mirror of
https://github.com/cliffe/BreakEscape.git
synced 2026-02-21 11:18:08 +00:00
Mission 3: Intelligence Gathering & Network Reconnaissance - ENTROPY Cell: Zero Day Syndicate - SecGen Scenario: Information Gathering: Scanning - New Mechanics: RFID keycard cloning, network reconnaissance - Difficulty: Intermediate (Mission 3 of Season 1) - Playtime: 60-75 minutes Key Features: - Undercover operation at WhiteHat Security Services (Zero Day front) - RFID cloning mechanics introduction - Network scanning integration (nmap, netcat, distcc exploitation) - Multi-encoding puzzle (ROT13, Hex, Base64) - Major revelation: Zero Day sold M2 hospital ransomware exploit - First direct mention of "The Architect" (campaign arc progression) - Double agent vs. arrest moral choice Campaign Connections: - Reveals cross-cell coordination (M2 hospital attack traced to Zero Day) - Sets up Zero Day as recurring antagonist - Introduces The Architect as mysterious coordinator - Client list connects M1 (Social Fabric), M2 (Ransomware Inc), M4 (Critical Mass) CyBOK Areas: - Network Security (port scanning, service enumeration, banner grabbing) - Systems Security (distcc exploitation CVE-2004-2687) - Applied Cryptography (multiple encoding types, pattern recognition) - Security Operations (intelligence correlation, systematic investigation) README includes: - Executive summary and mission overview - 9-stage development workflow (same as M1, M2) - Technical challenges breakdown (RFID, network recon, encoding) - Narrative arc (3 acts: undercover → infiltration → revelation) - Key NPCs (Victoria Sterling, James Park, Cipher references) - LORE opportunities (client lists, exploit catalog, Architect requirements) - Good practices from M1 & M2 - Critical decisions needed before Stage 0 - Risk assessment - Development timeline estimate (70-97 hours design) Status: Ready for Stage 0 initialization