Here's a fun story I like to tell to people about one of the more intimidating challenge categories in the National Cyber League (NCL) Games: Reverse Engineering and Binary Exploitation. I've had plenty of people tell me that so-and-so topic (usually Web App Exploitation or Binary Exploitation) in the NCL Games is too challenging or … Continue reading Reverse Engineering: Fake it until you make it!
Working in a virtual machine is a sub-optimal experience. What if we told you there's a way to run the Kali Linux terminal natively inside of Windows? Aaron James demonstrates how to install and compete using command-line tools on Windows Subsystem for Linux—no clunky VM required!
The following challenge may or may not resemble challenges seen before in NCL! WebWitch's cauldron is filled with mysterious code, but one thing is missing. What is the secret
input ingredient? You'll have to work backwards to find it!
John "Mako" McGill
Discover what's lurking beneath the surface of your operating system! Back with more shark analogies, Mako discusses how we can use the built-in scripting engines in Linux and Windows—Bash and Powershell—to automate and simplify (almost) everything in the NCL, broken down by domain.
This was the behind-the-scenes, CTF101 workshop that CryptoKait had been looking forward to all week! Her friend and fellow attendee, Lizzie Molloy, took these notes on how to approach CTF challenges, with a focus on cryptography, networks, web apps, and binaries, but the underlying problem-solving strategies are universal.