|
|
@@ -4,6 +4,8 @@
|
|
|
<p>In this level, you can see an example of Bob sending Alice an <strong>encryption key</strong> in order to protect
|
|
|
their messages. However, their simple protocol is vulnerable to a <strong>man-in-the-middle</strong> attack.
|
|
|
|
|
|
+<p>Eve has control over a router between Alice and Bob. She can see all messages that pass through this router and she can spoof messages from either Alice or Bob.</p>
|
|
|
+
|
|
|
<p>To beat this level, you need to trick Alice into encrypting her messages using a key Eve knows: <strong>31337</strong>.
|
|
|
You must also trick Bob into thinking he is having a conversation with Alice as normal! See if you can figure out how
|
|
|
to trick them both without them discovering your presence between them.
|