JeanaByte
From terminology, to tools, to matters of life and death, discover the cryptography lessons that JeanaByte has absorbed from CryptoKait and would now never teach cryptography without!
Category: NCL-Toolkit
NCL and WSL: Leaving the Kali VM Behind
Aaron James
Working in a virtual machine is a sub-optimal experience. What if we told you there's a way to run the Kali Linux terminal natively inside of Windows? Aaron James demonstrates how to install and compete using command-line tools on Windows Subsystem for Linuxโno clunky VM required!
Containerizing Your CTF Stack: Using Docker for CTFs and NCL
wolfshirtz
Containers can make setting up a tricked-out CTF work environment as easy as issuing a command or two. Not sure what containers are or how to use them? Grab a hot beverage and let wolfshirtz break it down!
Writing Elegant Regular Expressions
Paul Buonopane
What does elegant regex look like? When shouldn't you use it to parse a log? Did you know that it can crash some devices? Paul Buonopane reformats 7,326 phone numbers, then shows you how to take your regex to the next level, all before lunch!
Summer Camp 2020: Web Application Exploitation
Aaron James
Aaron James walks us through how he would solve the Summer Camp 2020 โ Web Application Exploitation challenge: Black Mesa.
Summer Camp 2020 – Password Cracking
Hush1e
Hush1e takes a break from drinking coffee and imperiling mailboxes to walk us through how she would solve the Summer Camp 2020 โ Password Cracking challenge: Cracking for Coffee.
Summer Camp 2020 – Geo
MistressVenom
MistressVenom walks us through how she would solve the Summer Camp 2020 โ Open Source Intelligence challenge: GEO.
Summer Camp 2020 – Metadata
Fred Stinchcombe
Fred walks us through how he would solve the Summer Camp 2020 โ Open Source Intelligence challenge: Metadata.
A Beginnerโs Guide to Scanning with DirBuster for the NCL Games
JeanaByte
Staring uncertainly at a challenge called "Hidden Treasure"? Staring uncertainly at the DirBuster GUI? Wondering how legal this can possibly be? JeanaByte shows you how to brute force websites, find hidden directories, and stay out of jail in the process!
Hiding in Plain Sight: Steganography Tricks and Tips
John "Mako" McGill
Who uses bitmap images anymore? Data smugglers, primarily! You're instantly suspicious that there's more to a file than meets the eye, but how can you uncover its secrets? Mako exposes the etymology, purpose, tricks, and tools of steganography and recommends additional means of practice.
You must be logged in to post a comment.