WebWitch
The following challenge may or may not resemble challenges seen before in NCL! WebWitch's cauldron is filled with mysterious code, but one thing is missing. What is the secret input ingredient? You'll have to work backwards to find it!
Category: National Cyber League
Advanced Tips on Web Application Hacking
Paul Buonopane
Are you experiencing a sort of cognitive dissonance where Hard challenges are becoming easier, and Easy challenges are becoming harder? Are attacks not working as expected? Considering giving up? Read this article by Paul Buonopane first.
Breaking Web Applications for Beginners
Paul Buonopane
Paul Buonopane and Hitchhiker's Guide to the Galaxy author Douglas Adams offer a brief history lesson explaining the existence of the NCL Web Application Exploitation domain before walking you through an exquisite attack plan. Thanks for all the phish, and mind the red herrings!
Why I Became a Player Ambassador – Hush
Hush1e
Hush1e grew up playing with a TRS-80 in the '80s, and her idea of a Sweet 16 involved finding backdoors into BBSes. So what did she naturally go to college for? Not what you'd expect! How did she find her way back to cybersecurity and the NCL?
Cybersecurity Club Survival Guide: Lessons Learned from the First Year of a New Cybersecurity Club
John "Mako" McGill
(Fifth in a five-part series.)
We are all strangers, until we aren't. As a cybersecurity club president, Mako learned many lessons in leadership along the way—some of them too late. But the philosophers don't have to be right; history doesn't have to repeat itself. Mako's roadmap to success includes which tempting wrong turns to avoid!
A Beginner’s Guide to Scanning with DirBuster for the NCL Games
JeanaByte
Staring uncertainly at a challenge called "Hidden Treasure"? Staring uncertainly at the DirBuster GUI? Wondering how legal this can possibly be? JeanaByte shows you how to brute force websites, find hidden directories, and stay out of jail in the process!
Hiding in Plain Sight: Steganography Tricks and Tips
John "Mako" McGill
Who uses bitmap images anymore? Data smugglers, primarily! You're instantly suspicious that there's more to a file than meets the eye, but how can you uncover its secrets? Mako exposes the etymology, purpose, tricks, and tools of steganography and recommends additional means of practice.
Why I Became an NCL Player Ambassador – Jacob Corley
Jacob "gond0r" Corley
Along his ascent through his school's cybersecurity club and through the NCL rankings, Jacob "gond0r" Corley discovered a passion for open-source cyber instruction which culminated in an impressive college capstone project!
Cybersecurity Club Survival Guide: How to Organize Events and Meetings, Invite Speakers, and Attract Sponsors
John "Mako" McGill
(Fourth in a five-part series.)
For every minute of a large event, there are about 30 minutes that go into planning it. Mako and CryptoKait share their master tips and tricks for maximizing time, money, and that incredible feeling of shared satisfaction enjoyed by organizers, sponsors, and attendees alike. Pro Tip: The right mindset makes all the difference!
Beginner Tips and Tricks for NCL Wireless Access Exploitation (Now Part of Network Traffic Analysis)
MistressVenom
You've installed your Kali VM and have a packet capture from NCL. Wireshark revealed the network ESSID and victim and attacker MAC addresses, but where is that wireless password? MistressVenom shows you how to run aircrack-ng—in style.
You must be logged in to post a comment.