Paul Buonopane
Paul Buonopane and Hitchhiker's Guide to the Galaxy author Douglas Adams offer a brief history lesson explaining the existence of the NCL Web Application Exploitation domain before walking you through an exquisite attack plan. Thanks for all the phish, and mind the red herrings!
Category: NCL-Training Guide
A Beginner’s Guide to Scanning with DirBuster for the NCL Games
JeanaByte
Staring uncertainly at a challenge called "Hidden Treasure"? Staring uncertainly at the DirBuster GUI? Wondering how legal this can possibly be? JeanaByte shows you how to brute force websites, find hidden directories, and stay out of jail in the process!
Hiding in Plain Sight: Steganography Tricks and Tips
John "Mako" McGill
Who uses bitmap images anymore? Data smugglers, primarily! You're instantly suspicious that there's more to a file than meets the eye, but how can you uncover its secrets? Mako exposes the etymology, purpose, tricks, and tools of steganography and recommends additional means of practice.
Beginner Tips and Tricks for NCL Wireless Access Exploitation (Now Part of Network Traffic Analysis)
MistressVenom
You've installed your Kali VM and have a packet capture from NCL. Wireshark revealed the network ESSID and victim and attacker MAC addresses, but where is that wireless password? MistressVenom shows you how to run aircrack-ng—in style.
Password Cracking with Hashcat
Paul Buonopane
Humans are bad at passwords. It's true. We're terrible at making them, we're terrible at remembering them, and we're terrible at assessing their quality. It's difficult to emphasize just how terrible we are without demonstrating just how easy they are to break—so that's exactly what Paul Buonopane is going to do.
Secret Information in Network Traffic Logs: NTA for NCL
Paul Buonopane
Improving your Network Traffic Analysis techniques can mean the difference between spending hours on a challenge and solving it in 5 minutes. Paul Buonopane demonstrates how to filter large packet captures in Wireshark and reassemble fragmented files from packet data.
Sharpening the Axe: How to Cut and Carve Logs in the NCL
John "Mako" McGill
Parsing log files is an art form, not unlike sculpting—"cut away all the parts of the wood block that are not the bear." In place of an axe and knife, Mako shows us how to whittle the bear from the log using grep, regex, awk, sed, uniq, sort, and pipe!
Sha Jvgu Pelcgb! Crypto or Cthulhu?
John "Mako" McGill
How can we crack these cryptic ciphers? Fortunately, we don't have to supplicate before any ancient world-swallowing, madness-inducing deities. (Although, Mako does feel like losing his mind a little during the NCL games.) Instead, Mako introduces key markers and tricks for identifying encoding schemes!
Open Source Intelligence for the National Cyber League Games
Paul Buonopane
OSINT is a broad category in the real world—and an ethical gray area. What types of challenges await you in a timed competition like NCL? Paul Buonopane provides a peek behind the curtain and shares his favorite advanced search operators, metadata viewers, and real-world OSINT gathering tools. Use them responsibly!
What to Expect Your First National Cyber League Season
John "Mako" McGill
Mako was once asked to sum up the NCL in five words. After much deliberation, he decided on: "Learned it? Prove it!" (and he had one word left to spare!). In your first NCL competition, you can expect to do both. Mako explains how to find your strengths, confront your weaknesses, and discover your specialty through the Games.
You must be logged in to post a comment.