We now introduce the console, so that you can execute yourself the different commands of the attackers!
Let us start with four simple network control commands:
For instance, let us consider the following protocol:
Knowledge: A:[s, hello], B:[K], E:[fake]
Steps:
Can you figure out a way for E to know the session secret? Can you figure out a way for B to know "fake"?
The next exercise considers a simple server key protocol.