CryptoKait
Are you a Coach trying to understand the registration and payment process for the National Cyber League Games? First, welcome to the community! CryptoKait shares all the info you’ll need to get started registering and paying for students, as well as where to turn for help if you still have any questions.
Category: Women in IT
Command-line Log Analysis FOR THE WIN (2/3): Walking through “Leaping”
Command-line Log Analysis FOR THE WIN (1/3): How to Approach a Wild Log
Taisa
(First in a three-part series.)
In 2017, Taisa was traumatized by logs. In 2018, she was analyzing logs by hand on a browser-only Chromebook. In 2020, she was #1 on the leaderboard in Log Analysis at the end of the Spring Preseason. Follow her Command-line Log Analysis blog series to find out which tools she used and how she did it—and how you can, too!
Who Should Play the NCL CTF and Why?
Hush1e
Do other cybersecurity competitions make you feel like you just stumbled into a crowded room with toilet paper hanging off your shoes? That won't happen here. Hush1e talks about the diverse community of NCL players, where we all go to find support, and what all of us (including you!) gain from playing together, regardless of skill level.
Google-Fu: A Tour of Google Dorking
JeanaByte
You may have heard someone brag about their "Google-Fu" skills before and assumed they were just being funny, but, as JeanaByte demonstrates, a powerful art known as "Google dorking" does indeed exist, and it can be used for good or for bad—and for the Open Source Intelligence domain of the NCL Games. Please query responsibly!
Low-tech Tooling: Competing From a Device You Can’t Install Tools On
Taisa
Taisa played her first season of NCL entirely from a browser-only device and shares her top resources and tricks for competing in less-than-ideal circumstances. Even if you've got Kali running as a VM, low-tech and browser-based tools can be a great way to check your work, troubleshoot your process, or collaborate with teammates in the cloud.
What is HTTP Request Smuggling and Why Do I Care?
WebWitch
WebWitch examines the reemergence of HTTP Request Smuggling as an allegory for the dangers of making assumptions about older programs and protocols when the cybersecurity landscape is constantly shifting. Their perspective on research topics in cybersecurity (and the Oxford comma) will help you start thinking like a seasoned professional.
How Setting Up a Virtual Machine and Navigating Through It Can Help You with NCL
FiFi aka "ZeroTrail"
Using Kali Linux on a virtual machine is recommended by the NCL Game-makers(*), but why? ZeroTrail explains the perks of VMs, where to go for help setting yours up, which tools are off-limits during the Games, and which tools and operating systems will serve you the most—not only in the NCL Games, but in your future career as a cybersecurity pro!
How Playing War Games Can Help You Learn Command Line
FiFi aka "ZeroTrail"
You want to develop your skillz, but you aren't sure where to start. Maybe starting with a competition like NCL is intimidating. Did you know there are games you can play on your own, before the NCL Games begin? ZeroTrail advocates for war games as the best way for beginners to learn command line and for experts to hone their skills!
What Are the NCL Power Rankings?
Hush1e
Wondering how your school performed overall? Take a gander at the National Cyber League Power Rankings—the leaderboard for schools! Hush1e demystifies what the scores mean, how they're calculated, and how to not get yeeted from the board.
You must be logged in to post a comment.