Browse Source

updated attacks level text

cecylia 8 years ago
parent
commit
b803de58c3
1 changed files with 2 additions and 0 deletions
  1. 2 0
      levels/04 Attacks/attacks01.html

+ 2 - 0
levels/04 Attacks/attacks01.html

@@ -4,6 +4,8 @@
 <p>In this level, you can see an example of Bob sending Alice an <strong>encryption key</strong> in order to protect 
 their messages.  However, their simple protocol is vulnerable to a <strong>man-in-the-middle</strong> attack.
 
+<p>Eve has control over a router between Alice and Bob. She can see all messages that pass through this router and she can spoof messages from either Alice or Bob.</p>
+
 <p>To beat this level, you need to trick Alice into encrypting her messages using a key Eve knows: <strong>31337</strong>.  
 You must also trick Bob into thinking he is having a conversation with Alice as normal!  See if you can figure out how 
 to trick them both without them discovering your presence between them.