By 0x600DF00D
New NCL Coaches: Read for a gentle introduction.
Seasoned Coaches: Read for a new take on how to help your students succeed.
0x600DF00D breaks down how to coach, what to coach, and ways to incorporate NCL into the classroom, all while honoring the Rules of Conduct.
Category: NCL-Enumeration & Exploitation
Low-tech Tooling: Competing From a Device You Can’t Install Tools On
By Taisa
Taisa played her first season of NCL entirely from a browser-only device and shares her top resources and tricks for competing in less-than-ideal circumstances. Even if you've got Kali running as a VM, low-tech and browser-based tools can be a great way to check your work, troubleshoot your process, or collaborate with teammates in the cloud.
Announcement: Beginner Python Bootcamp with wolfshirtz
We know what you're thinking: Now that the semester is over and with finals out of the way, what's a student gotta do to learn some Python during winter break around here?? Never you fear, "Beginner Python with wolfshirtz" is here!
Ghidra: The NSA Reverse Engineering Tool That Will Help You Crush Enumeration and Exploitation
wolfshirtz
It's not often that a tool comes along and changes things. For wolfshirtz, that tool was Ghidra, an open-source decompiler that turns assembly language into something more human-readable. And it's not often that a blog post comes along and explains Ghidra so well! Wolfshirtz walks you through how to get started with Ghidra, his tricks for getting a feel for and maximizing its features, and his cheat sheet of top hotkeys!
Reverse Engineering: Fake It Until You Make It!
Aaron James
Aaron James has a story he likes to tell people about the more intimidating challenge categories in NCL, sprinkled with tools and tips for success in Enumeration and Exploitation. Spoiler Alert: The hardest part isn't the difficulty of the challenges!
NCL and WSL: Leaving the Kali VM Behind
Aaron James
Working in a virtual machine is a sub-optimal experience. What if we told you there's a way to run the Kali Linux terminal natively inside of Windows? Aaron James demonstrates how to install and compete using command-line tools on Windows Subsystem for Linux—no clunky VM required!
Summer Camp 2020: Enumeration and Exploitation
wolfshirtz
Wolfshirtz walks us through how he would solve the Summer Camp 2020 – Enumeration and Exploitation challenge: Reverse Engineering.
Turning that Code Inside Out: A Look at Reverse Engineering
WebWitch
The following challenge may or may not resemble challenges seen before in NCL! WebWitch's cauldron is filled with mysterious code, but one thing is missing. What is the secret input ingredient? You'll have to work backwards to find it!
PowerShell and Linux Command Line Resources We Love for the National Cyber League Games
John "Mako" McGill
Discover what's lurking beneath the surface of your operating system! Back with more shark analogies, Mako discusses how we can use the built-in scripting engines in Linux and Windows—Bash and Powershell—to automate and simplify (almost) everything in the NCL, broken down by domain.
Grace Hopper Celebration (#ghc17) Capture the Flag: Learning to Hack for Fun and Profit
This was the behind-the-scenes, CTF101 workshop that CryptoKait had been looking forward to all week! Her friend and fellow attendee, Lizzie Molloy, took these notes on how to approach CTF challenges, with a focus on cryptography, networks, web apps, and binaries, but the underlying problem-solving strategies are universal.