MistressVenom
You've installed your Kali VM and have a packet capture from NCL. Wireshark revealed the network ESSID and victim and attacker MAC addresses, but where is that wireless password? MistressVenom shows you how to run aircrack-ng—in style.
Category: NCL-Toolkit
Password Cracking with Hashcat
Paul Buonopane
Humans are bad at passwords. It's true. We're terrible at making them, we're terrible at remembering them, and we're terrible at assessing their quality. It's difficult to emphasize just how terrible we are without demonstrating just how easy they are to break—so that's exactly what Paul Buonopane is going to do.
Secret Information in Network Traffic Logs: NTA for NCL
Paul Buonopane
Improving your Network Traffic Analysis techniques can mean the difference between spending hours on a challenge and solving it in 5 minutes. Paul Buonopane demonstrates how to filter large packet captures in Wireshark and reassemble fragmented files from packet data.
Sharpening the Axe: How to Cut and Carve Logs in the NCL
John "Mako" McGill
Parsing log files is an art form, not unlike sculpting—"cut away all the parts of the wood block that are not the bear." In place of an axe and knife, Mako shows us how to whittle the bear from the log using grep, regex, awk, sed, uniq, sort, and pipe!
Sha Jvgu Pelcgb! Crypto or Cthulhu?
John "Mako" McGill
How can we crack these cryptic ciphers? Fortunately, we don't have to supplicate before any ancient world-swallowing, madness-inducing deities. (Although, Mako does feel like losing his mind a little during the NCL games.) Instead, Mako introduces key markers and tricks for identifying encoding schemes!
Open Source Intelligence for the National Cyber League Games
Paul Buonopane
OSINT is a broad category in the real world—and an ethical gray area. What types of challenges await you in a timed competition like NCL? Paul Buonopane provides a peek behind the curtain and shares his favorite advanced search operators, metadata viewers, and real-world OSINT gathering tools. Use them responsibly!
Fresh Coffee…I Mean Kali!
Hush1e
Hush1e likes to start off each NCL season with a fresh installation of VirtualBox and a shiny, new Kali Linux virtual machine (VM). If you've never set up a VM before, follow along with Hush1e! (Coffee optional.)
Where Can I Find Resources for the National Cyber League Games?
CryptoKait
CryptoKait polled the NCL Player Ambassadors and the NCL Board of Directors to bring us this comprehensive list of resources for 2020—blog highlights, practice challenges, coaching resources, live shows, where to ask questions, and more!
PowerShell and Linux Command Line Resources We Love for the National Cyber League Games
John "Mako" McGill
Discover what's lurking beneath the surface of your operating system! Back with more shark analogies, Mako discusses how we can use the built-in scripting engines in Linux and Windows—Bash and Powershell—to automate and simplify (almost) everything in the NCL, broken down by domain.
Where to Start with Wireless Access Exploitation (Now Part of Network Traffic Analysis) for the National Cyber League Games
JeanaByte
JeanaByte walks us through how she would solve a sample Wireless Access Exploitation challenge, from picking through a packet capture in Wireshark to navigating the Aircrack-ng command-line interface.
You must be logged in to post a comment.