Skip to content

CryptoKait

  • CryptoKait
    • Home
    • About CryptoKait
    • Workshops and Public Appearances
    • Blog Posts by CryptoKait
    • Contact CryptoKait
  • Blog
  • Initiatives
    • Meet the NCL Player Ambassadors & Apply
    • CryptoKait’s Feature Friday
    • Apply to Be Featured on the CryptoKait.com Blog
    • Player Ambassador Diversity & Inclusion Advisory Board
  • National Cyber League
    • START HERE: NCL Coaching Guide for Everyone
    • Meet the NCL Player Ambassadors
    • NCL Blog
    • NCL Practice
    • Webinars and Live Shows
  • Personal Development
    • Adulting
    • Career Advice & Human Skills
    • Self Care
  • Cybersec Clubs
    • Cybersecurity Club Survival Guide
    • Blog Category: Cybersecurity Clubs
    • Collaboration Tips
  • Cybersec Bootcamps
    • Beginner Python with wolfshirtz
    • Command-line Log Analysis with Taisa

Category: NCL-Toolkit

Everything I Learned About Cryptography from Working and Living with CryptoKait

August 26, 2020September 4, 2020Leave a comment

JeanaByte
From terminology, to tools, to matters of life and death, discover the cryptography lessons that JeanaByte has absorbed from CryptoKait and would now never teach cryptography without!

NCL and WSL: Leaving the Kali VM Behind

August 19, 2020January 9, 20212 Comments

Aaron James
Working in a virtual machine is a sub-optimal experience. What if we told you there's a way to run the Kali Linux terminal natively inside of Windows? Aaron James demonstrates how to install and compete using command-line tools on Windows Subsystem for Linuxโ€”no clunky VM required!

Containerizing Your CTF Stack: Using Docker for CTFs and NCL

August 17, 2020January 9, 2021Leave a comment

wolfshirtz
Containers can make setting up a tricked-out CTF work environment as easy as issuing a command or two. Not sure what containers are or how to use them? Grab a hot beverage and let wolfshirtz break it down!

Writing Elegant Regular Expressions

July 11, 2020September 13, 2020Leave a comment

Paul Buonopane
What does elegant regex look like? When shouldn't you use it to parse a log? Did you know that it can crash some devices? Paul Buonopane reformats 7,326 phone numbers, then shows you how to take your regex to the next level, all before lunch!

Summer Camp 2020: Web Application Exploitation

July 8, 2020September 9, 2020Leave a comment

Aaron James
Aaron James walks us through how he would solve the Summer Camp 2020 โ€“ Web Application Exploitation challenge: Black Mesa.

Summer Camp 2020 – Password Cracking

July 1, 2020September 9, 20201 Comment

Hush1e
Hush1e takes a break from drinking coffee and imperiling mailboxes to walk us through how she would solve the Summer Camp 2020 โ€“ Password Cracking challenge: Cracking for Coffee.

Open-Source-Intelligence

Summer Camp 2020 – Geo

May 13, 2020September 9, 20201 Comment

MistressVenom
MistressVenom walks us through how she would solve the Summer Camp 2020 โ€“ Open Source Intelligence challenge: GEO.

Open-Source-Intelligence

Summer Camp 2020 – Metadata

May 6, 2020September 9, 20201 Comment

Fred Stinchcombe
Fred walks us through how he would solve the Summer Camp 2020 โ€“ Open Source Intelligence challenge: Metadata.

A Beginnerโ€™s Guide to Scanning with DirBuster for the NCL Games

March 4, 2020September 4, 2020Leave a comment

JeanaByte
Staring uncertainly at a challenge called "Hidden Treasure"? Staring uncertainly at the DirBuster GUI? Wondering how legal this can possibly be? JeanaByte shows you how to brute force websites, find hidden directories, and stay out of jail in the process!

Hiding in Plain Sight: Steganography Tricks and Tips

March 2, 2020October 6, 2020Leave a comment

John "Mako" McGill
Who uses bitmap images anymore? Data smugglers, primarily! You're instantly suspicious that there's more to a file than meets the eye, but how can you uncover its secrets? Mako exposes the etymology, purpose, tricks, and tools of steganography and recommends additional means of practice.

Posts navigation

Older posts
Newer posts

Follow Your Favorite NCL PA

  • X
  • X
  • X
  • X
  • X
  • X

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 282 other subscribers

Your Favorite Authors

  • 0x600DF00D's avatar 0x600DF00D
    • How to Support Student Organizations
    • Helping Students During the Games
    • How to Use Your Coach’s Link
    • Thou Shall Pass! I Am a Coach. How Do I Help My Students Succeed?
  • Aaron James's avatar Aaron James
    • Reverse Engineering: Fake It Until You Make It!
    • Taking Password Cracking to the Next Level
    • NCL and WSL: Leaving the Kali VM Behind
    • Fresh Kali…I mean Coffee
  • John McGill's avatar John McGill
    • CompTIA Security+ – One Certification to Rule Them All
    • Organizing Your Workspace
    • Cybersecurity Club Survival Guide: Lessons Learned from the First Year of a New Cybersecurity Club
    • Hiding in Plain Sight: Steganography Tricks and Tips
  • CryptoKait's avatar CryptoKait
    • Everything You Need to Know About Brackets
    • How Do I Register and Pay for Students?
    • Everything You Need to Know About the NCL Team Game
    • CryptoKait Blog Reaches 100k Views
  • ZeroTrail's avatar ZeroTrail
    • How to Keep Your Confidence Up When You Are Stuck
    • Transferring Your Non-Tech Skills to a Cyber Security Job
    • How Setting Up a Virtual Machine and Navigating Through It Can Help You with NCL
    • How Playing War Games Can Help You Learn Command Line
  • drzeichick's avatar drzeichick
    • Navigating the Coach Dashboard
    • Everything You Need to Know About the NCL Gym โ€“ Zombie Survival Guide Version
    • What Should I Consider When Selecting a Program for Cybersecurity?
  • PressSpace2Hack's avatar PressSpace2Hack
    • How to Get the Most Out of the NCL Slack Channel
    • Forensics: First Impression
    • How to Keep Your Accuracy and Score All the Points
    • Everything You Need to Know About the NCL From Someone Who Has Been Around as Long as Kait
  • Taisa's avatar Taisa
    • Everything You Need to Know About the National Cyber League Preseason Game
    • Command-line Log Analysis FOR THE WIN (3/3): Untangling a Web Access Log
    • Command-line Log Analysis FOR THE WIN (2/3): Walking through “Leaping”
    • Command-line Log Analysis FOR THE WIN (1/3): How to Approach a Wild Log
  • Fred Stinchcombe's avatar Fred Stinchcombe
    • Leveraging Your LMS – Tips for Coaches Thinking Long Term
    • Need Some Buy In โ€“ Tips on Selling NCL to Your School Admins
    • Everything You Need to Know About the NCL Gym (but Were Too Afraid to Ask Someone)
    • What I Learned from Teaching Cyber at an All Girls High School
  • ghostinth3machine's avatar ghostinth3machine
    • How to RE with Radare When You Know Nothing
    • How to Regex When You Know Nothing
    • How to Go From Hashed to Cracked With Hashcat
    • How to Command Line When You Know Nothing
  • Jacob Corley's avatar Jacob Corley
    • A Day in the Life of a Cyber Engineer
    • How Creating CTFs Challenges Helps You Succeed in CTFs
    • How to Include the National Cyber League Games on Your Rรฉsumรฉ
    • Finding a Team When You’re Playing Solo
  • Hush1e's avatar Hush1e
    • Everything You Need To Know About Rankings
    • How to Run Recaps
    • What Happens When the Season Is On and I Can’t Reach Out for Help?
    • Digging into Autopsy (Forensics)
  • Jeana Byte's avatar Jeana Byte
    • Everything You Need to Know About the Team Game
    • NCL Mistakes That Make Me a Better Player
    • How to Run Your Team as a Student Coach
    • I Need Help Solving an NCL Challenge. What Do I Do?
  • mistressven0m's avatar mistressven0m
    • I’m Just a Lone Student. How Can I Bring NCL To My School?
    • Everything You Need to Know About Our CompTIA Partnership
    • How to Use NCL to Influence and Improve Your Rรฉsumรฉ and Professional Appearance
    • Four Ways to Analyze Logs Like a Pro!
  • WebWitch's avatar WebWitch
    • Landing a Job and Getting Paid Well For It [Part 3]
    • My Young Padawan โ€” How to be an Effective, Supportive Mentor
    • Landing a Job and Getting Paid Well For It [Part 2/5]
    • Landing a Job and Getting Paid Well For It [Part 1/5]
  • wolfshirtz's avatar wolfshirtz
    • Everything You Need to Know About the NCL Individual Game
    • Why Steganography is Cryptography
    • Ghidra: The NSA Reverse Engineering Tool That Will Help You Crush Enumeration and Exploitation
    • Collaborative Python Scripting for the Team Games
Website Powered by WordPress.com.
CryptoKait
Website Powered by WordPress.com.
  • Subscribe Subscribed
    • CryptoKait
    • Join 282 other subscribers
    • Already have a WordPress.com account? Log in now.
    • CryptoKait
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.