Skip to content

Anorak001/The-ANORAK-Protocol-01

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

11 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

The ANORAK Protocol 01

A sophisticated cybersecurity capture-the-flag escape room designed for Cybersecurity skill development

GitHub Pages License: MIT HTML5 CSS3 JavaScript

🎯 Overview

The ANORAK Protocol 01 is an immersive, browser-based cybersecurity escape room that challenges players through five progressively difficult challenges spanning multiple cybersecurity domains. Each challenge tests different skill sets, from classical cryptography to digital forensics, providing a comprehensive learning experience for cybersecurity enthusiasts.

οΏ½ Challenge Domains

The protocol contains five meticulously crafted challenges, each targeting core cybersecurity competencies:

Challenge Name Domain Skills Tested
🎭 01 The Jester's Whisper Classical Cryptography Cipher analysis, pattern recognition
🌍 02 The Vanishing Landmark Intelligence Gathering OSINT, geolocation, research
πŸ“‘ 03 Echoes of the Signal Signal Decoding Morse code, communication protocols
οΏ½ 04 The Phantom's Vault Web Exploration Hidden page discovery, encoding analysis
πŸ“‚ 05 Shadows in the Archive Digital Forensics Source code analysis, meta-investigation

⚑ Key Features

πŸ”’ Enterprise-Grade Security

  • Cryptographic validation using SHA-256 hashing with challenge-specific salts
  • Multi-layer obfuscation preventing casual solution extraction
  • Dynamic code generation for enhanced security
  • Anti-debugging measures with console monitoring

🎨 Professional Design

  • Cyberpunk aesthetic with custom purple gradient themes
  • Responsive layout optimized for all device types
  • Smooth animations and interactive UI elements
  • Accessibility-first design principles

πŸ“š Educational Excellence

  • Progressive difficulty curve for optimal learning
  • Contextual hints available through interactive popups
  • Real-world scenarios reflecting actual cybersecurity challenges
  • Comprehensive skill coverage across multiple security domains

πŸ›‘οΈ Advanced Security Architecture

  • Hash-based answer validation (no plaintext solutions in source)
  • Obfuscated fragment management using hex encoding
  • Session management with authentication persistence
  • Method 4 cryptographic implementation (8-32 hours to crack completely)

πŸ—οΈ Technical Architecture

The ANORAK Protocol 01/
β”œβ”€β”€ πŸŽͺ Frontend Assets
β”‚   β”œβ”€β”€ index.html          # Authentication & login portal
β”‚   β”œβ”€β”€ challenges.html     # Main CTF challenge interface
β”‚   β”œβ”€β”€ admin.html         # Hidden challenge component
β”‚   └── styles.css         # Comprehensive styling system
β”œβ”€β”€ βš™οΈ Core Logic
β”‚   └── script.js          # Cryptographic validation engine
β”œβ”€β”€ πŸ—‚οΈ Site Configuration
β”‚   β”œβ”€β”€ sitemap.xml        # SEO and discovery optimization
β”‚   β”œβ”€β”€ robots.txt         # Web crawler directives
β”‚   β”œβ”€β”€ manifest.json      # PWA configuration
β”‚   └── .well-known/
β”‚       └── security.txt   # Security policy & contact info
└── πŸ“‹ Documentation
    β”œβ”€β”€ README.md          # This comprehensive guide
    └── LICENSE            # MIT open-source license

πŸš€ Getting Started

Quick Start

Simply visit our live deployment to begin the protocol immediately.

Local Development

# Clone the repository
git clone https://github.com/Anorak001/GAMMA-RAY.git
cd GAMMA-RAY

# Start local development server
python -m http.server 8000
# OR using Node.js
npx http-server

# Access at http://localhost:8000

System Requirements

  • Browser: Modern web browser with JavaScript enabled
  • Connectivity: Internet access for external resources
  • Skills: Basic cybersecurity knowledge recommended
  • Time: 45-90 minutes for complete solution

πŸŽ“ Learning Outcomes

Upon completion, participants will have demonstrated proficiency in:

  • Classical Cryptography: Understanding historical cipher systems and decryption techniques
  • Open Source Intelligence (OSINT): Leveraging public information for investigative purposes
  • Signal Processing: Decoding various communication protocols and formats
  • Web Security: Discovering hidden resources and analyzing web applications
  • Digital Forensics: Examining source code and metadata for investigative clues

πŸ… Difficulty & Time Estimates

Experience Level Estimated Completion Time Recommended Approach
Beginner 60-90 minutes Use hint system, external research
Intermediate 30-60 minutes Minimal hints, some external tools
Advanced 15-30 minutes No hints, integrated toolset
Expert 10-20 minutes Speed run, advanced techniques

πŸ”§ Technical Specifications

Frontend Technologies

  • HTML5 - Semantic structure with accessibility features
  • CSS3 - Advanced styling with gradients, animations, and responsive design
  • Vanilla JavaScript - ES6+ with modern cryptographic APIs

Security Implementation

  • SHA-256 cryptographic hashing for answer validation
  • Challenge-specific salt generation preventing rainbow table attacks
  • Multi-layer code obfuscation using hex encoding and dynamic generation
  • Method 4 validation system requiring 8-32 hours for complete cryptographic bypass

Performance Optimizations

  • Optimized asset loading with efficient CSS/JS delivery
  • Responsive image handling for various screen densities
  • Progressive enhancement ensuring functionality across browsers
  • Minimal external dependencies for fast loading and reliability

🌐 Browser Compatibility

Browser Version Status
Chrome 80+ βœ… Fully Supported
Firefox 75+ βœ… Fully Supported
Safari 13+ βœ… Fully Supported
Edge 80+ βœ… Fully Supported

πŸ“± Multi-Platform Support

  • πŸ“± Mobile Devices: iOS 13+, Android 8+
  • πŸ“± Tablets: iPad OS 13+, Android tablets
  • οΏ½ Desktop: Windows 10+, macOS 10.15+, Linux
  • πŸ–₯️ Large Displays: 4K and ultrawide monitor optimized

🀝 Contributing

We welcome contributions from the cybersecurity and developer communities:

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/protocol-enhancement)
  3. Commit your changes (git commit -m 'Add protocol enhancement')
  4. Push to the branch (git push origin feature/protocol-enhancement)
  5. Open a Pull Request

Contribution Guidelines

  • Maintain educational focus and accessibility
  • Follow existing code style and patterns
  • Test across multiple browsers and devices
  • Document new features comprehensively
  • Preserve cryptographic security measures

οΏ½ License & Legal

This project is released under the MIT License - see LICENSE for details.

πŸŽ–οΈ Credits & Acknowledgments

Protocol Designer: ANORAK
Classification: Educational cybersecurity training protocol
Inspiration: Real-world penetration testing and elite CTF competitions
Community: Built with feedback from cybersecurity professionals and educators
Version: Protocol 01 (Initial Release)

About

A sophisticated cybersecurity capture-the-flag (CTF) escape room designed to enhance and evaluate your cybersecurity skills.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors