Jacob "gond0r" Corley
Along his ascent through his school's cybersecurity club and through the NCL rankings, Jacob "gond0r" Corley discovered a passion for open-source cyber instruction which culminated in an impressive college capstone project!
Cybersecurity Club Survival Guide: How to Organize Events and Meetings, Invite Speakers, and Attract Sponsors
John "Mako" McGill
(Fourth in a five-part series.)
For every minute of a large event, there are about 30 minutes that go into planning it. Mako and CryptoKait share their master tips and tricks for maximizing time, money, and that incredible feeling of shared satisfaction enjoyed by organizers, sponsors, and attendees alike. Pro Tip: The right mindset makes all the difference!
Beginner Tips and Tricks for NCL Wireless Access Exploitation (Now Part of Network Traffic Analysis)
MistressVenom
You've installed your Kali VM and have a packet capture from NCL. Wireshark revealed the network ESSID and victim and attacker MAC addresses, but where is that wireless password? MistressVenom shows you how to run aircrack-ng—in style.
Password Cracking with Hashcat
Paul Buonopane
Humans are bad at passwords. It's true. We're terrible at making them, we're terrible at remembering them, and we're terrible at assessing their quality. It's difficult to emphasize just how terrible we are without demonstrating just how easy they are to break—so that's exactly what Paul Buonopane is going to do.
Why I Became an NCL Player Ambassador – John’s Story
John "Mako" McGill
In the military, Mako couldn't get the cyber job he wanted. His first cyber competition left him feeling humiliated, too. What matters, though, isn't how many times you get knocked down—it's how many times you get back up. Read to discover how our resident shark, Mako, swam his way to the top!
Cybersecurity Club Survival Guide: Leadership Methodologies for Running an Effective Cybersecurity Club
John "Mako" McGill
(Third in a five-part series.)
Student leadership will come and go. Faculty leadership can see the big picture but cannot push student volunteers to do anything they don't want to do. Before pairing a faculty sponsor with a club, decide on a leadership style you'd like to foster together, to ensure longterm club survival. Mako shows you how.
Secret Information in Network Traffic Logs: NTA for NCL
Paul Buonopane
Improving your Network Traffic Analysis techniques can mean the difference between spending hours on a challenge and solving it in 5 minutes. Paul Buonopane demonstrates how to filter large packet captures in Wireshark and reassemble fragmented files from packet data.
Sharpening the Axe: How to Cut and Carve Logs in the NCL
John "Mako" McGill
Parsing log files is an art form, not unlike sculpting—"cut away all the parts of the wood block that are not the bear." In place of an axe and knife, Mako shows us how to whittle the bear from the log using grep, regex, awk, sed, uniq, sort, and pipe!
Why I Became an NCL Player Ambassador – WebWitch
WebWitch
WebWitch doesn't like being in front of an audience and doesn't know everything about cybersecurity. Those aren't the reasons they became a Player Ambassador. Luckily for us, their reasons were far more compelling than their fears!
Cybersecurity Club Survival Guide: How to Create a Statement of Purpose and Draft a Charter for a New Cybersecurity Club
John "Mako" McGill
(Second in a five-part series.)
The difference between a hangout and a club is purpose. To gain official recognition as a club, you'll need to clarify that purpose in a charter. Mako likens it to an "elevator pitch" for the group and shares tips and examples of what to include.
You must be logged in to post a comment.