When you try to Google “NCL” (the acronym for the National Cyber League), you are going to end up finding some really good info on a Norwegian Cruise Line which can also be abbreviated to NCL. That being said, the National Cyber League (and the only NCL I will be referring to for the rest … Continue reading What is the National Cyber League and Why is it Better than a Norwegian Cruise?
Have you ever attended a career fair? Have you ever wondered how much it cost, or how many people were involved in setting it up? How many phone calls, meetings, and approvals had to take place? When you see free stickers, t-shirts, bags of goodies and pens, did you wonder where all that came from … Continue reading Cybersecurity Club Survival Guide: How to Organize Events and Meetings, Invite Speakers, and Attract Sponsors
Readme.md Before we get into the tips and tricks that you have been promised, there are a few bases that should be covered first, to ensure you are able to get the most out of these wonderful tips and tricks. First, if you have not yet had the chance, read Jeana’s first blog on wireless … Continue reading Beginner Tips and Tricks for NCL Wireless Access Exploitation
Humans are bad at passwords. It's true. We're terrible at making them, we're terrible at remembering them, and we're terrible at assessing their quality. It's difficult to emphasize just how terrible we are without demonstrating just how easy they are to break—so that's exactly what we're going to do.
I didn’t start out as an expert. I guess no one really does. I had a limited run as a software developer and test engineer, and then I joined the military. There, I had some exposure to Information Assurance (IA), and I fell in love with it. I studied and got my CompTIA Security+. Later, … Continue reading Why I Became an NCL Player Ambassador – John's Story
Our application was rejected, again. They said we must have a faculty sponsor. Why do we need faculty involved in a student club? Where are we going to find a sponsor? Students come and go. Some drop out, some wander off, some just get too busy or behind in their studies. New students arrive with … Continue reading Cybersecurity Club Survival Guide: Leadership Methodologies for Running an Effective Cybersecurity Club
Network traffic analysis can be overwhelming. Even with a solid foundation, it's not unusual for a packet capture to contain so much data that it's difficult to get a sense for what's going on. Improving your analysis techniques can mean the difference between wasting hours on a challenge and solving it in five minutes. Prerequisites … Continue reading Secret Information in Network Traffic Logs: NTA for NCL
"Sculpture, per se, is the simplest thing in the world. All you have to do is to take a big chunk of marble and a hammer and chisel, make up your mind what you are about to create and chip off all the marble you don’t want.”Paris Gaulois I love this sarcastic oversimplification. It reminds us … Continue reading Sharpening the Axe: How to Cut and Carve Logs in the NCL