mirror of
https://github.com/cliffe/BreakEscape.git
synced 2026-02-20 13:50:46 +00:00
- Refactored the MissionsController to use local variable `missions` instead of instance variable `@missions` for better clarity and performance. - Introduced grouping of missions by collection for display, improving the organization of mission listings. - Updated the view to iterate over `@missions_by_collection`, enhancing the presentation of missions by their respective collections. - Added new CSS styles for collection headings to improve UI aesthetics. Additionally, removed invalid missions from the database and updated mission collections for better categorization. Files modified: - missions_controller.rb: Refactored mission retrieval logic. - index.html.erb: Updated mission display logic and added new styles. - migration file: Added cleanup for invalid missions. - Various mission JSON files: Updated collections for consistency.
50 lines
1.9 KiB
JSON
50 lines
1.9 KiB
JSON
{
|
|
"display_name": "Ghost in the Machine",
|
|
"description": "Infiltrate Zero Day Syndicate under the guise of a security researcher recruit. Clone Victoria Sterling's RFID keycard, exploit vulnerable training network services, and uncover evidence linking Zero Day to the St. Catherine's Hospital ransomware attack. Your investigation reveals The Architect's Phase 2 plans targeting critical infrastructure.",
|
|
"difficulty_level": 2,
|
|
"secgen_scenario": "ghost_in_machine_vm_network",
|
|
"collection": "season_1",
|
|
"cybok": [
|
|
{
|
|
"ka": "NS",
|
|
"topic": "Network Security",
|
|
"keywords": ["nmap scanning", "Service enumeration", "Banner grabbing", "Network reconnaissance"]
|
|
},
|
|
{
|
|
"ka": "MAT",
|
|
"topic": "Attacks and exploitation",
|
|
"keywords": ["CVE-2004-2687", "distcc exploitation", "Remote code execution", "Zero-day marketplace", "EXPLOITATION"]
|
|
},
|
|
{
|
|
"ka": "AC",
|
|
"topic": "Applied Cryptography",
|
|
"keywords": ["Encoding vs encryption", "ROT13", "Base64", "Hexadecimal", "Multi-layer decoding"]
|
|
},
|
|
{
|
|
"ka": "HF",
|
|
"topic": "Human Factors",
|
|
"keywords": ["Social engineering", "Cover identity", "Trust exploitation"]
|
|
},
|
|
{
|
|
"ka": "SS",
|
|
"topic": "Systems Security",
|
|
"keywords": ["Service vulnerabilities", "Docker networks", "Evidence correlation"]
|
|
},
|
|
{
|
|
"ka": "RMG",
|
|
"topic": "Risk Management and Governance",
|
|
"keywords": ["Vulnerability economics", "Exploit pricing", "Ethical decision-making", "Moral dilemmas"]
|
|
},
|
|
{
|
|
"ka": "CPS",
|
|
"topic": "Physical Security",
|
|
"keywords": ["Physical access control", "RFID cloning", "Lock bypass", "PIN code systems"]
|
|
},
|
|
{
|
|
"ka": "AAA",
|
|
"topic": "Authentication",
|
|
"keywords": ["RFID authentication", "Access control bypass", "Credential theft", "Identity spoofing"]
|
|
}
|
|
]
|
|
}
|