Skip to content

CryptoKait

Home of the National Cyber League Player Ambassadors

  • CryptoKait
    • Home
    • About CryptoKait
    • Workshops and Public Appearances
    • Blog Posts by CryptoKait
    • Contact CryptoKait
  • Blog
  • Initiatives
    • Meet the NCL Player Ambassadors & Apply
    • CryptoKait’s Feature Friday
    • Apply to Be Featured on the CryptoKait.com Blog
    • Player Ambassador Diversity & Inclusion Advisory Board
  • National Cyber League
    • START HERE: NCL Coaching Guide for Everyone
    • Meet the NCL Player Ambassadors
    • NCL Blog
    • NCL Practice
    • Webinars and Live Shows
  • Personal Development
    • Adulting
    • Career Advice & Human Skills
    • Self Care
  • Cybersec Clubs
    • Cybersecurity Club Survival Guide
    • Blog Category: Cybersecurity Clubs
    • Collaboration Tips
  • Cybersec Bootcamps
    • Beginner Python with wolfshirtz
    • Command-line Log Analysis with Taisa

Category: NCL-Log Analysis

How to Regex When You Know Nothing

March 1, 2021March 7, 2021Leave a comment

By ghostinth3machine
Regular Expressions are sets of special characters that symbolize search patterns. They look rather strange and esoteric, not unlike super-high-level, brain-exploding voodoo magic, but, as ghostinth3machine demonstrates, they're really not too difficult to learn, and, once you do learn them, you'll wonder how you ever survived without them.

Command-line Log Analysis FOR THE WIN (3/3): Untangling a Web Access Log

February 17, 2021February 28, 2021Leave a comment

By Taisa
(Third in a three-part series.)
Reinforce what you've learned with examples and repetition! Taisa guides you through how you can untangle the Web Access Log challenge on your own using the command-line tools from Parts 1 and 2 in this series. You've got this!

Command-line Log Analysis FOR THE WIN (2/3): Walking through “Leaping”

February 15, 2021February 28, 2021Leave a comment

By Taisa
(Second in a three-part series.)
In this article, Taisa walks us through how to solve the Leaping Log Analysis challenge using only command-line tools (plus a little OSINT). Utilities demonstrated in this guide: cat, grep, cut, sort, uniq, tr, paste, bc, wc, head, and a little regex.

Command-line Log Analysis FOR THE WIN (1/3): How to Approach a Wild Log

February 10, 2021February 28, 20211 Comment

By Taisa
(First in a three-part series.)
In 2017, Taisa was traumatized by logs. In 2018, she was analyzing logs by hand on a browser-only Chromebook. In 2020, she was #1 on the leaderboard in Log Analysis at the end of the Spring Preseason. Follow her Command-line Log Analysis blog series to find out which tools she used and how she did it—and how you can, too!

Thou Shall Pass! I Am a Coach. How Do I Help My Students Succeed?

February 2, 2021February 6, 2021Leave a comment

By 0x600DF00D
New NCL Coaches: Read for a gentle introduction.
Seasoned Coaches: Read for a new take on how to help your students succeed.
0x600DF00D breaks down how to coach, what to coach, and ways to incorporate NCL into the classroom, all while honoring the Rules of Conduct.

Low-tech Tooling: Competing From a Device You Can’t Install Tools On

February 1, 2021February 17, 2021Leave a comment

By Taisa
Taisa played her first season of NCL entirely from a browser-only device and shares her top resources and tricks for competing in less-than-ideal circumstances. Even if you've got Kali running as a VM, low-tech and browser-based tools can be a great way to check your work, troubleshoot your process, or collaborate with teammates in the cloud.

Four Ways to Analyze Logs Like a Pro!

September 9, 2020September 10, 2020Leave a comment

MistressVenom
MistressVenom loves to eat logs for breakfast, lunch, and dinner, and as an awesome 2 AM snack. Let her show you how to analyze logs like a pro, using four of the tastiest methods: manually, Excel, command line, and Splunk!

NCL and WSL: Leaving the Kali VM Behind

August 19, 2020January 9, 20212 Comments

Aaron James
Working in a virtual machine is a sub-optimal experience. What if we told you there's a way to run the Kali Linux terminal natively inside of Windows? Aaron James demonstrates how to install and compete using command-line tools on Windows Subsystem for Linux—no clunky VM required!

Summer Camp 2020 – Log Analysis

June 17, 2020September 9, 20201 Comment

Paul Buonopane
Paul Buonopane walks us through how he would solve the Summer Camp 2020 – Log Analysis challenge: Web Access Log.

Sharpening the Axe: How to Cut and Carve Logs in the NCL

February 17, 2020September 6, 20201 Comment

John "Mako" McGill
Parsing log files is an art form, not unlike sculpting—"cut away all the parts of the wood block that are not the bear." In place of an axe and knife, Mako shows us how to whittle the bear from the log using grep, regex, awk, sed, uniq, sort, and pipe!

Posts navigation

Older posts

Follow Your Favorite NCL PA

  • Twitter
  • Twitter
  • Twitter
  • Twitter
  • Twitter
  • Twitter

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 1,665 other followers

Your Favorite Authors

  • 0x600DF00D
    • How to Use Your Coach’s Link
    • Thou Shall Pass! I Am a Coach. How Do I Help My Students Succeed?
  • Aaron James
    • Reverse Engineering: Fake It Until You Make It!
    • Taking Password Cracking to the Next Level
    • NCL and WSL: Leaving the Kali VM Behind
    • Fresh Kali…I mean Coffee
  • John McGill
    • CompTIA Security+ – One Certification to Rule Them All
    • Organizing Your Workspace
    • Cybersecurity Club Survival Guide: Lessons Learned from the First Year of a New Cybersecurity Club
    • Hiding in Plain Sight: Steganography Tricks and Tips
  • CryptoKait
    • How Do I Register and Pay for Students?
    • Everything You Need to Know About the NCL Team Game
    • CryptoKait Blog Reaches 100k Views
    • An Open Letter About the NCL/CompTIA Partnership from the NCL Player Ambassadors
  • ZeroTrail
    • Transferring Your Non-Tech Skills to a Cyber Security Job
    • How Setting Up a Virtual Machine and Navigating Through It Can Help You with NCL
    • How Playing War Games Can Help You Learn Command Line
    • Everything You Need to Know About Preseason
  • drzeichick
    • Navigating the Coach Dashboard
    • Everything You Need to Know About the NCL Gym – Zombie Survival Guide Version
    • What Should I Consider When Selecting a Program for Cybersecurity?
  • PressSpace2Hack
    • How to Keep Your Accuracy and Score All the Points
    • Everything You Need to Know About the NCL From Someone Who Has Been Around as Long as Kait
    • What’s New in Cyber Skyline for Fall 2020
    • Writing Elegant Regular Expressions
  • Taisa
    • Everything You Need to Know About the National Cyber League Preseason Game
    • Command-line Log Analysis FOR THE WIN (3/3): Untangling a Web Access Log
    • Command-line Log Analysis FOR THE WIN (2/3): Walking through “Leaping”
    • Command-line Log Analysis FOR THE WIN (1/3): How to Approach a Wild Log
  • Fred Stinchcombe
    • Need Some Buy In – Tips on Selling NCL to Your School Admins
    • Everything You Need to Know About the NCL Gym (but Were Too Afraid to Ask Someone)
    • What I Learned from Teaching Cyber at an All Girls High School
    • Summer Camp 2020 – Metadata
  • ghostinth3machine
    • How to RE with Radare When You Know Nothing
    • How to Regex When You Know Nothing
    • How to Go From Hashed to Cracked With Hashcat
    • How to Command Line When You Know Nothing
  • Jacob Corley
    • A Day in the Life of a Cyber Engineer
    • How Creating CTFs Challenges Helps You Succeed in CTFs
    • How to Include the National Cyber League Games on Your Résumé
    • Finding a Team When You’re Playing Solo
  • Hush1e
    • Volunteer Work and How Not to Take on Too Much
    • Who Should Play the NCL CTF and Why?
    • What Are the NCL Power Rankings?
    • Effective Team Work That Includes All Player Levels
  • Jeana Byte
    • Google-Fu: A Tour of Google Dorking
    • Everything You Need to Know on How to Run Your Preseason Recaps
    • Everything I Learned About Cryptography from Working and Living with CryptoKait
    • What’s the Deal with the National Cyber League?
  • mistressven0m
    • Everything You Need to Know About Our CompTIA Partnership
    • How to Use NCL to Influence and Improve Your Résumé and Professional Appearance
    • Four Ways to Analyze Logs Like a Pro!
    • Online Password Cracking
  • WebWitch
    • What is HTTP Request Smuggling and Why Do I Care?
    • What Do the NCL Brackets Mean?
    • Top Ten Reasons Why You *Shouldn’t* Play in the NCL Games
    • Why NCL is Great Even If You Aren’t in Cyber
  • wolfshirtz
    • Why Steganography is Cryptography
    • Ghidra: The NSA Reverse Engineering Tool That Will Help You Crush Enumeration and Exploitation
    • Collaborative Python Scripting for the Team Games
    • Containerizing Your CTF Stack: Using Docker for CTFs and NCL
Website Powered by WordPress.com.
CryptoKait
Website Powered by WordPress.com.
Cancel

You must be logged in to post a comment.

Loading Comments...
Comment
    ×