Tag Archives: Cyber Security

CYBER.ORG 4.1.1 & 4.1.3 – Shell and Script Environments and Network Reconnaissance and Discovery

Objective: Given a scenario, the student will use the appropriate
tool to assess organizational security.

Resources:

  • See PowerPoint presentation: 4.1.1 – Network Reconnaissance and Discovery Tools and 4.1.3 – Shell and Script Environments

Assignment:

  1. Download and read the 4.1.3. – Shell and Script Environments presentation to learn about the different interfaces available within Linux.
  2. Next, download and read the 4.1.1 – Network Reconnaissance and Discovery Tools presentation to get details about the many network discovery tools available within Kali Linux. This lesson includes a sampling of the most basic command line tools used in cybersecurity. This is not an exhaustive list, only a starting point.
  3. We will be using the information in these presentations in a series of labs that will be issued next week.

Assigned: September 28th, 2022
Teacher Pacing Due Date: September 30th, 2022

CYBER.ORG – LAB – LINUX 101

Objective:

Students will begin preparing for proficiency in cyber security with an overview of Linux fundamentals and advanced commands.

Resources:

  • See PowerPoint presentations: Lab – Linux 101

Assignment:

  1. Read the Lab – Linux 101 to review fundamental Linux commands within the Linux operating system.
  2. Use the Terminal app in your Kali Linux installation to follow along with the presentations, and practice or test the commands as you read about them.
  3. Familiarize yourself with the commands presented in preparation for the Linux quiz coming up on Tuesday the 20th.

Assigned: September 12th, 2022
Teacher Pacing Due Date: September 13th, 2022

NETWORKING AND OPERATING SYSTEMS 1H FINAL CHALLENGE – Spring 2022

Objective:

Demonstrate proficiency in Cybersecurity Principles through completion of a final comprehensive assessment.

Resources:

Assignment:

  • The Final Challenge will be an open-form Flag Capture competition held within the Cloud CTF environment within the US Cyber Range website.
  • Log in to the US Cyber Range website and navigate to the Cloud CTF environment. The challenge will open at 1:00pm MST on Monday, May 9th and will continue until 3pm on Thursday, May 12th. Click the Start button to begin the challenge.
  • The Challenge will be open continuously until 3pm on Thursday, May 12th, and can be accessed from any web browser. You may take any opportunity inside and outside of class to complete challenges and earn points up to and until the 3pm close on Thursday.
  • This is an open-resource exam. You may use any resources that you have available to you (including each other!) to solve the challenges.
  • Each challenge has a point total associated with it. Easy challenges are worth lower points, and more difficult challenges are worth more points. Your goal is to achieve a minimum of 625 points before the Challenge closes at 3pm on Thursday, May 12th.
  • The challenges will cover many of the topics that we have covered throughout the class, including Cryptography, Networking, Online Reconnaissance, Linux scripting, and Website hacking.
  • Please bear in mind that 625 points is the minimum score, and as such, will result in a minimal passing grade. The final grades will be issued based on a curve according to the highest score in the class.
  • To sweeten the deal, the highest scoring student at the close of the Challenge will receive the Grand Prize: Lunch ordered in from their choice of restaurants on Friday, May 13th. (The last day for seniors!)
  • This is your opportunity to demonstrate the skills that you have acquired throughout the Networking and Cybersecurity sections of our class, and is a much more accurate demonstration of your skill than any multiple choice test could produce. Use your skills and your time wisely, and do not give up when the challenges become difficult: You have the tools and the talent to succeed. Good luck!

Assigned: May 9th, 2022
Teacher Pacing Due Date: May 12th, 2022

National Cyber League Final Game: The Team Game

Objective: 

Students will form a team and use their collective knowledge and training to compete in the NCL Team Game.

Links:

Topics Discussed:

  • Cyber Security
  • National Cyber League
  • NCL Spring Season
  • Team Game

Assignment:

The Final Game: Team Game Play

Real-world cybersecurity work is often done in teams. The NCL Team Game provides a safe and challenging environment for players from the Individual Game to apply their knowledge and skills in a team setting.

The Team Game is where you compete with the other members of your team against all the other teams in NCL, even other teams from your school. Performance in the Team Game is used to calculate your school’s Cyber Power Ranking. You may receive assistance from members of your team but may not receive assistance from anyone else. No flag-sharing with other teams allowed. Each team may have up to 7 Student Players and do not need to be from the same school. Team Game roster sign up must be completed prior to the Team Game setup deadline.

The team game requires players to work together to solve real problems, with real deadlines, under time (and in some cases) technical and resource constraints.

All registered student players are eligible to play in the Team Game; Preseason participation is not required.

You will need to arrange and setup your own teams. As a coach, I have no involvement or ability to set up or configure teams. You can set up your team roster here. Setup must be completed by April 22nd at 9:59 AM Local Time or you will not be able to participate.

  1. Students who are creating a team can do so here: https://cyberskyline.com/events/ncl/register/team.
    After they create the team, they will be given a link to give to players (up to 7) they want on their team.
  2. Students who are joining a team will need to obtain the team joining link from the person who created the team. Once they visit the link and confirm, they will be part of the team. 
  3. Students may form teams of up to 7 players. While students may form their own team and play the game solo, this is highly discouraged, as it will limit your ability to earn points, and will likely result in a poor grade for this final assessment project. Please complete your team setup by April 25th at 8:59 p.m. local time.
  4. The Team Game is a mandatory weekend game. The Team Game starts at 10:00 a.m. local time on Friday, April 22nd and ends at 6:00 p.m. local time on Sunday, April 24th.
  5. As in the Individual Game, you are urged to continue to advance through the challenges over the weekend. Do not forget that you can log into the NCL Stadium from any device with an Internet connection, and you may use the tools in the Kali Linux workstation provided at https://uscyberrange.org to solve the challenges.
  6. It is recommended that you continue with the competition over the weekend and get as far as you can to achieve the best results, especially if you did not participate in the Individual Game. This will be your last opportunity to receive points for participation in the NCL Competition.

Please mark your calendars, and plan and prepare accordingly as this Team Game will represent the final Assessment grade before the Final Exam for this final term.

Assigned: April 11th, 2022
Teacher Pacing Due Date: April 22nd, 2022

National Cyber League Resources: Hacksplaining

Objective: 

Students will begin preparing for competition in the National Cyber League by familiarizing themselves with known vulnerabilities faced by software developers.

Links:

Topics Discussed:

  • Cyber Security
  • NIST
  • National Vulnerability Database
  • CVE (Common Vulnerabilities and Exposures) Database

Assignment:

  1. Visit the Hacksplaining website and create a login using your haydenmagnet.org email account.
  2. Hacksplaining offers hands-on interactive simulations of hacks that exploit known vulnerabilities in many widely used applications and programming languages.
  3. Each module contains three parts: Exercise, Prevention and Quiz. Complete the exercise to see how the hack is performed. Review the prevention information to learn more about the exploited vulnerability and effective methods of protection. Complete the quiz to confirm your understanding and complete the module.
  4. Take a screenshot of your passing quiz grade for each module to provide verification that you have completed the module. Save all these screenshots in a folder, as you will need to submit them in a Google Doc to receive credit for this project.
  5. There are twenty-five modules in total. You have this week and next week to complete all the modules.
  6. Submit a Google Doc containing screenshots of your passing grades for all 25 module quizzes to today’s Google Classroom assignment post by end of day on Friday, March 29th.

Assigned: March 14th, 2022
Teacher Pacing Due Date: March 28th, 2022

National Cyber League Resources: Cryptography Links – Spring 2022

Objective: 

Students will continue preparing for competition in the National Cyber League by familiarizing themselves with common cryptographic methods so that they can effectively identify and decrypt encrypted messages and data.

Topics Discussed:

  • Cryptography
  • Ciphertext
  • Plaintext

Links:

This list is maintained as a resource for students competing in the National Cyber League competition to assist in identification and solution of the presented Cryptography puzzles. If you find any good online Cryptography resources in your travels, let me know and I will add them to the list!

Cryptii  A very cool and very fast “modular” decryption tool that lets you run a string of text through several encryption/decryption methods of your choice.

Dcode.fr  An outstanding French website that offers automatic decoding for a large variety of encryptions. Features include a powerful cipher identifier (that automatically recognizes more than 200 ciphers), decoding tools for the Caesar cipherVigenere cipherPolybius’ square, and dozens of other encryptions.

The Black Chamber  A great collection of interactive tools that explain and allow you to decrypt a variety of common (and some uncommon) encoding schemes.

Tools for Noobs: Online Decryption Tool – Decrypts a string using various algorithms (e.g. Blowfish, DES, TripleDES, Enigma).

MD5hashing.net Encryption and Decryption – At md5hashing.net you can hash (encrypt) any string into 66 different hash types. As you probably know – decryption of any hash is impossible, but they offer reverse decryption via our database (~1000M records, and counting).

Splitbrain.org Encoding/Decoding Tools This tool helps you to quickly run some text through various different encoding/decoding functions available in PHP. Great for a lot of different decoding possibilities rapidly

CodeBeautify.org Encryption/Decryption Tool – A nice, clean tool for decrypting codes that you know the key for, or encrypting codes with your own original key.

SQLite Viewer for Chrome – Chrome plugin for viewing SQLite databases in your browser. Allows opening and editing of SQLite databases without requiring admin access to install.

Posted: February 17th, 2022

Welcome to CyberStart America!

Objective: 

Students will begin preparing for competition in the National Cyber League by participating in CyberStart America, an immersive cybersecurity training game for high school students.

Links:

Topics Discussed:

  • Cyber Security
  • CyberStart America

Assignment:

  1. Welcome back! I hope your holidays were happy and restful! We are going to switch gears as we work towards competition in the National Cyber League and/or Security + Certification at the end of the month.
  2. In the interest of providing you with more hands-on experience with cybersecurity concepts, I am pleased to introduce CyberStart America, an immersive cybersecurity training game for high school students, where you will take the role of an agent with the “Cyber Protection Agency” and solve challenging puzzles based on real-world situations that you might face as a cybersecurity professional.
  3. Visit the CyberStart America website and register for a free account using your haydenmagnet.org email address. You will need to access your haydenmagnet.org Gmail, as the website sends several confirmation emails in sequence. Be sure to keep your Gmail open until you receive the third confirmation email that allows you to set a password before you proceed with the challenges.
  4. Start with the Intern Base to get a feel for what it’s like to work in cybersecurity. You may work at your own pace, and even work from home if you choose to do so. Remember that these challenges start easy and get harder as you progress, so don’t skip forward too far!
  5. Are you completely confused by any particular challenge? Consult the Field Manual! Click the “Field Manual” link in the upper left corner of the website to view background info on the concepts presented in the challenges, and even watch walkthrough videos (Chapter 07) if you’re completely stumped.
  6. You may work at your own pace, and use any resources that you have available to you to complete the challenges (even other students!)
  7. Do you want to work together with a partner or squad up with a group? Click on the “Groups” link at the top of the page, and click “Create Group” to get a group code that you can share with your crew to squad up and tackle the challenges as a team!
  8. Make sure you join my “NetOp P6” group so I can track your progress, as well. See me for the Join code if you haven’t joined already.
  9. We will continue working with CyberStart America for the next three weeks. At the end of the three weeks, I will buy lunch for the individual or team with the highest point total. Grind solo and get all the food for yourself, or choose your teammates wisely and have a victory feast with your friends!
  10. Good luck, and have fun with the challenges! Bear in mind that the National Cyber League competition will begin at the end of the month. Those who are not studying for Security + certification will begin practicing in the NCL Gym when our accounts become available.

Assigned: January 4th, 2022
Teacher Pacing Due Date: January 21st, 2022

CYBER.ORG – 2.8.6 – Steganography CASE STUDY

Objective:

Summarize the basics of cryptographic concepts.

Resources:

  • See PDF Document: Case Study – Steganography.pdf

Assignment:

  1. Begin reading the Case Study – Steganography.pdf document and be prepared to answer the questions at the end.
  2. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  3. Please do your best to complete this Case Study by the end of the day today, Thursday, November 13th.
  4. Check your Synergy to ensure that you have received credit for all assignments that you have turned in before tomorrow’s three-week grade report.

Assigned: November 13th, 2021
Teacher Pacing Due Date: November 13th, 2021

CYBER.ORG – 2.8.5 – Block Ciphers and Lightweight Cryptography, 2.8.6 – Steganography and Homomorphic Encryption

Objective:

Summarize the basics of cryptographic concepts.

Resources:

  • See PowerPoint presentations: 2.8.5 – Block Ciphers and Lightweight Cryptography, 2.8.6 – Steganography and Homomorphic Encryption

Assignment:

  1. Read the 2.8.5 – Block Ciphers and Lightweight Cryptography.pptx presentation. This lesson will introduce you to cryptographic methodologies and discuss their benefits and drawbacks.
  2. Next, read the 2.8.6 – Steganography and Homomorphic Encryption.pptx presentation. This lesson will introduce you to the concept of Steganography, which we will be working with for the next couple of class meetings.
  3. Please read through both of these by the end of the day on Monday, November 15th, as we will be performing a Steganography Lab in class tomorrow.

Assigned: November 15th, 2021
Teacher Pacing Due Date: November 15th, 2021

CYBER.ORG – 2.8.3 Quantum Cryptography and Ephemeral Keys & 2.8.4 Cryptography Modes of Operation and Blockchains

Objective:

Summarize the basics of cryptographic concepts.

Resources:

  • See PowerPoint presentations: 2.8.3 Quantum Cryptography and Ephemeral Keys.pptx, 2.8.4 Cryptography Modes of Operation and Blockchains.pptx

Assignment:

  1. Read the 2.8.3 Quantum Cryptography and Ephemeral Keys.pptx presentation. This lesson will introduce you to Quantum Cryptography, Ephemeral Keys and their importance in securing data.
  2. Next, read the 2.8.4 Cryptography Modes of Operation and Blockchains.pptx presentation. This lesson will introduce you to Cryptography modes and the concept of a Blockchain.
  3. Please read through both of these by the end of the day on Thursday, November 4th.

Assigned: November 4th, 2021
Teacher Pacing Due Date: November 4th, 2021