0x600DF00D
Coach Ambassador 0x600DF00D knows you want your students to succeed in NCL! He explains when and how Coaches may offer assistance, and shares his top tools and hints, by domain, to impart upon your charges before the Games begin (because during would be cheating!).
Category: NCL-Network Traffic Analysis
Thou Shall Pass! I Am a Coach. How Do I Help My Students Succeed?
0x600DF00D
New NCL Coaches: Read for a gentle introduction.
Seasoned Coaches: Read for a new take on how to help your students succeed.
0x600DF00D breaks down how to coach, what to coach, and ways to incorporate NCL into the classroom, all while honoring the Rules of Conduct.
Low-tech Tooling: Competing From a Device You Can’t Install Tools On
Taisa
Taisa played her first season of NCL entirely from a browser-only device and shares her top resources and tricks for competing in less-than-ideal circumstances. Even if you've got Kali running as a VM, low-tech and browser-based tools can be a great way to check your work, troubleshoot your process, or collaborate with teammates in the cloud.
Spotting Anomalies in Pcaps
ghostinth3machine
Intimidated by Wireshark? It's just a fancy spreadsheet! Ghostinth3machine shows you how to filter traffic, follow streams, search, view statistics, and otherwise go from wearing down your scroll wheel to making that fancy spreadsheet work for you!
NCL and WSL: Leaving the Kali VM Behind
Aaron James
Working in a virtual machine is a sub-optimal experience. What if we told you there's a way to run the Kali Linux terminal natively inside of Windows? Aaron James demonstrates how to install and compete using command-line tools on Windows Subsystem for Linux—no clunky VM required!
Beginner Tips and Tricks for NCL Wireless Access Exploitation (Now Part of Network Traffic Analysis)
MistressVenom
You've installed your Kali VM and have a packet capture from NCL. Wireshark revealed the network ESSID and victim and attacker MAC addresses, but where is that wireless password? MistressVenom shows you how to run aircrack-ng—in style.
Secret Information in Network Traffic Logs: NTA for NCL
Paul Buonopane
Improving your Network Traffic Analysis techniques can mean the difference between spending hours on a challenge and solving it in 5 minutes. Paul Buonopane demonstrates how to filter large packet captures in Wireshark and reassemble fragmented files from packet data.
PowerShell and Linux Command Line Resources We Love for the National Cyber League Games
John "Mako" McGill
Discover what's lurking beneath the surface of your operating system! Back with more shark analogies, Mako discusses how we can use the built-in scripting engines in Linux and Windows—Bash and Powershell—to automate and simplify (almost) everything in the NCL, broken down by domain.
Where to Start with Wireless Access Exploitation (Now Part of Network Traffic Analysis) for the National Cyber League Games
JeanaByte
JeanaByte walks us through how she would solve a sample Wireless Access Exploitation challenge, from picking through a packet capture in Wireshark to navigating the Aircrack-ng command-line interface.
Newbies Guide to Network Traffic Analysis for the National Cyber League Games
John "Mako" McGill
There's no better Player Ambassador than our resident shark, Mako, to explain CloudShark, Wireshark, and TShark—to keep Network Traffic Analysis from eating your accuracy and your lunch!
You must be logged in to post a comment.