Fred Stinchcombe
Would you pass up an opportunity to eat pizza with your friends and argue over the right way to solve a cryptography challenge? Fred reveals time-honored techniques for breaking down the barriers to fun and learning by osmosis.
Everything You Need to Know About the National Cyber League Preseason Game
JeanaByte
The first rule of Preseason is that it's MANDATORY, meaning you must attempt at least one question. What's the second rule of Preseason? Hint: It applies to the Individual Game as well! JeanaByte will tell you more.
What’s the National Cyber League Gym and How Do I Use It?
JeanaByte
First things first: Welcome to NCL! It's time to pull on your cyber gi and prepare to enter NCL's dojo—the Gymnasium. JeanaByte-sensei will walk you through navigating the Cyber Skyline platform and show you how to train for the upcoming Games!
Turning that Code Inside Out: A Look at Reverse Engineering 
WebWitch
The following challenge may or may not resemble challenges seen before in NCL! WebWitch's cauldron is filled with mysterious code, but one thing is missing. What is the secret input ingredient? You'll have to work backwards to find it!
Advanced Tips on Web Application Hacking
Paul Buonopane
Are you experiencing a sort of cognitive dissonance where Hard challenges are becoming easier, and Easy challenges are becoming harder? Are attacks not working as expected? Considering giving up? Read this article by Paul Buonopane first.
Breaking Web Applications for Beginners
Paul Buonopane
Paul Buonopane and Hitchhiker's Guide to the Galaxy author Douglas Adams offer a brief history lesson explaining the existence of the NCL Web Application Exploitation domain before walking you through an exquisite attack plan. Thanks for all the phish, and mind the red herrings!
Why I Became a Player Ambassador – Hush
Hush1e
Hush1e grew up playing with a TRS-80 in the '80s, and her idea of a Sweet 16 involved finding backdoors into BBSes. So what did she naturally go to college for? Not what you'd expect! How did she find her way back to cybersecurity and the NCL?
Cybersecurity Club Survival Guide: Lessons Learned from the First Year of a New Cybersecurity Club
John "Mako" McGill
(Fifth in a five-part series.)
We are all strangers, until we aren't. As a cybersecurity club president, Mako learned many lessons in leadership along the way—some of them too late. But the philosophers don't have to be right; history doesn't have to repeat itself. Mako's roadmap to success includes which tempting wrong turns to avoid!
A Beginner’s Guide to Scanning with DirBuster for the NCL Games
JeanaByte
Staring uncertainly at a challenge called "Hidden Treasure"? Staring uncertainly at the DirBuster GUI? Wondering how legal this can possibly be? JeanaByte shows you how to brute force websites, find hidden directories, and stay out of jail in the process!
Hiding in Plain Sight: Steganography Tricks and Tips
John "Mako" McGill
Who uses bitmap images anymore? Data smugglers, primarily! You're instantly suspicious that there's more to a file than meets the eye, but how can you uncover its secrets? Mako exposes the etymology, purpose, tricks, and tools of steganography and recommends additional means of practice.
You must be logged in to post a comment.