diff --git a/lib/schemas/encoder_metadata_schema.xsd b/lib/schemas/encoder_metadata_schema.xsd
index a5618b206..41e5dafa0 100644
--- a/lib/schemas/encoder_metadata_schema.xsd
+++ b/lib/schemas/encoder_metadata_schema.xsd
@@ -35,6 +35,7 @@
+
diff --git a/lib/schemas/generator_metadata_schema.xsd b/lib/schemas/generator_metadata_schema.xsd
index 6af6b86c7..3a5adcedb 100644
--- a/lib/schemas/generator_metadata_schema.xsd
+++ b/lib/schemas/generator_metadata_schema.xsd
@@ -35,6 +35,7 @@
+
diff --git a/modules/encoders/cipher/ascii_value_shift/secgen_metadata.xml b/modules/encoders/cipher/ascii_value_shift/secgen_metadata.xml
index f6071a6fd..411864c24 100644
--- a/modules/encoders/cipher/ascii_value_shift/secgen_metadata.xml
+++ b/modules/encoders/cipher/ascii_value_shift/secgen_metadata.xml
@@ -17,6 +17,10 @@
linuxwindows
+ Encoded with a rotation cipher based on the ASCII value. Uses the 94 printable ascii characters.
+ Decoding tools are available online e.g. http://www.dcode.fr/rot-cipher
+
+
strings_to_encodeshift_key
diff --git a/modules/encoders/cipher/caesar_shift/secgen_metadata.xml b/modules/encoders/cipher/caesar_shift/secgen_metadata.xml
index eb2ce019e..aeee0c8d4 100644
--- a/modules/encoders/cipher/caesar_shift/secgen_metadata.xml
+++ b/modules/encoders/cipher/caesar_shift/secgen_metadata.xml
@@ -16,6 +16,10 @@
linuxwindows
+ Encoded with a rotation/shift cipher using a random key. Watch: https://www.youtube.com/watch?v=o6TPx1Co_wg
+ Decoding tools are available online e.g. http://www.dcode.fr/rot-cipher
+
+
strings_to_encodeshift_key
diff --git a/modules/encoders/cipher/morse_code/secgen_metadata.xml b/modules/encoders/cipher/morse_code/secgen_metadata.xml
index 171805f2d..9d1b38646 100644
--- a/modules/encoders/cipher/morse_code/secgen_metadata.xml
+++ b/modules/encoders/cipher/morse_code/secgen_metadata.xml
@@ -16,6 +16,10 @@
https://gist.github.com/mikedamage/105081
+ Morse code decoders are available online e.g. https://morsecode.scphillips.com/translator.html
+ Morse code has a single representation for parenthesis, the SecGen flag format uses curly braces. Replace them!
+
+
strings_to_encode
diff --git a/modules/encoders/cipher/vignere/secgen_metadata.xml b/modules/encoders/cipher/vignere/secgen_metadata.xml
index 3435cecc8..bb1eae67e 100644
--- a/modules/encoders/cipher/vignere/secgen_metadata.xml
+++ b/modules/encoders/cipher/vignere/secgen_metadata.xml
@@ -23,6 +23,10 @@
http://www.cs.mtu.edu/~shene/NSF-4/Tutorial/VIG/Vig-Base.htmlhttp://rosettacode.org/wiki/Vigen%C3%A8re_cipher#Ruby
+ Learn about Vigenere ciphers here: https://www.youtube.com/watch?v=zNO4PTlg62k
+ Decoding tools are available online e.g. http://www.dcode.fr/vigenere-cipher
+
+
strings_to_encodeencryption_key
diff --git a/modules/generators/challenges/bitwise_xor/secgen_metadata.xml b/modules/generators/challenges/bitwise_xor/secgen_metadata.xml
index ae07d5bb7..0d792ee27 100644
--- a/modules/generators/challenges/bitwise_xor/secgen_metadata.xml
+++ b/modules/generators/challenges/bitwise_xor/secgen_metadata.xml
@@ -17,7 +17,7 @@
linuxwindows
-
+ Take both binary strings and perform a bitwise XOR on them. - https://www.youtube.com/watch?v=YtghBxoBxpAstring_to_mask
diff --git a/modules/generators/challenges/encoded_diff/secgen_metadata.xml b/modules/generators/challenges/encoded_diff/secgen_metadata.xml
index 3ac100d28..784362b40 100644
--- a/modules/generators/challenges/encoded_diff/secgen_metadata.xml
+++ b/modules/generators/challenges/encoded_diff/secgen_metadata.xml
@@ -1,7 +1,7 @@
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xsi:schemaLocation="http://www.github/cliffe/SecGen/generator">
Encoded Diff ChallengeThomas ShawMIT
@@ -14,6 +14,8 @@
linux
+ Sort the sets of strings, check if there are any differences in content and decode the hex.
+
random_datastrings_to_leak
diff --git a/modules/generators/challenges/exif/secgen_metadata.xml b/modules/generators/challenges/exif/secgen_metadata.xml
index 82ccde09a..25a9c7fef 100644
--- a/modules/generators/challenges/exif/secgen_metadata.xml
+++ b/modules/generators/challenges/exif/secgen_metadata.xml
@@ -3,10 +3,10 @@
- Exif
+ Image ith Modified EXIF MetadataThomas ShawMIT
- TODO
+ Modifies an image's EXIF metadata to leak a string.modified_exifimage_generator
@@ -15,6 +15,10 @@
linuxwindows
+ Use a tool to extract the metadata e.g. exiftool (http://www.sno.phy.queensu.ca/~phil/exiftool/) or
+ http://exifdata.com/
+
+
base64_imagestrings_to_leakexif_field
diff --git a/modules/generators/challenges/hidden_data_in_image_file/secgen_metadata.xml b/modules/generators/challenges/hidden_data_in_image_file/secgen_metadata.xml
index 9683c2434..b8c3597e0 100644
--- a/modules/generators/challenges/hidden_data_in_image_file/secgen_metadata.xml
+++ b/modules/generators/challenges/hidden_data_in_image_file/secgen_metadata.xml
@@ -3,7 +3,7 @@
- Hidden Data in Image File Challenge
+ Hidden Data in Image FileThomas ShawMITMakes use of a random image, encodes a string_to_leak (flag) then inserts the data to decode into the end
@@ -17,7 +17,7 @@
linuxwindows
-
+ Inspect the file's raw hex. Look at end for something to decode. Example tools: hexedit/hexeditorbase64_imagestrings_to_leak
diff --git a/modules/generators/image/qr_code/secgen_metadata.xml b/modules/generators/image/qr_code/secgen_metadata.xml
index c6b550cf7..d93ed845d 100644
--- a/modules/generators/image/qr_code/secgen_metadata.xml
+++ b/modules/generators/image/qr_code/secgen_metadata.xml
@@ -15,12 +15,15 @@
linuxwindows
+ https://github.com/whomwah/rqrcode
+
+ Use a QR reader mobile app or online decoder e.g. http://blog.qr4.nl/Online-QR-Code_decoder.aspx
+
strings_to_leak
-
base64_encoded_image
diff --git a/scenarios/examples/parameterised_examples/generator_examples/exif_metadata.xml b/scenarios/examples/parameterised_examples/generator_examples/exif_metadata.xml
new file mode 100644
index 000000000..9c41ed7f3
--- /dev/null
+++ b/scenarios/examples/parameterised_examples/generator_examples/exif_metadata.xml
@@ -0,0 +1,21 @@
+
+
+
+
+
+ example_server
+
+
+
+
+
+
+
+
+
+
+
+
+