All posts by mistermarmolejo

National Cyber League Resources: Cryptography Links

Links:

Decode Ingress – A list of tools that can help you with decoding  passcodes, originally provided for use with the AR game Ingress. Tools for text manipulating, basic conversions like text to ASCII, HEX to Base64. Tools to decipher Morse code.  Good Image exif info grabbers, and image editing tools for Steganography puzzles (messages hidden in digital images). A range of great info and tools about various ciphers, and their implementations.

Tools for Noobs: Online Decryption Tool – Decrypts a string using various algorithms (e.g. Blowfish, DES, TripleDES, Enigma).

Rumkin Deciphering Tools – This is a page dedicated to simple text manipulation tools, which all can be replicated with just paper and pencil. An amazing resource for deciphering methods, including many that we will definitely encounter in NCL puzzles (Atbash, Railfence and Vigenere).

MD5hashing.net Encryption and Decryption – At md5hashing.net you can hash (encrypt) any string into 66 different hash types. As you probably know – decryption of any hash is impossible, but they offer reverse decryption via our database (~1000M records, and counting).

Splitbrain.org Encoding/Decoding Tools This tool helps you to quickly run some text through various different encoding/decoding functions available in PHP. Great for a lot of different decoding possibilities rapidly

CodeBeautify.org Encryption/Decryption Tool – A nice, clean tool for decrypting codes that you know the key for, or encrypting codes with your own original key.

SQLite Viewer for Chrome – Chrome plugin for viewing SQLite databases in your browser. Allows opening and editing of SQLite databases without requiring admin access to install.

National Cyber League Week 2: The Regular Season Game

Objective: 

Students will use their accumulated knowledge and training to compete in the NCL Regular Season Game.

Links:

Topics Discussed:

  • Cyber Security
  • National Cyber League
  • NCL Spring Season
  • Regular Season
Assignment:
  1. The Regular Season Game will open at 11am MST on Friday, April 13th, and remain open until 7pm MST on Sunday, April 15th.
  2. Continue your training in the Gym to prepare for the Regular Season competition on Friday.
  3. Remember that Friday is a short day, due to the Spring Sports Assembly schedule. We will begin the Regular Season Game as soon as class begins, and get as far as we can. You are more than welcome to stay for lunch to continue the competition, if you choose to do so. My room will also be open during 8th hour, if you wish to come back to continue the competition.
  4. If you do not finish the competition during class time (and it is highly likely that you will not), please continue to advance through the challenges over the weekend. Do not forget that you can log into the NCL Stadium from any device with an Internet connection, but you may need tools available on a Windows or Linux workstation to solve some of the challenges. It is recommended that you continue with the competition over the weekend and get as far as you can to achieve the best result in your final Scouting Report.

The Big Game: Regular Season Play
The Regular Season Game is a three-day mandatory game. You must participate in the Regular Season in order to receive an NCL Scouting Report. The Regular Season Game starts at 11:00 am MST on Friday, April 13th and ends at 7:00 p.m. MST on Sunday, April 15th.

This is the big game – the one we’ve been preparing for. Get a good night’s rest, eat your Wheaties (or Lucky Charms, if that’s how you roll), and be here at 10:15am on Friday to get logged in to the NCL Stadium, and be ready to compete. Use all your knowledge, training and skills to do your very best, and we’ll discuss the results after this weekend. Good luck, and may the Force be with you! Always.

Assigned: April 9th, 2018
Teacher Pacing Due Date: April 15th, 2018

National Cyber League Week 1: Gym Training

Objective: 

Students will begin preparing for competition in the National Cyber League by familiarizing themselves with the competition rules and procedures through training in the NCL Gym.

Links:

Topics Discussed:

  • Cyber Security
  • National Cyber League
  • NCL Spring Season
  • Preseason
  • Regular Season
  • Postseason
Assignment:
  1. The NCL Gym is open now. The NCL Gym provides practice challenges to help prepare players for Preseason, Regular Season and Postseason. While practicing in the NCL Gym, access the solutions guide to receive step-by-step instructions to help you understand the more difficult challenges.
  2. Log into the Gym
  3. Read the FAQ – you need to know the NCL lingo
  4. Mark your calendars with the following important NCL Preseason and Regular season dates:
    1. 3/30 – 5/25: Gym Training
    2. 4/4 – 4/10: Preseason Game
    3. 4/13 – 4/15: Regular season Game
    4. 4/27 – 4/29: Postseason Game

The First Game: Preseason Play
The Preseason is a week-long mandatory game. You must participate in the Preseason in order to receive an NCL Scouting Report. The Preseason gameplay starts at 1:00 p.m. ET on April 4th and ends at 9:00 p.m. ET on April 10th.

There are lots of preparatory materials available. Also, be sure to read about the Bracketing system, which the Preseason game determines, as well as the Ethical Behavior/Rules of Conduct.

Assigned: April 2nd, 2018
Teacher Pacing Due Date: April 4th, 2018

Cyber Warfare Boot Camp – Week 7: Wireshark Packet Analysis

Objective: 

Students will continue preparing for proficiency in cyber security with an introduction to the basics of packet analysis in the Wireshark application.

Links:

Topics Discussed:

  • Kali Linux
  • Wireshark
  • Packet Analysis
  • Wireshark Configuration
Assignment:
  1. Today we are going to start working with Wireshark – a powerful packet collection and analysis tool that is free to download and pre-installed in the Kali Linux distribution.
  2. Watch Hansang Bee’s Intro and About the Wireshark Environment video to get a basic idea of how the Wireshark interface works, and a few tips on how you can configure the Wireshark GUI to meet your specific needs and preferences.
  3. We will be using this and other videos to gain a familiarity with the Wireshark environment, and look at the methods and construction of network packets, so we can begin to develop “the eye” for packet formation and transmission anomalies.
Assigned: February 28th, 2018
Teacher Pacing Due Date: March 2nd, 2018

Cyber Warfare Boot Camp – Week 7: Network Troubleshooting in Linux

Objective: 

Students will continue preparing for proficiency in cyber security by reviewing networking fundamentals.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Network Configuration
  • Network Interfaces
  • Network Manager
  • route Command
  • dhclient Command
  • ARP
Assignment:
  1. Visit the Linux Journey website and scroll down to the “Networking Nomad” section. Click on the “Troubleshooting” item.
  2. Today we will look at common networking tools that will not only help you diagnose and troubleshoot network issues in Linux, but will also help you identify potential attack vectors and points of ingress on your own (and others’) networks!
  3. We will get into the lab later this week, as many of these commands will not work in Webminal. (With good reason!)
Assigned: February 20th, 2018
Teacher Pacing Due Date: February 23rd, 2018

Cyber Warfare Boot Camp – Week 5: Network Config in the Linux CLI

Objective: 

Students will continue preparing for proficiency in cyber security by reviewing networking fundamentals.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Network Configuration
  • Network Interfaces
  • Network Manager
  • route Command
  • dhclient Command
  • ARP
Assignment:
  1. Visit the Linux Journey website and scroll down to the “Networking Nomad” section. Click on the “Network Config” item.
  2. Network Configuration is how you set up your network. In Windows, much of this is done for you by the OS. Linux will do this for you if you want it to, but if you want to get hands-on with the interfaces and routing options, then there are many tools within the CLI that will let you do so.
  3. Read through the module to discover how to view and manipulate network interfaces, routing tables, DHCP leases, ARP caches and view network settings using the Network Manager tool.
  4. Don’t forget to get signed out for Advisory tomorrow to participate in the AZ Cyber Warfare Range hacking activity with David Hernandez! It’s going to be a 90 minute activity, so you’ll want to get started during Advisory to participate in the whole thing!
Assigned: February 14th, 2018
Teacher Pacing Due Date: February 15th, 2018

Cyber Warfare Boot Camp – Week 5: Routing

Objective: 

Students will continue preparing for proficiency in cyber security by reviewing networking fundamentals.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Routing
  • Switching
  • Flooding
  • Routing Table
  • Routing Protocols
Assignment:
  1. Visit the Linux Journey website and scroll down to the “Networking Nomad” section. Click on the “Routing” item.
  2. Routers are the “traffic cops” or “post office” of networks, depending on what metaphor you choose to follow.
  3. Read the information provided on the Linux Journey website to discover how routers work, learn the difference between routers, switches and hubs, and learn about the routing protocols that determine how a packet gets from one host to another in the shortest amount of time.
Assigned: February 12th, 2018
Teacher Pacing Due Date: February 13th, 2018

Cyber Warfare Boot Camp – Week 4: Subnetting

Objective: 

Students will continue preparing for proficiency in cyber security by reviewing networking fundamentals.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Subnetting
  • Subnet Mask
  • Octet
  • Host
  • IP Address Classes
Assignment:
  1. Visit the Linux Journey website and scroll down to the “Networking Nomad” section. Click on the “Subnetting” item.
  2. Subnetting is one of those things that you do with a calculator in the real world, but you’re not going to be allowed to take a calculator with you if you take a test like the Network+, CySA+ or CCNA exams, so you better learn how to do it on your own.
  3. The “Subnetting” section of the Linux Journey website gives you a quick explanation of what subnetting is, and how it works. It also provides a subnet math cheat method that should get you through most of the problems you’ll encounter. However, if you want a more thorough understanding of how it works (and trust me, you do) visit the Subnetting.net link for further details.
  4. The “How to Subnet” page at Subnetting.net provides a thorough overview of what subnetting is and how it works. If you’re too lazy to read the page (and I know most of you are) you can watch the Subnetting Tutorial video series, and get a full explanation of what subnetting is, how it works, and how to figure out subnets without the need for a calculator.
  5.  With the materials provided here, you should be able to achieve a strong foundation in subnetting, which will allow you to handle a good portion of the questions on the CCNA and Network+ certification exams, as well as have a strong understanding of how packets figure out how to travel from one host to another, even when they’re on very different networks.
Assigned: February 1st, 2018
Teacher Pacing Due Date: February 2nd, 2018

Cyber Warfare Boot Camp – Week 4: Network Basics

Objective: 

Students will continue preparing for proficiency in cyber security by reviewing networking fundamentals.

Links:

Topics Discussed:

  • Network Basics
  • OSI Model
  • TCP/IP Model
  • Network Addressing
  • Application Layer
  • Transport Layer
  • Network Layer
  • Link Layer
  • DHCP Overview
Assignment:
  1. Visit the Linux Journey website and scroll down to the “Networking Nomad” section. Click on the “Network Basics” item. This week we will focus on Networking fundamentals.
  2. Read up on the Network Basics and the OSI model. Much of this will be review from our previous experience in the lab, but we will use this week to go into further detail as to how the different parts of the OSI model work together, and how each part of the process functions to allow machines to communicate with each other.
  3.  On Thursday, we will get into subnetting, which is a way of dividing networks up into smaller groups by address.
Assigned: January 29th, 2018
Teacher Pacing Due Date: February 2nd, 2018

Cyber Warfare Boot Camp – Week 3: Webminal and VIM Tutor

Objective: 

Students will continue preparing for proficiency in cyber security by completing a tutorial on the VIM Text Editor application within the Linux Command Line Interface.

Links:

Topics Discussed:

  • Linux
  • GUI
  • CLI
  • Shell
  • bash
  • Prompt
  • Input/Output
  • VIM text editor
Assignment:
  1. Visit Webminal.org, and log in using the account that you created last week.
  2. By now you should have completed lessons 1 through 5, and should have a basic understanding of how to navigate, create and manipulate files and directories, and manipulate system processes within the Linux CLI.
  3. This week, we are going to further investigate the manipulation of text files within the Linux CLI by using the first of two very popular text editors built into Linux: VIM
  4. Log into Webminal.org and type “vimtutor” at the command prompt.
  5. Complete the VIM Tutorial. There are seven lessons in the tutorial, and upon completion, you should have a basic understanding of how to create, edit and save files, as well as get additional help in VIM.
  6. You should be able to complete all seven lessons by the end of this week. Pace yourself accordingly.
Assigned: January 22nd, 2018
Teacher Pacing Due Date: January 26th, 2018