Files
BreakEscape/scenarios/scenario1.xml

59 lines
2.3 KiB
XML
Raw Permalink Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
<?xml version="1.0"?>
<scenario xmlns="http://www.github//cliffe/BreakEscapeGame/blob/main/assets/scenarios"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="https://github.com/cliffe/BreakEscapeGame/blob/main/assets/scenarios/scenerio1.json">
<name>Captain Meow disappearance</name>
<author>Z. Cliffe Schreuders</author>
<description>
# Introduction
Your beloved kitty sidekick, Captain Meow, has vanished without a trace! As a renowned adventurer and detective, you suspect foul play. The last clue? A cryptic paw print left on your desk and a strange voicemail message on your phone.
Captain Meow has always been a sneaky genius, leaving behind puzzles in hopes that you would find him. If anyone could leave behind a trail of encrypted clues, its him. But who would kidnap the smartest cat in the world? And why?
Your journey begins in your study, where Captain Meows last trail begins. Can you decipher his messages, crack the codes, and rescue him before time runs out?
</description>
<type>escape room</type>
<difficulty>medium</difficulty>
<CyBOK KA="F" topic="Operating System Analysis">
<keyword>Steganography</keyword>
<keyword>Encoding and alternative data formats</keyword>
<keyword>SEARCH FOR EVIDENCE</keyword>
<keyword>METADATA</keyword>
</CyBOK>
<CyBOK KA="POR" topic="Privacy Technologies and Democratic Values">
<keyword>METADATA</keyword>
<keyword>STEGANOGRAPHY</keyword>
</CyBOK>
<CyBOK KA="AC" topic="Cryptographic Implementation">
<keyword>Cryptographic Libraries</keyword>
<keyword>ENCRYPTION - TOOLS</keyword>
</CyBOK>
<CyBOK KA="AC" topic="Physical Security">
<keyword>Fingerprint Authentication</keyword>
<keyword>Bluetooth Security</keyword>
<keyword>Physical Locks</keyword>
</CyBOK>
<CyBOK KA="AC" topic="Hashing and Integrity">
<keyword>Hash Functions</keyword>
<keyword>MD5 Hash</keyword>
</CyBOK>
<CyBOK KA="AC" topic="Encoding and Representation">
<keyword>Base64 Encoding</keyword>
<keyword>Octal Encoding</keyword>
<keyword>Hexadecimal (Hex) Encoding</keyword>
</CyBOK>
<CyBOK KA="AC" topic="Algorithms, Schemes and Protocols">
<keyword>ADVANCED ENCRYPTION STANDARD (AES)</keyword>
<keyword>ECB (ELECTRONIC CODE BOOK) BLOCK CIPHER MODE</keyword>
</CyBOK>
</scenario>