The following is my informal list of the topics I attempt to cover with my students before they begin the National Cyber League Games. These are the foundational skills they will need to navigate the competition without learning challenge by challenge. This is not a comprehensive list. This is only what I attempt to cover at a very introductory level before the first competition. The goal should be to create familiarity over mastery so the student can explore and develop their own mastery during the competition.
Building Virtual Machines
- Win7
- Kali-Linux
Open Source Intelligence
- Threat Intel
- Google It!!
- Email Header
- Easy Random Skill You Probably Already Have!)
- Metadata
- Viewing and Extracting Metadata
- Certificate Request
- How to Handle an Unknown File Extension
Cryptography
- Numeric-based Crypto
- Binary
- Octal
- Decimal
- Hexadecimal
- Alphanumeric
- Base-64
- Historical Cryptography
- Substitution
Cesarean Shift (Easiest)
Atbash (Reverse Alphabet)
Morse Code (dots and dashes)
Vigenere (recognized by secret word, phrase, key, etc.)
Symbolic Substitution - Transposition
Columnar
Transposition
- Substitution
Log Analysis
- History
- Having the right tool
- How to Handle an Unknown File Extension
- NGNIX
- Use What You Know! (Format data using Excel if that’s all you know!)
Password Cracking
- Having the right tool
- Cain
- John the Ripper
- Hascat
- Many Many Many options
- Using a Pre-made Wordlist
- Creating an Enumerated Wordlist
- Use What You Know! (Format data using Excel if that’s all you know!)
- Crunch Wordlist Generator
- Creating a Wordlist Using a Database
Network Traffic Analysis
- Having the right tool
- Introduction to Wireshark
- Introduction to Network Miner
Wireless Access Exploitation
- Having the right tool
- Introduction to Wireshark
- Introduction to Aircrack-ng
Scanning
- Having the right tool
- Introduction to Nmap
- Introduction to WPScan
- Introduction to Dirbuster