1
0
Fork 0

Merge pull request #1 from SleepyLili/2022-edits

2022 edits
This commit is contained in:
Lili Pavelů 2022-04-29 15:50:22 +02:00 committed by GitHub
commit 5c6d047452
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 54 additions and 40 deletions

View File

@ -302,6 +302,7 @@ def game_loop():
print("Basic commands are:")
print("(S)tart, (N)ext, (H)elp, (C)heck, (E)xit")
while True:
try:
print("Waiting for your input:")
command = input()
command = command.lower()
@ -345,6 +346,19 @@ def game_loop():
give_hint(game, hint_giver)
else:
print("Unknown command. Enter another command or try (H)elp.")
except EOFError:
print("Unknown command. Enter another command or try (H)elp.")
print("If you want to exit the assistant, please use the `exit` command.")
except KeyboardInterrupt:
print("You sent a keyboard interrupt to the program.")
print("Would you like to exit?")
print("This will NOT save your log or end the game. yes/no")
confirmation = input()
confirmation = confirmation.lower()
if confirmation in ("y", "yes"):
return
else:
print("Not exiting. Continuing normal operation.")
if __name__ == "__main__":

View File

@ -31,7 +31,7 @@ level4:
"Password cracking": "The password appears to be encrypted with a simple MD5 hash. A tool like John the Ripper, which is already installed on the computer, could be used to crack the password."
"Command line options": 'The arguments you will need to crack the password are "--format=" and "--wordlist="'
"Database interaction": "Use the [SQL] button in the web shell to interact with log into local databases and interact with them using SQL queries."
"Solution": "Place to hash in to_crack.txt. Run `john --format=raw-md5 --wordlist=passwords.txt to_crack.txt` to get the password."
"Solution": "Place the hash in to_crack.txt. Run `john --format=raw-md5 --wordlist=passwords.txt to_crack.txt` to get the password."
level5:
level5:
"Database interaction": "You can communicate with local databases using SQL queries."