Skip to content

National Cyber League

Open Source Intelligence

Utilize publicly available information such as search engines, public repositories, social media, and more to gain in-depth knowledge on a topic or target.

Cryptography

Identify techniques used to encrypt or obfuscate messages and leverage tools to extract the plain text.

Log Analysis

Utilize the proper tools and techniques to establish a baseline for normal operation and identify malicious activities using log files from various services.

Network Traffic Analysis

Identify malicious and benign network traffic to demonstrate an understanding of potential security breaches.

Scanning

Identify and use the proper tools to gain intelligence about a target including its services and potential vulnerabilities.

Forensics

Utilize the proper tools and techniques to analyze, process, recover, and/or investigate digital evidence in a computer-related incident.

Password Cracking

Identify types of password hashes and apply various techniques to efficiently determine plain text passwords.

Enumeration and Exploitation

Identify actionable exploits and vulnerabilities and use them to bypass the security measures in code and compiled binaries.