Open Source Intelligence
Cryptography
Kali Commands
Wild Card
NCL Topics
100

What port does BGP use?

179

100

What type of cipher is the Cesaer cipher?

Substitution cipher

100

What does the "grep" command do?

Used to search text or search the given file for lines containing a match to the given strings or words

100

When does the 2020 Spring Season Registration of NCL start?

February 10

100

Name three topics that are in the individual game

Open source intelligence, cryptography, scanning, log analysis, network traffic analysis, wireless exploitation, web application exploitation, and enumeration & exploitation 

200

What port does Microsoft Remote Desktop require to be open?

3389

200

What is the sha1 hash of: "large-shake"?

F6B66B08662D7184213F343F2FD774FF1D27878D

200

What type of attack does John the Ripper do?

Dictionary attack

200

Samy is my...

Samy is my hero, cross-site scripting worm

200

What are the three brackets you will be placed into after completing the preseason?

Gold, silver, or bronze

300

0x93 ^ 0x96

5

300

Decode: V2hhdCBpcyB0aGUgYmVzdCB0aGluZyBhYm91dCBTd2l0emVybGFuZD8gSSBkb24ndCBrbm93IGJ1dCB0aGUgZmxhZyBpcyBhIGh1Z2UgcGx1cy4=

What is the best thing about Switzerland? I don't know but the flag is a huge plus.

300

Which of the following represents the weakest security setting on a Linux file system? 

* chmod 000

* chmod 444

* chmod 777

* chmod 755

chmod 777

300

Name three different attacks that can be done with Hashcat

Brute-force, Mask, Dictionary, Combination, Hybrid, Rule-based, Toggle-case

300

Who scored first place in the 2019 Spring Individual Game?

Tyler Chong [UHawaii GH] bit.ly/2UnFuP6

400

What is the name of the malware included in CCleaner?

Floxif

400

Decode: FXL-OLJV-4127. It seems to start with SKY

SKY-BYWI-4127

400

What is the format for the John the Ripper command?

john --wordlist=/location/dictionaryList.lst  passwordHere

400

We have intercepted an email sent between hackers. What version of MIME is being used?

Link: https://drive.google.com/file/d/1leKG3ZdIKxJtjNqQ1LMDQdzYt2QqNGtl/view

1.0

400

Who is a well known NCL ambassador and created questions for the 2019 Fall season in open source intelligence?

Crypto Kait

Quick Note: Her blog is a great resource

500

What programming language is StrongIntro's server written in?

Javascript

500

==============

|    1   2   3   4   5   6|

|1   0  1   2   3   4   5|

|2   6  7   8   9   A   B| 

|3   C  D   E   F   G  H|

|4   I   J   K   L   M   N|

|5   O  P  Q   R   S   T|

|6   U  V  W   X  Y   Z|

==============

=====MESSAGE==========================

54 33 33 65   52 65   42 21   54 15 64 45 15 33    55 65 45 33 33 65

=====END=============================

MEET AT 91 MONROE STREET

Polybius Square

500

You gain this information from a data breach:

Hash:fdsaf87070d98s0af7807as8fd

Password length: 8 characters

First four characters are "Feli"

Last four characters are numbers


How would you write the Hashcat command for this?

Hint: You have done this in NCL

hashcat -m 0 -a 3 fdsaf87070d98s0af7807as8fd "Feli" ?d?d?d?d --show

500

We have intercepted an email sent between hackers. What is the sender's email address? What day of the week was the message received?

Link: https://drive.google.com/file/d/1leKG3ZdIKxJtjNqQ1LMDQdzYt2QqNGtl/view

gh0st@hacknet.cityinthe.cloud

500

What is the number one thing you should never do?



Hint: It involves flags

NEVER SHARE FLAGS