Add Mission 3 Stage 4 player objectives (Part 1: Primary objectives)

- Created player_goals.md with objectives structure
- Defined 1 primary objective with 3 aims (11 tasks total)
- Aim 1.1: Establish Undercover Access (2 tasks)
- Aim 1.2: Network Reconnaissance (4 VM flag tasks)
- Aim 1.3: Physical Evidence Collection (4 in-game tasks)
- Mapped progression flow and success states
- Hybrid architecture integration (VM + in-game)

Next: Optional objectives and world mapping
This commit is contained in:
Z. Cliffe Schreuders
2026-01-14 09:46:32 +00:00
parent dfd30b17e2
commit e4557846b3

View File

@@ -0,0 +1,305 @@
# Mission 3: Player Objectives - "Ghost in the Machine"
**Mission ID:** m03_ghost_in_the_machine
**Title:** Ghost in the Machine
**Stage:** 4 - Player Objectives Design
**Date Created:** 2025-12-27
---
## Overview
**Scenario:** Ghost in the Machine
**Mission Type:** Infiltration & Investigation (Undercover)
**Target Difficulty:** Tier 2 (Intermediate)
**Estimated Playtime:** 60-75 minutes
**Objective Philosophy:**
Mission 3 uses a **hybrid progressive structure** that combines:
- **Linear main path** (Act 1: Undercover → Act 2: Investigation → Act 3: Confrontation)
- **Non-linear investigation** (Act 2: Multiple evidence sources can be pursued in any order)
- **Optional objectives** (LORE fragments, complete stealth, moral choices)
**From Act 2 onwards, objectives are clearly displayed in the UI** to guide players through the investigation phase.
---
## Primary Objective: Gather Intelligence on Zero Day Operations
**ID:** `main_mission`
**Description:** "Gather evidence of Zero Day Syndicate's exploit marketplace operations"
**Narrative Purpose:**
- Prove Zero Day sold the M2 hospital exploit
- Identify ENTROPY cell connections
- Discover The Architect's involvement
- Collect evidence for Victoria Sterling's arrest
**Educational Purpose:**
- Network reconnaissance (nmap, banner grabbing)
- Intelligence correlation (physical + digital evidence)
- Multi-stage encoding (ROT13, Hex, Base64)
- Operational security (stealth, social engineering)
**Success Criteria:**
- All 3 aims completed
- Minimum 4 of 6 VM flags submitted
- Evidence of M2 connection discovered
- Victoria Sterling confronted (optional)
---
### Aim 1.1: Establish Undercover Access
**ID:** `establish_cover`
**Description:** "Infiltrate WhiteHat Security and clone Victoria Sterling's keycard"
**Unlock Condition:** Available from mission start (Act 1)
**Act:** Act 1 - Undercover Infiltration
This aim covers the daytime undercover operation where the player poses as a prospective client.
**Tasks:**
#### Task: Attend meeting with Victoria Sterling
- **ID:** `meet_victoria`
- **Type:** In-Game (NPC interaction)
- **Description:** "Meet Victoria Sterling at WhiteHat Security"
- **Location:** Conference room
- **Requirements:** Mission briefing completed
- **Completion:** Automatic when player starts dialogue with Victoria
- **Unlocks:** RFID cloning opportunity
- **Status at Start:** `active`
#### Task: Clone Victoria's RFID keycard
- **ID:** `clone_rfid_card`
- **Type:** In-Game (proximity mechanic)
- **Description:** "Clone Victoria Sterling's executive keycard"
- **Location:** Conference room (during meeting)
- **Requirements:** RFID cloner device (provided in briefing), proximity to Victoria for 10 seconds
- **Completion:** Automatic when RFID clone progress reaches 100%
- **Unlocks:** Server room access (nighttime), Aim 1.2 unlocked
- **Status at Start:** `locked` (unlocks after meet_victoria)
- **Alternative Path:** If victoria_trust >= 40, Victoria grants access willingly (bypasses this task)
**Aim Completion:** When both tasks completed OR Victoria grants access
**Transitions to:** Act 2 - Investigation phase, Aim 1.2 unlocked
---
### Aim 1.2: Network Reconnaissance
**ID:** `network_recon`
**Description:** "Scan Zero Day's training network to identify services and gather intelligence"
**Unlock Condition:** Unlocked after `clone_rfid_card` completed (server room accessible)
**Act:** Act 2 - Investigation & Escalation
This aim represents the VM-based network scanning challenges.
**Tasks:**
#### Task: Scan training network for open ports
- **ID:** `scan_network`
- **Type:** VM Flag
- **Description:** "Use nmap to scan the training network (192.168.100.0/24)"
- **Location:** Server room - VM terminal
- **Requirements:** Server room access
- **Completion:** Submit flag `flag{network_scan_complete}` at drop-site terminal
- **Ink Tag:** `#complete_task:scan_network`
- **Unlocks:** Access to service enumeration tasks
- **Status at Start:** `locked` (unlocks when server room accessed)
#### Task: Gather FTP banner intelligence
- **ID:** `ftp_banner`
- **Type:** VM Flag
- **Description:** "Connect to FTP service and extract banner information"
- **Location:** Server room - VM terminal
- **Requirements:** Network scan completed
- **Completion:** Submit flag `flag{ftp_intel_gathered}` at drop-site terminal
- **Ink Tag:** `#complete_task:ftp_banner`
- **Unlocks:** Client codename "GHOST" revealed (M2 connection foreshadowing)
- **Status at Start:** `locked` (unlocks after scan_network)
#### Task: Analyze HTTP service
- **ID:** `http_analysis`
- **Type:** VM Flag + In-Game (correlation)
- **Description:** "Analyze HTTP service and decode Base64 pricing data"
- **Location:** Server room - VM terminal + CyberChef workstation
- **Requirements:** Network scan completed, CyberChef access
- **Completion:** Submit flag `flag{pricing_intel_decoded}` at drop-site terminal
- **Ink Tag:** `#complete_task:http_analysis`
- **Unlocks:** Pricing intelligence document in-game
- **Status at Start:** `locked` (unlocks after scan_network)
#### Task: Exploit distcc service
- **ID:** `distcc_exploit`
- **Type:** VM Flag (Advanced)
- **Description:** "Exploit legacy distcc service to access operational logs"
- **Location:** Server room - VM terminal
- **Requirements:** Network scan completed, Metasploit knowledge OR manual exploitation
- **Completion:** Submit flag `flag{distcc_legacy_compromised}` at drop-site terminal
- **Ink Tag:** `#complete_task:distcc_exploit` + triggers M2 revelation event
- **Unlocks:** **CRITICAL**: Operational logs revealing M2 hospital attack connection
- **Status at Start:** `locked` (unlocks after scan_network)
- **Special:** Triggers Agent 0x99 event conversation revealing M2 connection
**Aim Completion:** When all 4 tasks completed
**Critical Path:** `distcc_exploit` is REQUIRED for M2 revelation (narrative climax)
---
### Aim 1.3: Physical Evidence Collection
**ID:** `gather_evidence`
**Description:** "Collect physical evidence from WhiteHat Security offices"
**Unlock Condition:** Unlocked when server room accessed (parallel to Aim 1.2)
**Act:** Act 2 - Investigation & Escalation
This aim represents in-game evidence gathering that correlates with VM findings.
**Tasks:**
#### Task: Decode whiteboard message
- **ID:** `decode_whiteboard`
- **Type:** In-Game (encoding puzzle)
- **Description:** "Decode the ROT13 message on the server room whiteboard"
- **Location:** Server room - whiteboard (interactable object)
- **Requirements:** CyberChef workstation access
- **Completion:** Player successfully decodes ROT13 at CyberChef
- **Ink Tag:** `#complete_task:decode_whiteboard`
- **Unlocks:** Message: "MEET WITH THE ARCHITECT - PRIORITIZE INFRASTRUCTURE EXPLOITS"
- **Status at Start:** `locked` (unlocks when server room accessed)
#### Task: Access Victoria's computer
- **ID:** `access_victoria_computer`
- **Type:** In-Game (lockpicking + password)
- **Description:** "Access Victoria Sterling's executive office computer"
- **Location:** Executive office
- **Requirements:** Executive office access (lockpick door OR victoria_trust >= 40)
- **Completion:** Successful login to Victoria's computer
- **Ink Tag:** `#complete_task:access_victoria_computer`
- **Unlocks:** Email drafts, client roster, hex-encoded files
- **Status at Start:** `locked` (unlocks when server room accessed, parallel to VM tasks)
#### Task: Decode client roster
- **ID:** `decode_client_roster`
- **Type:** In-Game (Hex decoding)
- **Description:** "Decode the hex-encoded client roster from Victoria's computer"
- **Location:** Executive office computer → CyberChef workstation
- **Requirements:** Victoria's computer accessed
- **Completion:** Player decodes hex client list at CyberChef
- **Ink Tag:** `#complete_task:decode_client_roster`
- **Unlocks:** Client list: Ransomware Incorporated, Critical Mass, Social Fabric
- **Status at Start:** `locked` (unlocks after access_victoria_computer)
#### Task: Find operational logs
- **ID:** `find_operational_logs`
- **Type:** Correlation (VM + In-Game)
- **Description:** "Correlate VM operational logs with physical evidence"
- **Location:** Server room (after distcc exploitation)
- **Requirements:** `distcc_exploit` completed (VM flag), physical evidence gathered
- **Completion:** Player examines operational logs file (auto-appears after distcc_exploit)
- **Ink Tag:** `#complete_task:find_operational_logs` + triggers M2 revelation dialogue
- **Unlocks:** **MIDPOINT TWIST**: Discovery of ProFTPD sale to GHOST for $12,500
- **Status at Start:** `locked` (unlocks after distcc_exploit)
- **Special:** This is the KEY correlation task that reveals M2 connection
**Aim Completion:** When all 4 tasks completed
**Narrative Impact:** Completing this aim + Aim 1.2 = full evidence gathered, unlocks Act 3
---
## Objectives Progression Flow
```
ACT 1: UNDERCOVER INFILTRATION
├─ Aim 1.1: Establish Undercover Access [ACTIVE at start]
│ ├─ Task: meet_victoria [ACTIVE]
│ └─ Task: clone_rfid_card [LOCKED → unlocks after meet_victoria]
│ → Completes Aim 1.1
│ → Unlocks Aim 1.2 + Aim 1.3 (parallel)
ACT 2: INVESTIGATION & ESCALATION
├─ Aim 1.2: Network Reconnaissance [LOCKED → unlocks after Aim 1.1]
│ ├─ Task: scan_network [LOCKED → unlocks when server room accessed]
│ ├─ Task: ftp_banner [LOCKED → unlocks after scan_network]
│ ├─ Task: http_analysis [LOCKED → unlocks after scan_network]
│ └─ Task: distcc_exploit [LOCKED → unlocks after scan_network]
│ → Triggers M2 revelation event
├─ Aim 1.3: Physical Evidence Collection [LOCKED → unlocks when server room accessed]
│ ├─ Task: decode_whiteboard [LOCKED → unlocks when server room accessed]
│ ├─ Task: access_victoria_computer [LOCKED → unlocks when server room accessed]
│ ├─ Task: decode_client_roster [LOCKED → unlocks after access_victoria_computer]
│ └─ Task: find_operational_logs [LOCKED → unlocks after distcc_exploit]
│ → MIDPOINT TWIST: M2 hospital connection revealed
│ Both Aim 1.2 + Aim 1.3 complete → All evidence collected
│ → Triggers: Victoria confrontation available
ACT 3: CONFRONTATION & CHOICE
└─ Victoria confrontation (optional but recommended)
├─ Moral Choice 1: James Park's protection
└─ Moral Choice 2: Victoria's fate (arrest/recruit/delay)
```
**Critical Path Summary:**
1. Meet Victoria → Clone RFID (OR build trust)
2. Access server room → Network scan + Evidence gathering (parallel)
3. Complete distcc exploit → M2 revelation
4. Find operational logs → Full evidence correlation
5. Confront Victoria (optional) → Make moral choices
---
## Success and Failure States
### Complete Success (100%)
- All primary objectives completed (Aims 1.1, 1.2, 1.3)
- All 4 VM flags submitted
- All 4 physical evidence tasks completed
- M2 connection discovered
- Victoria confronted with evidence
- Optimal moral choices made (player-defined)
- No detection by guard (perfect stealth)
### Good Success (80-99%)
- All primary objectives completed
- Minimum 3 of 4 VM flags submitted
- M2 connection discovered
- Victoria confronted
- Minor detection incidents (guard alert but not hostile)
### Acceptable Success (60-79%)
- Aims 1.1 and 1.2 completed (or 1.1 and 1.3)
- Minimum 2 VM flags submitted
- Sufficient evidence to identify Zero Day operations
- Victoria may not be confronted
- Some stealth failures (detected but recovered)
### Minimal Success (50-59%)
- Aim 1.1 completed (gained access)
- At least 1 VM flag submitted
- Some evidence gathered (partial intelligence)
- Mission technically complete but incomplete picture
### Failure States
**Mission Cannot Be Permanently Failed** - Player can retry from checkpoints
**Soft Failure Scenarios:**
- Detected by guard 3 times: Mission becomes significantly harder, timer imposed (5 min)
- Victoria becomes suspicious: Locks down server room, must use alternative methods
- RFID cloning failed + low trust: Must lockpick server room door
**Checkpoint System:**
- Checkpoint 1: After Aim 1.1 complete (RFID cloned)
- Checkpoint 2: After server room accessed
- Checkpoint 3: After M2 revelation (distcc_exploit + find_operational_logs)
**Note:** Players can continue campaign regardless of success level. Lower success = fewer intel for future missions.
---
**Status:** 🔄 IN PROGRESS (Part 1/3 complete)
**Next Section:** Optional Objectives + Objective-to-World Mapping