From e4557846b369477044b7d8bf4c31a3900ddbe7ed Mon Sep 17 00:00:00 2001 From: "Z. Cliffe Schreuders" Date: Wed, 14 Jan 2026 09:46:32 +0000 Subject: [PATCH] Add Mission 3 Stage 4 player objectives (Part 1: Primary objectives) - Created player_goals.md with objectives structure - Defined 1 primary objective with 3 aims (11 tasks total) - Aim 1.1: Establish Undercover Access (2 tasks) - Aim 1.2: Network Reconnaissance (4 VM flag tasks) - Aim 1.3: Physical Evidence Collection (4 in-game tasks) - Mapped progression flow and success states - Hybrid architecture integration (VM + in-game) Next: Optional objectives and world mapping --- .../stages/stage_4/player_goals.md | 305 ++++++++++++++++++ 1 file changed, 305 insertions(+) create mode 100644 planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_4/player_goals.md diff --git a/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_4/player_goals.md b/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_4/player_goals.md new file mode 100644 index 0000000..0c937ce --- /dev/null +++ b/planning_notes/overall_story_plan/mission_initializations/m03_ghost_in_the_machine/stages/stage_4/player_goals.md @@ -0,0 +1,305 @@ +# Mission 3: Player Objectives - "Ghost in the Machine" + +**Mission ID:** m03_ghost_in_the_machine +**Title:** Ghost in the Machine +**Stage:** 4 - Player Objectives Design +**Date Created:** 2025-12-27 + +--- + +## Overview + +**Scenario:** Ghost in the Machine +**Mission Type:** Infiltration & Investigation (Undercover) +**Target Difficulty:** Tier 2 (Intermediate) +**Estimated Playtime:** 60-75 minutes + +**Objective Philosophy:** + +Mission 3 uses a **hybrid progressive structure** that combines: +- **Linear main path** (Act 1: Undercover → Act 2: Investigation → Act 3: Confrontation) +- **Non-linear investigation** (Act 2: Multiple evidence sources can be pursued in any order) +- **Optional objectives** (LORE fragments, complete stealth, moral choices) + +**From Act 2 onwards, objectives are clearly displayed in the UI** to guide players through the investigation phase. + +--- + +## Primary Objective: Gather Intelligence on Zero Day Operations + +**ID:** `main_mission` +**Description:** "Gather evidence of Zero Day Syndicate's exploit marketplace operations" + +**Narrative Purpose:** +- Prove Zero Day sold the M2 hospital exploit +- Identify ENTROPY cell connections +- Discover The Architect's involvement +- Collect evidence for Victoria Sterling's arrest + +**Educational Purpose:** +- Network reconnaissance (nmap, banner grabbing) +- Intelligence correlation (physical + digital evidence) +- Multi-stage encoding (ROT13, Hex, Base64) +- Operational security (stealth, social engineering) + +**Success Criteria:** +- All 3 aims completed +- Minimum 4 of 6 VM flags submitted +- Evidence of M2 connection discovered +- Victoria Sterling confronted (optional) + +--- + +### Aim 1.1: Establish Undercover Access + +**ID:** `establish_cover` +**Description:** "Infiltrate WhiteHat Security and clone Victoria Sterling's keycard" +**Unlock Condition:** Available from mission start (Act 1) +**Act:** Act 1 - Undercover Infiltration + +This aim covers the daytime undercover operation where the player poses as a prospective client. + +**Tasks:** + +#### Task: Attend meeting with Victoria Sterling +- **ID:** `meet_victoria` +- **Type:** In-Game (NPC interaction) +- **Description:** "Meet Victoria Sterling at WhiteHat Security" +- **Location:** Conference room +- **Requirements:** Mission briefing completed +- **Completion:** Automatic when player starts dialogue with Victoria +- **Unlocks:** RFID cloning opportunity +- **Status at Start:** `active` + +#### Task: Clone Victoria's RFID keycard +- **ID:** `clone_rfid_card` +- **Type:** In-Game (proximity mechanic) +- **Description:** "Clone Victoria Sterling's executive keycard" +- **Location:** Conference room (during meeting) +- **Requirements:** RFID cloner device (provided in briefing), proximity to Victoria for 10 seconds +- **Completion:** Automatic when RFID clone progress reaches 100% +- **Unlocks:** Server room access (nighttime), Aim 1.2 unlocked +- **Status at Start:** `locked` (unlocks after meet_victoria) +- **Alternative Path:** If victoria_trust >= 40, Victoria grants access willingly (bypasses this task) + +**Aim Completion:** When both tasks completed OR Victoria grants access +**Transitions to:** Act 2 - Investigation phase, Aim 1.2 unlocked + +--- + +### Aim 1.2: Network Reconnaissance + +**ID:** `network_recon` +**Description:** "Scan Zero Day's training network to identify services and gather intelligence" +**Unlock Condition:** Unlocked after `clone_rfid_card` completed (server room accessible) +**Act:** Act 2 - Investigation & Escalation + +This aim represents the VM-based network scanning challenges. + +**Tasks:** + +#### Task: Scan training network for open ports +- **ID:** `scan_network` +- **Type:** VM Flag +- **Description:** "Use nmap to scan the training network (192.168.100.0/24)" +- **Location:** Server room - VM terminal +- **Requirements:** Server room access +- **Completion:** Submit flag `flag{network_scan_complete}` at drop-site terminal +- **Ink Tag:** `#complete_task:scan_network` +- **Unlocks:** Access to service enumeration tasks +- **Status at Start:** `locked` (unlocks when server room accessed) + +#### Task: Gather FTP banner intelligence +- **ID:** `ftp_banner` +- **Type:** VM Flag +- **Description:** "Connect to FTP service and extract banner information" +- **Location:** Server room - VM terminal +- **Requirements:** Network scan completed +- **Completion:** Submit flag `flag{ftp_intel_gathered}` at drop-site terminal +- **Ink Tag:** `#complete_task:ftp_banner` +- **Unlocks:** Client codename "GHOST" revealed (M2 connection foreshadowing) +- **Status at Start:** `locked` (unlocks after scan_network) + +#### Task: Analyze HTTP service +- **ID:** `http_analysis` +- **Type:** VM Flag + In-Game (correlation) +- **Description:** "Analyze HTTP service and decode Base64 pricing data" +- **Location:** Server room - VM terminal + CyberChef workstation +- **Requirements:** Network scan completed, CyberChef access +- **Completion:** Submit flag `flag{pricing_intel_decoded}` at drop-site terminal +- **Ink Tag:** `#complete_task:http_analysis` +- **Unlocks:** Pricing intelligence document in-game +- **Status at Start:** `locked` (unlocks after scan_network) + +#### Task: Exploit distcc service +- **ID:** `distcc_exploit` +- **Type:** VM Flag (Advanced) +- **Description:** "Exploit legacy distcc service to access operational logs" +- **Location:** Server room - VM terminal +- **Requirements:** Network scan completed, Metasploit knowledge OR manual exploitation +- **Completion:** Submit flag `flag{distcc_legacy_compromised}` at drop-site terminal +- **Ink Tag:** `#complete_task:distcc_exploit` + triggers M2 revelation event +- **Unlocks:** **CRITICAL**: Operational logs revealing M2 hospital attack connection +- **Status at Start:** `locked` (unlocks after scan_network) +- **Special:** Triggers Agent 0x99 event conversation revealing M2 connection + +**Aim Completion:** When all 4 tasks completed +**Critical Path:** `distcc_exploit` is REQUIRED for M2 revelation (narrative climax) + +--- + +### Aim 1.3: Physical Evidence Collection + +**ID:** `gather_evidence` +**Description:** "Collect physical evidence from WhiteHat Security offices" +**Unlock Condition:** Unlocked when server room accessed (parallel to Aim 1.2) +**Act:** Act 2 - Investigation & Escalation + +This aim represents in-game evidence gathering that correlates with VM findings. + +**Tasks:** + +#### Task: Decode whiteboard message +- **ID:** `decode_whiteboard` +- **Type:** In-Game (encoding puzzle) +- **Description:** "Decode the ROT13 message on the server room whiteboard" +- **Location:** Server room - whiteboard (interactable object) +- **Requirements:** CyberChef workstation access +- **Completion:** Player successfully decodes ROT13 at CyberChef +- **Ink Tag:** `#complete_task:decode_whiteboard` +- **Unlocks:** Message: "MEET WITH THE ARCHITECT - PRIORITIZE INFRASTRUCTURE EXPLOITS" +- **Status at Start:** `locked` (unlocks when server room accessed) + +#### Task: Access Victoria's computer +- **ID:** `access_victoria_computer` +- **Type:** In-Game (lockpicking + password) +- **Description:** "Access Victoria Sterling's executive office computer" +- **Location:** Executive office +- **Requirements:** Executive office access (lockpick door OR victoria_trust >= 40) +- **Completion:** Successful login to Victoria's computer +- **Ink Tag:** `#complete_task:access_victoria_computer` +- **Unlocks:** Email drafts, client roster, hex-encoded files +- **Status at Start:** `locked` (unlocks when server room accessed, parallel to VM tasks) + +#### Task: Decode client roster +- **ID:** `decode_client_roster` +- **Type:** In-Game (Hex decoding) +- **Description:** "Decode the hex-encoded client roster from Victoria's computer" +- **Location:** Executive office computer → CyberChef workstation +- **Requirements:** Victoria's computer accessed +- **Completion:** Player decodes hex client list at CyberChef +- **Ink Tag:** `#complete_task:decode_client_roster` +- **Unlocks:** Client list: Ransomware Incorporated, Critical Mass, Social Fabric +- **Status at Start:** `locked` (unlocks after access_victoria_computer) + +#### Task: Find operational logs +- **ID:** `find_operational_logs` +- **Type:** Correlation (VM + In-Game) +- **Description:** "Correlate VM operational logs with physical evidence" +- **Location:** Server room (after distcc exploitation) +- **Requirements:** `distcc_exploit` completed (VM flag), physical evidence gathered +- **Completion:** Player examines operational logs file (auto-appears after distcc_exploit) +- **Ink Tag:** `#complete_task:find_operational_logs` + triggers M2 revelation dialogue +- **Unlocks:** **MIDPOINT TWIST**: Discovery of ProFTPD sale to GHOST for $12,500 +- **Status at Start:** `locked` (unlocks after distcc_exploit) +- **Special:** This is the KEY correlation task that reveals M2 connection + +**Aim Completion:** When all 4 tasks completed +**Narrative Impact:** Completing this aim + Aim 1.2 = full evidence gathered, unlocks Act 3 + +--- + +## Objectives Progression Flow + +``` +ACT 1: UNDERCOVER INFILTRATION +├─ Aim 1.1: Establish Undercover Access [ACTIVE at start] +│ ├─ Task: meet_victoria [ACTIVE] +│ └─ Task: clone_rfid_card [LOCKED → unlocks after meet_victoria] +│ → Completes Aim 1.1 +│ → Unlocks Aim 1.2 + Aim 1.3 (parallel) +│ +ACT 2: INVESTIGATION & ESCALATION +├─ Aim 1.2: Network Reconnaissance [LOCKED → unlocks after Aim 1.1] +│ ├─ Task: scan_network [LOCKED → unlocks when server room accessed] +│ ├─ Task: ftp_banner [LOCKED → unlocks after scan_network] +│ ├─ Task: http_analysis [LOCKED → unlocks after scan_network] +│ └─ Task: distcc_exploit [LOCKED → unlocks after scan_network] +│ → Triggers M2 revelation event +│ +├─ Aim 1.3: Physical Evidence Collection [LOCKED → unlocks when server room accessed] +│ ├─ Task: decode_whiteboard [LOCKED → unlocks when server room accessed] +│ ├─ Task: access_victoria_computer [LOCKED → unlocks when server room accessed] +│ ├─ Task: decode_client_roster [LOCKED → unlocks after access_victoria_computer] +│ └─ Task: find_operational_logs [LOCKED → unlocks after distcc_exploit] +│ → MIDPOINT TWIST: M2 hospital connection revealed +│ +│ Both Aim 1.2 + Aim 1.3 complete → All evidence collected +│ → Triggers: Victoria confrontation available +│ +ACT 3: CONFRONTATION & CHOICE +└─ Victoria confrontation (optional but recommended) + ├─ Moral Choice 1: James Park's protection + └─ Moral Choice 2: Victoria's fate (arrest/recruit/delay) +``` + +**Critical Path Summary:** +1. Meet Victoria → Clone RFID (OR build trust) +2. Access server room → Network scan + Evidence gathering (parallel) +3. Complete distcc exploit → M2 revelation +4. Find operational logs → Full evidence correlation +5. Confront Victoria (optional) → Make moral choices + +--- + +## Success and Failure States + +### Complete Success (100%) +- All primary objectives completed (Aims 1.1, 1.2, 1.3) +- All 4 VM flags submitted +- All 4 physical evidence tasks completed +- M2 connection discovered +- Victoria confronted with evidence +- Optimal moral choices made (player-defined) +- No detection by guard (perfect stealth) + +### Good Success (80-99%) +- All primary objectives completed +- Minimum 3 of 4 VM flags submitted +- M2 connection discovered +- Victoria confronted +- Minor detection incidents (guard alert but not hostile) + +### Acceptable Success (60-79%) +- Aims 1.1 and 1.2 completed (or 1.1 and 1.3) +- Minimum 2 VM flags submitted +- Sufficient evidence to identify Zero Day operations +- Victoria may not be confronted +- Some stealth failures (detected but recovered) + +### Minimal Success (50-59%) +- Aim 1.1 completed (gained access) +- At least 1 VM flag submitted +- Some evidence gathered (partial intelligence) +- Mission technically complete but incomplete picture + +### Failure States + +**Mission Cannot Be Permanently Failed** - Player can retry from checkpoints + +**Soft Failure Scenarios:** +- Detected by guard 3 times: Mission becomes significantly harder, timer imposed (5 min) +- Victoria becomes suspicious: Locks down server room, must use alternative methods +- RFID cloning failed + low trust: Must lockpick server room door + +**Checkpoint System:** +- Checkpoint 1: After Aim 1.1 complete (RFID cloned) +- Checkpoint 2: After server room accessed +- Checkpoint 3: After M2 revelation (distcc_exploit + find_operational_logs) + +**Note:** Players can continue campaign regardless of success level. Lower success = fewer intel for future missions. + +--- + +**Status:** 🔄 IN PROGRESS (Part 1/3 complete) +**Next Section:** Optional Objectives + Objective-to-World Mapping