A sophisticated cybersecurity capture-the-flag escape room designed for Cybersecurity skill development
The ANORAK Protocol 01 is an immersive, browser-based cybersecurity escape room that challenges players through five progressively difficult challenges spanning multiple cybersecurity domains. Each challenge tests different skill sets, from classical cryptography to digital forensics, providing a comprehensive learning experience for cybersecurity enthusiasts.
The protocol contains five meticulously crafted challenges, each targeting core cybersecurity competencies:
| Challenge | Name | Domain | Skills Tested |
|---|---|---|---|
| π 01 | The Jester's Whisper | Classical Cryptography | Cipher analysis, pattern recognition |
| π 02 | The Vanishing Landmark | Intelligence Gathering | OSINT, geolocation, research |
| π‘ 03 | Echoes of the Signal | Signal Decoding | Morse code, communication protocols |
| οΏ½ 04 | The Phantom's Vault | Web Exploration | Hidden page discovery, encoding analysis |
| π 05 | Shadows in the Archive | Digital Forensics | Source code analysis, meta-investigation |
- Cryptographic validation using SHA-256 hashing with challenge-specific salts
- Multi-layer obfuscation preventing casual solution extraction
- Dynamic code generation for enhanced security
- Anti-debugging measures with console monitoring
- Cyberpunk aesthetic with custom purple gradient themes
- Responsive layout optimized for all device types
- Smooth animations and interactive UI elements
- Accessibility-first design principles
- Progressive difficulty curve for optimal learning
- Contextual hints available through interactive popups
- Real-world scenarios reflecting actual cybersecurity challenges
- Comprehensive skill coverage across multiple security domains
- Hash-based answer validation (no plaintext solutions in source)
- Obfuscated fragment management using hex encoding
- Session management with authentication persistence
- Method 4 cryptographic implementation (8-32 hours to crack completely)
The ANORAK Protocol 01/
βββ πͺ Frontend Assets
β βββ index.html # Authentication & login portal
β βββ challenges.html # Main CTF challenge interface
β βββ admin.html # Hidden challenge component
β βββ styles.css # Comprehensive styling system
βββ βοΈ Core Logic
β βββ script.js # Cryptographic validation engine
βββ ποΈ Site Configuration
β βββ sitemap.xml # SEO and discovery optimization
β βββ robots.txt # Web crawler directives
β βββ manifest.json # PWA configuration
β βββ .well-known/
β βββ security.txt # Security policy & contact info
βββ π Documentation
βββ README.md # This comprehensive guide
βββ LICENSE # MIT open-source license
Simply visit our live deployment to begin the protocol immediately.
# Clone the repository
git clone https://github.com/Anorak001/GAMMA-RAY.git
cd GAMMA-RAY
# Start local development server
python -m http.server 8000
# OR using Node.js
npx http-server
# Access at http://localhost:8000- Browser: Modern web browser with JavaScript enabled
- Connectivity: Internet access for external resources
- Skills: Basic cybersecurity knowledge recommended
- Time: 45-90 minutes for complete solution
Upon completion, participants will have demonstrated proficiency in:
- Classical Cryptography: Understanding historical cipher systems and decryption techniques
- Open Source Intelligence (OSINT): Leveraging public information for investigative purposes
- Signal Processing: Decoding various communication protocols and formats
- Web Security: Discovering hidden resources and analyzing web applications
- Digital Forensics: Examining source code and metadata for investigative clues
| Experience Level | Estimated Completion Time | Recommended Approach |
|---|---|---|
| Beginner | 60-90 minutes | Use hint system, external research |
| Intermediate | 30-60 minutes | Minimal hints, some external tools |
| Advanced | 15-30 minutes | No hints, integrated toolset |
| Expert | 10-20 minutes | Speed run, advanced techniques |
- HTML5 - Semantic structure with accessibility features
- CSS3 - Advanced styling with gradients, animations, and responsive design
- Vanilla JavaScript - ES6+ with modern cryptographic APIs
- SHA-256 cryptographic hashing for answer validation
- Challenge-specific salt generation preventing rainbow table attacks
- Multi-layer code obfuscation using hex encoding and dynamic generation
- Method 4 validation system requiring 8-32 hours for complete cryptographic bypass
- Optimized asset loading with efficient CSS/JS delivery
- Responsive image handling for various screen densities
- Progressive enhancement ensuring functionality across browsers
- Minimal external dependencies for fast loading and reliability
| Browser | Version | Status |
|---|---|---|
| Chrome | 80+ | β Fully Supported |
| Firefox | 75+ | β Fully Supported |
| Safari | 13+ | β Fully Supported |
| Edge | 80+ | β Fully Supported |
- π± Mobile Devices: iOS 13+, Android 8+
- π± Tablets: iPad OS 13+, Android tablets
- οΏ½ Desktop: Windows 10+, macOS 10.15+, Linux
- π₯οΈ Large Displays: 4K and ultrawide monitor optimized
We welcome contributions from the cybersecurity and developer communities:
- Fork the repository
- Create a feature branch (
git checkout -b feature/protocol-enhancement) - Commit your changes (
git commit -m 'Add protocol enhancement') - Push to the branch (
git push origin feature/protocol-enhancement) - Open a Pull Request
- Maintain educational focus and accessibility
- Follow existing code style and patterns
- Test across multiple browsers and devices
- Document new features comprehensively
- Preserve cryptographic security measures
This project is released under the MIT License - see LICENSE for details.
Protocol Designer: ANORAK
Classification: Educational cybersecurity training protocol
Inspiration: Real-world penetration testing and elite CTF competitions
Community: Built with feedback from cybersecurity professionals and educators
Version: Protocol 01 (Initial Release)