. PROJECTED CASUALTIES","\n",["^50,000+ patient treatment delays","\n",["^1.2 million customers without power (winter targeting)","\n",["^\"Chaos amplification factor\" - calculated mass harm","\n","^3. MULTI-CELL COORDINATION","\n",["^The Architect coordinates all ENTROPY cells","\n",["^Zero Day provides exploits","\n",["^Ransomware Inc deploys against hospitals","\n",["^Social Fabric amplifies panic/misinformation","\n",["^Synchronized multi-vector attack planned","\n","^4. VICTORIA STERLING'S AUTHORIZATION","\n",["^Authorized to recruit double agents","\n",["^Suggests infiltration of security/law enforcement","\n","^THREAT LEVEL: CRITICAL","\n","^RECOMMENDED ACTION: Immediate SAFETYNET response","\n","^Prevent Phase 2 deployment","\n","^Evidence logged. This is campaign-level intelligence.","\n","#","^complete_task:lore_fragment_3","/#","ev","str","^Save evidence immediately","/str","/ev",{"*":".^.c-0","flg":4},{"c-0":["\n","^This evidence forwarded to SAFETYNET Command.","\n","^Phase 2 attack prevention now highest priority.","\n",{"->":"hub"},null],"#n":"g-12"}],{"#n":"g-11"}],{"#n":"g-10"}],{"#n":"g-9"}],{"#n":"g-8"}],{"#n":"g-7"}],{"#n":"g-6"}],{"#n":"g-5"}],{"#n":"g-4"}],{"#n":"g-3"}],{"#n":"g-2"}],{"#n":"g-1"}],{"#n":"g-0"}],null],null],"reference_guide":[["#","^speaker:computer","/#","^╔═══════════════════════════════════════════╗","\n","^║ CYBERCHEF ENCODING REFERENCE GUIDE ║","\n","^╚═══════════════════════════════════════════╝","\n","^COMMON ENCODING TYPES:","\n","^1. BASE64","\n",["^Looks like: Alphanumeric + / and = symbols","\n",["^Example: SGVsbG8gV29ybGQ=","\n",["^Operation: \"From Base64\"","\n","^2. ROT13 (Caesar Cipher)","\n",["^Looks like: Readable but nonsensical English","\n",["^Example: URYYB JBEYQ → HELLO WORLD","\n",["^Operation: \"ROT13\" (13-character shift)","\n","^3. HEXADECIMAL","\n",["^Looks like: Two-digit hex values (0-9, A-F)","\n",["^Example: 48 65 6C 6C 6F","\n",["^Operation: \"From Hex\"","\n","^4. MULTI-LAYER ENCODING","\n",["^Text encoded multiple times","\n",["^Decode in reverse order of encoding","\n",["^Example: Base64(ROT13(text)) needs ROT13 first, then Base64","\n","^TIP: If decoded output still looks encoded, try another","\n","^operation on the result (multi-layer encoding).","\n","ev","str","^Return to decoding menu","/str","/ev",{"*":".^.c-0","flg":4},{"c-0":["\n",{"->":"hub"},null],"#n":"g-11"}],{"#n":"g-10"}],{"#n":"g-9"}],{"#n":"g-8"}],{"#n":"g-7"}],{"#n":"g-6"}],{"#n":"g-5"}],{"#n":"g-4"}],{"#n":"g-3"}],{"#n":"g-2"}],{"#n":"g-1"}],{"#n":"g-0"}],null],null],"global decl":["ev",false,{"VAR=":"whiteboard_decoded"},false,{"VAR=":"client_roster_decoded"},false,{"VAR=":"usb_drive_decoded_layer1"},false,{"VAR=":"usb_drive_decoded_layer2"},true,{"VAR=":"first_time_tutorial"},"/ev","end",null]}],"listDefs":{}} \ No newline at end of file