To see this in HTML format, visit this page.
Module | Challenge | Difficulty | Tools | Guide |
---|---|---|---|---|
OSINT | Meta | Easy | metadata2go | NCL Guide |
OSINT | Lookup | Easy | NCL Guide | |
OSINT | Threat Intel | Easy | Wikipedia | NCL Guide |
OSINT | HTTP Headers | Easy | Wikipedia | NCL Guide |
OSINT | SSL | Medium | Online Barcode Reader | NCL Guide |
OSINT | Barcode | Medium | NCL Guide | |
Cryptography | Crypto 1 | Easy | RapidTables,CyberChef | NCL Guide |
Cryptography | Crypto 2 | Easy | Rot13, CyberChef | NCL Guide |
Cryptography | Crypto 3 | Easy | Rumkin,CyberChef | NCL Guide |
Cryptography | Crypto 4 | Easy | Morse Code Translator,CyberChef | NCL Guide |
Cryptography | Crypto 5 | Medium | dCode,CyberChef | NCL Guide |
Cryptography | Crypto 6 | Medium | dCode, CyberChef | NCL Guide |
Cryptography | Stego 1 | Easy | strings, grep | NCL Guide |
Cryptography | Stego 2 | Medium | Digital Invisible Ink Toolkit, file | NCL Guide |
Cryptography | Stego 3 | Hard | Digital Invisible Ink Toolkit, Hieroglyph Converter | NCL Guide |
Cryptography | Stego 4 | Hard | Digital Invisible Ink Toolkit, Futurama Converter | NCL Guide |
Password Cracking | Cracking 1 | Easy | hashcat, RockYou wordlist | NCL Guide |
Password Cracking | Cracking 2 | Medium | hashcat | NCL Guide |
Password Cracking | Cracking 3 | Medium | hashcat, Pokemon wordlist | NCL Guide |
Password Cracking | Cracking 4 | Medium | ophcrack, XP special wordlist | NCL Guide |
Password Cracking | Cracking 5 | Hard | hashcat, Law and Order: SVU wordlist | NCL Guide |
Log Analysis | SSH | Easy | NCL Guide | |
Log Analysis | Nginx | Medium | cat, cut, sort, uniq, wc, grep | NCL Guide |
Log Analysis | History | Medium | sqlite3 | NCL Guide |
Log Analysis | Squid | Hard | Epoch Converter, cat, awk, sort, uniq | NCL Guide |
Network Traffic Analysis | DNS | Easy | Wireshark | NCL Guide |
Network Traffic Analysis | FTP Traffic | Easy | Wireshark | NCL Guide |
Network Traffic Analysis | HTTP | Easy | Wireshark, Online MD5 | NCL Guide |
Network Traffic Analysis | Telnet | Easy | Wireshark | NCL Guide |
Network Traffic Analysis | Pandora | Hard | Wireshark | NCL Guide |
Wireless Access Exploitation | PCAP 1 | Easy | aircrack-ng, Wireshark | NCL Guide |
Wireless Access Exploitation | PCAP 2 | Medium | aircrack-ng | NCL Guide |
Wireless Access Exploitation | PCAP 3 | Hard | aircrack-ng, Wireshark | NCL Guide |
Forensics | Version Control | Easy | unzip, ls, git | NCL Guide |
Forensics | File Carving | Medium | file, binwalk, tar | NCL Guide |
Scanning | nmap | Easy | nmap | NCL Guide |
Scanning | Hidden Files | Medium | Dirbuster, directory-list-2.3-Medium.txt wordlist | NCL Guide |
Web Application Exploitation | egov | Easy | Chrome Developer Tools | NCL Guide |
Web Application Exploitation | Metro Lottery | Medium | Chrome Developer Tools | NCL Guide |
Web Application Exploitation | Metro Clinic | Hard | SQL Injection | NCL Guide |
Enumeration & Exploitation | Python 1 | Easy | NCL Guide | |
Enumeration & Exploitation | Python 2 | Easy | uncompyle | NCL Guide |
Enumeration & Exploitation | Python 3 | Medium | uncompyle | NCL Guide |
Enumeration & Exploitation | Binary 1 | Medium | Ghidra | NCL Guide |
Enumeration & Exploitation | Binary 2 | Hard | gdb | NCL Guide |