cecylia 8 лет назад
Родитель
Сommit
b803de58c3
1 измененных файлов с 2 добавлено и 0 удалено
  1. 2 0
      levels/04 Attacks/attacks01.html

+ 2 - 0
levels/04 Attacks/attacks01.html

@@ -4,6 +4,8 @@
 <p>In this level, you can see an example of Bob sending Alice an <strong>encryption key</strong> in order to protect 
 <p>In this level, you can see an example of Bob sending Alice an <strong>encryption key</strong> in order to protect 
 their messages.  However, their simple protocol is vulnerable to a <strong>man-in-the-middle</strong> attack.
 their messages.  However, their simple protocol is vulnerable to a <strong>man-in-the-middle</strong> attack.
 
 
+<p>Eve has control over a router between Alice and Bob. She can see all messages that pass through this router and she can spoof messages from either Alice or Bob.</p>
+
 <p>To beat this level, you need to trick Alice into encrypting her messages using a key Eve knows: <strong>31337</strong>.  
 <p>To beat this level, you need to trick Alice into encrypting her messages using a key Eve knows: <strong>31337</strong>.  
 You must also trick Bob into thinking he is having a conversation with Alice as normal!  See if you can figure out how 
 You must also trick Bob into thinking he is having a conversation with Alice as normal!  See if you can figure out how 
 to trick them both without them discovering your presence between them.
 to trick them both without them discovering your presence between them.