JeanaByte
JeanaByte walks us through how she would solve a sample Wireless Access Exploitation challenge, from picking through a packet capture in Wireshark to navigating the Aircrack-ng command-line interface.
Category: National Cyber League
Everything You Need to Know About Password Cracking for the National Cyber League Games
CryptoKait
The most important skill to cultivate for NCL's Password Cracking domain is using the correct wordlist! This guide alone should get you through all the Easy and Medium challenges. CryptoKait demonstrates how to use a premade wordlist, create an enumerated wordlist, and generate your own wordlist from scratch.
Newbies Guide to Network Traffic Analysis for the National Cyber League Games
John "Mako" McGill
There's no better Player Ambassador than our resident shark, Mako, to explain CloudShark, Wireshark, and TShark—to keep Network Traffic Analysis from eating your accuracy and your lunch!
Intro to Scanning for the National Cyber League Games
WebWitch
WebWitch introduces Nmap, demonstrates how to tailor (and troubleshoot) your service scans to meet your NCL competition needs, recommends resources for mastering more features, and cautions against common mistakes.
Leaping into Log Analysis
WebWitch
Log analysis becomes very important when you're trying to identify the source of a breach. WebWitch consults their command-line spellbook to summon forth the fundamental tools of log analysis, and shares their pro tips for preserving accuracy.
Log Analysis Tips for People Who Aren’t Ready for Command Line
CryptoKait
"If you want to learn how to do log analysis properly, this probably isn't the post for you." –CryptoKait
"There are plenty of ways to get things done. . . . I have always been good at Excel, and I firmly believe you should use things you are familiar with." –Also CryptoKait(*)
Open Source Intelligence on How to Win Open Source Intelligence in the National Cyber League Games
CryptoKait
"Just Google It" is CryptoKait's publicly proposed alternative title for NCL's Open Source Intelligence domain. The domain is based entirely on research skills. It is always the best domain to start with—but there is one caveat! CryptoKait prepares you for it with practice challenges and pro tips.
Building Your Virtual Playground: Setting Up VMs for the National Cyber League Games
John "Mako" McGill
Safety first! What is a virtual machine, and why should you use one? Even if you know the answer, do you know the alternatives? Mako shows you how to build a sandbox around your NCL shenanigans for safety. Remember to take snapshots!
What to Expect Your First National Cyber League Season
JeanaByte
After two seasons of competing in the NCL, JeanaByte became a student coach at her university! After participating in the Games as both a player and a coach, she's developed a unique perspective on what to expect during your first season. Pro Tip: Try not to scare your roommate!
Why NCL at WiCyS Was So Important
CryptoKait almost withdrew from her computer science classes, due to a sense of not belonging. Her experience is not unique. Another Player Ambassador learned that the graduation rate for women in I.T. programs at her own school is just 11%, for the same reason. Two organizations in CryptoKait's early experience, though, have been influential enough to keep her and other women in the game.
You must be logged in to post a comment.