CryptoKait
This special post represents the combined wisdom of all the NCL Player Ambassadors, the NCL Commissioner, and the Game-makers at Cyber Skyline. What single DO and DON'T would each insider advise for your success in the NCL Games?
Category: NCL-Training Guide
PowerShell and Linux Command Line Resources We Love for the National Cyber League Games
John "Mako" McGill
Discover what's lurking beneath the surface of your operating system! Back with more shark analogies, Mako discusses how we can use the built-in scripting engines in Linux and Windows—Bash and Powershell—to automate and simplify (almost) everything in the NCL, broken down by domain.
Where to Start with Wireless Access Exploitation (Now Part of Network Traffic Analysis) for the National Cyber League Games
JeanaByte
JeanaByte walks us through how she would solve a sample Wireless Access Exploitation challenge, from picking through a packet capture in Wireshark to navigating the Aircrack-ng command-line interface.
Everything You Need to Know About Password Cracking for the National Cyber League Games
CryptoKait
The most important skill to cultivate for NCL's Password Cracking domain is using the correct wordlist! This guide alone should get you through all the Easy and Medium challenges. CryptoKait demonstrates how to use a premade wordlist, create an enumerated wordlist, and generate your own wordlist from scratch.
Newbies Guide to Network Traffic Analysis for the National Cyber League Games
John "Mako" McGill
There's no better Player Ambassador than our resident shark, Mako, to explain CloudShark, Wireshark, and TShark—to keep Network Traffic Analysis from eating your accuracy and your lunch!
Intro to Scanning for the National Cyber League Games
WebWitch
WebWitch introduces Nmap, demonstrates how to tailor (and troubleshoot) your service scans to meet your NCL competition needs, recommends resources for mastering more features, and cautions against common mistakes.
Leaping into Log Analysis
WebWitch
Log analysis becomes very important when you're trying to identify the source of a breach. WebWitch consults their command-line spellbook to summon forth the fundamental tools of log analysis, and shares their pro tips for preserving accuracy.
Log Analysis Tips for People Who Aren’t Ready for Command Line
CryptoKait
"If you want to learn how to do log analysis properly, this probably isn't the post for you." –CryptoKait
"There are plenty of ways to get things done. . . . I have always been good at Excel, and I firmly believe you should use things you are familiar with." –Also CryptoKait(*)
Open Source Intelligence on How to Win Open Source Intelligence in the National Cyber League Games
CryptoKait
"Just Google It" is CryptoKait's publicly proposed alternative title for NCL's Open Source Intelligence domain. The domain is based entirely on research skills. It is always the best domain to start with—but there is one caveat! CryptoKait prepares you for it with practice challenges and pro tips.
Building Your Virtual Playground: Setting Up VMs for the National Cyber League Games
John "Mako" McGill
Safety first! What is a virtual machine, and why should you use one? Even if you know the answer, do you know the alternatives? Mako shows you how to build a sandbox around your NCL shenanigans for safety. Remember to take snapshots!
You must be logged in to post a comment.