0x600DF00D
Coach Ambassador 0x600DF00D knows you want your students to succeed in NCL! He explains when and how Coaches may offer assistance, and shares his top tools and hints, by domain, to impart upon your charges before the Games begin (because during would be cheating!).
Category: NCL-Wireless Access Exploitation
Thou Shall Pass! I Am a Coach. How Do I Help My Students Succeed?
0x600DF00D
New NCL Coaches: Read for a gentle introduction.
Seasoned Coaches: Read for a new take on how to help your students succeed.
0x600DF00D breaks down how to coach, what to coach, and ways to incorporate NCL into the classroom, all while honoring the Rules of Conduct.
Spotting Anomalies in Pcaps
ghostinth3machine
Intimidated by Wireshark? It's just a fancy spreadsheet! Ghostinth3machine shows you how to filter traffic, follow streams, search, view statistics, and otherwise go from wearing down your scroll wheel to making that fancy spreadsheet work for you!
NCL and WSL: Leaving the Kali VM Behind
Aaron James
Working in a virtual machine is a sub-optimal experience. What if we told you there's a way to run the Kali Linux terminal natively inside of Windows? Aaron James demonstrates how to install and compete using command-line tools on Windows Subsystem for Linux—no clunky VM required!
Beginner Tips and Tricks for NCL Wireless Access Exploitation (Now Part of Network Traffic Analysis)
MistressVenom
You've installed your Kali VM and have a packet capture from NCL. Wireshark revealed the network ESSID and victim and attacker MAC addresses, but where is that wireless password? MistressVenom shows you how to run aircrack-ng—in style.
PowerShell and Linux Command Line Resources We Love for the National Cyber League Games
John "Mako" McGill
Discover what's lurking beneath the surface of your operating system! Back with more shark analogies, Mako discusses how we can use the built-in scripting engines in Linux and Windows—Bash and Powershell—to automate and simplify (almost) everything in the NCL, broken down by domain.
Where to Start with Wireless Access Exploitation (Now Part of Network Traffic Analysis) for the National Cyber League Games
JeanaByte
JeanaByte walks us through how she would solve a sample Wireless Access Exploitation challenge, from picking through a packet capture in Wireshark to navigating the Aircrack-ng command-line interface.
My National Cyber League (NCL) Prep-Guide
CryptoKait's first prep guide for the NCL in 2017 remains a relevant read! A brief introduction to the Games is followed by beginner-friendly toolkit suggestions structured by domain. Plus, it's fun to go back and see what has and hasn't changed!
You must be logged in to post a comment.