attacks01.html 1.1 KB

123456789101112131415161718192021
  1. <link rel="stylesheet" href="../../includes/css/base.css" />
  2. <link rel="stylesheet" href="../../includes/css/style.css" />
  3. <h1>Attacks Level 1</h1>
  4. <p>In this level, you can see an example of Bob sending Alice an <strong>encryption key</strong> in order to protect
  5. their messages. However, their simple protocol is vulnerable to a <strong>man-in-the-middle</strong> attack.
  6. <p>To beat this level, you need to trick Alice into encrypting her messages using a key Eve knows: <strong>31337</strong>.
  7. You must also trick Bob into thinking he is having a conversation with Alice as normal! See if you can figure out how
  8. to trick them both without them discovering your presence between them.
  9. <p><em><strong>Hint:</strong> there is an example of how the encryption protocol works at the top of the field. Use the
  10. <span class="button">pause</span> button to see what the values of the packet headers are in the protocol.</em>
  11. <h3>Level Objectives</h3>
  12. <ul>
  13. <li>trick Alice into encrypting her message with Eve's key: 31337</li>
  14. <li>make sure Bob can still read the message, by encrypting it with his key</li>
  15. </ul>