Skip to content

CryptoKait

Home of the National Cyber League Player Ambassadors

  • CryptoKait
    • Home
    • About CryptoKait
    • Workshops and Public Appearances
    • Blog Posts by CryptoKait
    • Contact CryptoKait
  • Blog
  • Initiatives
    • Meet the NCL Player Ambassadors & Apply
    • CryptoKait’s Feature Friday
    • Apply to Be Featured on the CryptoKait.com Blog
    • Player Ambassador Diversity & Inclusion Advisory Board
  • National Cyber League
    • START HERE: NCL Coaching Guide for Everyone
    • Meet the NCL Player Ambassadors
    • NCL Blog
    • NCL Practice
    • Webinars and Live Shows
  • Personal Development
    • Adulting
    • Career Advice & Human Skills
    • Self Care
  • Cybersec Clubs
    • Cybersecurity Club Survival Guide
    • Blog Category: Cybersecurity Clubs
    • Collaboration Tips
  • Cybersec Bootcamps
    • Beginner Python with wolfshirtz

Category: NCL-Steganography

NCL and WSL: Leaving the Kali VM Behind

August 19, 2020January 9, 2021Leave a comment

Aaron James
Working in a virtual machine is a sub-optimal experience. What if we told you there's a way to run the Kali Linux terminal natively inside of Windows? Aaron James demonstrates how to install and compete using command-line tools on Windows Subsystem for Linux—no clunky VM required!

Hiding in Plain Sight: Steganography Tricks and Tips

March 2, 2020October 6, 2020Leave a comment

John "Mako" McGill
Who uses bitmap images anymore? Data smugglers, primarily! You're instantly suspicious that there's more to a file than meets the eye, but how can you uncover its secrets? Mako exposes the etymology, purpose, tricks, and tools of steganography and recommends additional means of practice.

PowerShell and Linux Command Line Resources We Love for the National Cyber League Games

October 1, 2019October 6, 2020Leave a comment

John "Mako" McGill
Discover what's lurking beneath the surface of your operating system! Back with more shark analogies, Mako discusses how we can use the built-in scripting engines in Linux and Windows—Bash and Powershell—to automate and simplify (almost) everything in the NCL, broken down by domain.

Follow Your Favorite NCL PA

  • Twitter
  • Twitter
  • Twitter
  • Twitter
  • Twitter
  • Twitter

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 1,648 other followers

Your Favorite Authors

  • Aaron James
    • Reverse Engineering: Fake It Until You Make It!
    • Taking Password Cracking to the Next Level
    • NCL and WSL: Leaving the Kali VM Behind
    • Fresh Kali…I mean Coffee
  • John McGill
    • CompTIA Security+ – One Certification to Rule Them All
    • Organizing Your Workspace
    • Cybersecurity Club Survival Guide: Lessons Learned from the First Year of a New Cybersecurity Club
    • Hiding in Plain Sight: Steganography Tricks and Tips
  • CryptoKait
    • Everything You Need to Know About the NCL Team Game
    • CryptoKait Blog Reaches 100k Views
    • An Open Letter About the NCL/CompTIA Partnership from the NCL Player Ambassadors
    • Diversity. Equity. Inclusion. CyberDEI
  • ZeroTrail
    • Everything You Need to Know About Preseason
  • PressSpace2Hack
    • How to Keep Your Accuracy and Score All the Points
    • Everything You Need to Know About the NCL From Someone Who Has Been Around as Long as Kait
    • What’s New in Cyber Skyline for Fall 2020
    • Writing Elegant Regular Expressions
  • Taisa
    • Announcement: Beginner Python Bootcamp with wolfshirtz
    • Everything You Need to Know About the National Cyber League Individual Game
  • Fred Stinchcombe
    • Everything You Need to Know About the NCL Gym (but Were Too Afraid to Ask Someone)
    • What I Learned from Teaching Cyber at an All Girls High School
    • Summer Camp 2020 – Metadata
    • The Pros and Cons of Different Cyber Competitions for High School Students
  • ghostinth3machine
    • Spotting Anomalies in Pcaps
  • Jacob Corley
    • A Day in the Life of a Cyber Engineer
    • How Creating CTFs Challenges Helps You Succeed in CTFs
    • How to Include the National Cyber League Games on Your Résumé
    • Finding a Team When You’re Playing Solo
  • Hush1e
    • What Are the NCL Power Rankings?
    • Effective Team Work That Includes All Player Levels
    • Forensics… Wait What?
    • Virtual Collaboration Methods and Tools
  • Jeana Byte
    • Everything You Need to Know on How to Run Your Preseason Recaps
    • Everything I Learned About Cryptography from Working and Living with CryptoKait
    • What’s the Deal with the National Cyber League?
    • The Unexpected Ups and Downs of a First Year Consultant
  • mistressven0m
    • How to Use NCL to Influence and Improve Your Résumé and Professional Appearance
    • Four Ways to Analyze Logs Like a Pro!
    • Online Password Cracking
    • How to Win a Fight Vs. Impostor Syndrome
  • WebWitch
    • What Do the NCL Brackets Mean?
    • Top Ten Reasons Why You *Shouldn’t* Play in the NCL Games
    • Why NCL is Great Even If You Aren’t in Cyber
    • Let’s Have A Serious Talk About Overworking Yourself
  • wolfshirtz
    • Ghidra: The NSA Reverse Engineering Tool That Will Help You Crush Enumeration and Exploitation
    • Collaborative Python Scripting for the Team Games
    • Containerizing Your CTF Stack: Using Docker for CTFs and NCL
    • Breaking Boards: Hacking Hardware
Website Powered by WordPress.com.