We now introduce the console, so that you can execute yourself the different commands of the attackers!
Let us start with four simple network control commands:
For instance, let us consider the simple protocol used when introducing the network:
Knowledge: A:[secret], B:[], E:[fake]
Steps:
Try typing in the Commands console below the different commands explained above, each command separated by a ";". For instance, executing "new_session();transmit(0);" should result in B knowing secret.
Similarly, executing "new_session();intercept(0);block(0);inject(A->B:fake);transmit(1);" should result in E knowing secret and B knowing fake.
The next exercise introduce the commands relative to encryption and decryption.