{
"unique_id": 1000, # Unique identifier for this target (not an email)
"risk": "medium", # Risk level (low, medium, high, very high)
"security_level": 2, # Security level affects difficulty of exploits
"difficulty": 0.6, # Float from 0 to 1, used to calculate exploit chance
"loot": 50, # CryptoCoin reward for a successful hack
"base_xp": 30, # Base XP gained from a successful hack
"personal_info": {
"full_name": "John Doe",
"email": "[email protected]", # The primary email linked to this target
"address": "123 Elm St, Springfield, USA", # May be revealed later
"phone": "555-1234", # Phone number, revealed after email breach
"visible": ["email"] # Keys that are initially visible
},
"devices": [ # Devices that are associated with this person (mobile, laptop, etc.)
{
"name": "iPhone 13",
"os": "iOS 16",
"ip_address": "192.168.1.45", # Not initially visible
"mac_address": "00:1A:2B:3C:4D:5E", # Revealed via network hacking
"user_agent": "Mozilla/5.0 (iPhone; CPU iPhone OS 16_0 like Mac OS X)",
"browser": "Safari", # Browser used on the device
"wifi_ssid": "Johns_WiFi", # Wi-Fi network connected to the device
"wifi_password": "password12345", # Discovered later through breaches
"visible": ["name", "os"] # What info is initially visible about the device
},
{
"name": "Windows Laptop",
"os": "Windows 11",
"ip_address": "10.0.0.32", # Local IP, discoverable via breach
"mac_address": "12:34:56:78:9A:BC",
"user_agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64)",
"browser": "Chrome",
"wifi_ssid": "Johns_WiFi",
"wifi_password": "password12345",
"visible": ["name", "os"]
}
],
"network_info": { # The network the target is connected to
"wifi_ssid": "Johns_WiFi",
"wifi_password": "password12345",
"connected_devices": ["iPhone 13", "Windows Laptop"], # Connected devices
"router_ip": "192.168.1.1",
"router_mac": "F0:DE:F1:23:45:67",
"visible": [] # No initial visibility for network info
},
"accounts": { # Online accounts the target has. Can be phished or breached.
"paypal": {
"email": "[email protected]", # Email associated with the account
"username": "johnnyd", # Username for logging in
"password": "hunter2", # Password used for logging in
"visible": ["email", "username"] # Visible info after successful phishing
},
"amazon": {
"email": "[email protected]",
"username": "john123",
"password": "password123",
"visible": ["email", "username"]
}
},
"discovered": [], # List of revealed keys via successful exploits
"visible": ["unique_id", "risk", "personal_info.email"] # Initially visible keys when target is first viewed
}