Browse Source

Use Mallory instead of Eve, name MITM attack after Mallory

Vecna 1 year ago
parent
commit
a58c10fe14
2 changed files with 7 additions and 7 deletions
  1. 4 4
      levels/04 Attacks/attacks01.html
  2. 3 3
      levels/04 Attacks/attacks01.json

+ 4 - 4
levels/04 Attacks/attacks01.html

@@ -1,10 +1,10 @@
 
 
 <p>In this level, you can see an example of Bob sending Alice an <strong>encryption key</strong> in order to protect 
 <p>In this level, you can see an example of Bob sending Alice an <strong>encryption key</strong> in order to protect 
-their messages.  However, their simple protocol is vulnerable to a <strong>man-in-the-middle</strong> attack.
+their messages.  However, their simple protocol is vulnerable to a <strong>Mallory-in-the-middle</strong> attack.
 
 
-<p>Eve has control over a router between Alice and Bob. She can see all messages that pass through this router and she can spoof messages from either Alice or Bob.</p>
+<p>Mallory has control over a router between Alice and Bob. She can see all messages that pass through this router and she can spoof messages from either Alice or Bob.</p>
 
 
-<p>To beat this level, you need to trick Alice into encrypting her messages using a key Eve knows: <strong>31337</strong>.  
+<p>To beat this level, you need to trick Alice into encrypting her messages using a key Mallory knows: <strong>31337</strong>.  
 You must also trick Bob into thinking he is having a conversation with Alice as normal!  See if you can figure out how 
 You must also trick Bob into thinking he is having a conversation with Alice as normal!  See if you can figure out how 
 to trick them both without them discovering your presence between them.
 to trick them both without them discovering your presence between them.
 
 
@@ -14,6 +14,6 @@ to trick them both without them discovering your presence between them.
 <h3>Level Objectives</h3>
 <h3>Level Objectives</h3>
 
 
 <ul>
 <ul>
-	<li>trick Alice into encrypting her message with Eve's key: 31337</li>
+	<li>trick Alice into encrypting her message with Mallory's key: 31337</li>
 	<li>make sure Bob can still read the message, by encrypting it with his key</li>
 	<li>make sure Bob can still read the message, by encrypting it with his key</li>
 </ul>
 </ul>

+ 3 - 3
levels/04 Attacks/attacks01.json

@@ -36,7 +36,7 @@
 			player:false
 			player:false
 		},
 		},
 		{
 		{
-			id:"Eve",
+			id:"Mallory",
                         image: "macbook",
                         image: "macbook",
 			ports:1,
 			ports:1,
 			x:0.5,
 			x:0.5,
@@ -63,7 +63,7 @@
 		},
 		},
 		{
 		{
 			src:"Router", srcport:0,
 			src:"Router", srcport:0,
-			dst:"Eve", dstport:0
+			dst:"Mallory", dstport:0
 		},
 		},
 		{
 		{
 			src:"Example Alice", srcport:0,
 			src:"Example Alice", srcport:0,
@@ -95,7 +95,7 @@
 	triggers:[
 	triggers:[
 		{
 		{
 			type:"packet",
 			type:"packet",
-			device:"Eve",
+			device:"Mallory",
 			payload:{
 			payload:{
 				network:{srcip:"Alice",dstip:"Bob"},
 				network:{srcip:"Alice",dstip:"Bob"},
 				transport:{proto:"encryption"},
 				transport:{proto:"encryption"},