0% found this document useful (0 votes)
64 views8 pages

NCL Sample Scouting Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views8 pages

NCL Sample Scouting Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

The National Cyber League Student Player

A Community Where Cybersecurity Is a Passion


[email protected]

NCL Individual Game Scouting Report


Dear Student Player,

Thank you for participating in the National Cyber League (NCL) Season! Our goal is to prepare the next generation of
cybersecurity professionals, and your participation is helping achieve that goal.

The NCL was founded in May 2011 to provide an ongoing virtual training ground for collegiate students to develop,
practice, and validate their cybersecurity skills in preparation for further learning, industry certifications, and career
readiness. The NCL scenario-based challenges were designed around performance-based exam objectives of
CompTIA certifications and are aligned to the National Initiative for Cybersecurity Education (NICE) Cybersecurity
Workforce Framework published by the National Institute of Standards and Technology (NIST).

As you look to a future career in cybersecurity, we hope you find this report to be valuable in both validating skills and
identifying areas for improvement across the nine NCL skills categories. You can use this NCL Scouting Report to:
Validate your skills to employers in any job application or professional portfolio;
Show case your achievements and strengths by including the Score Card view of your performance as part of your
résumé or simply sharing the validation link so that others may view the detailed version of this report.

This NCL Season had 7,200 students/players and 491 faculty/coaches from more than 500 two- and four-year schools
& 70 high schools across all 50 U.S. states registered to play. The Individual Game Capture the Flag (CTF) event took
place from October 22 through October 24. The Team Game CTF event took place from November 5 through
November 7. The games were conducted in real-time for students across the country.

NCL is powered by Cyber Skyline's cloud-based skills evaluation platform. Cyber Skyline hosted the
scenario-driven cybersecurity challenges for players to compete and track their progress in real-time.

To validate this report, please access: cyberskyline.com/report/SAMPLE_REPORT

Based on the the performance detailed in this NCL Scouting Report, you have earned 9 hours of
Continuing Education Units (CEUs) as approved by CompTIA. You can learn more about the NCL -
CompTIA alignment via nationalcyberleague.org/comptia.

Congratulations for your participation in the NCL Individual Game! We hope you will continue to develop your
knowledge and skills and make meaningful contributions as part of the Information Security workforce!

David Zeichick
NCL Commissioner

NATIONAL CYBER LEAGUE SCORE CARD


NCL INDIVIDUAL GAME
YOUR TOP CATEGORIES 69.1%
NATIONAL RANK ACCURACY
SCANNING &
361 ST PLACE RECONNAISSANCE LOG ANALYSIS
98TH PERCENTILE 96TH PERCENTILE ENUMERATION &
OUT OF 6474 EXPLOITATION Average: 65.3%
PERCENTILE 96TH PERCENTILE
cyberskyline.com/report
95TH ID: SAMPLE_REPORT

Learn more at nationalcyberleague.org | Get in touch with us via [email protected]


The National Cyber League Student Player
A Community Where Cybersecurity Is a Passion
[email protected]

NCL Individual Game


The NCL Individual Game is designed for student players nationwide to compete in realtime in the categories listed below.
The Individual Game evaluates the technical cybersecurity skills of the individual, without the assistance of others.

361
NATIONAL RANK
ST PLACE
OUT OF 6474 1815
PERFORMANCE SCORE
POINTS
OUT OF
3000 69.1%
ACCURACY
71.2%
COMPLETION

95 th National
Percentile Average: 698.4 Points Average: 65.3% Average: 31.0%

Cryptography 200
POINTS
OUT OF 80.0% COMPLETION: 75.0%
330 ACCURACY
Identify techniques used to encrypt or obfuscate messages and leverage tools to
extract the plaintext.

Enumeration & Exploitation 200


POINTS
OUT OF 66.7% COMPLETION: 66.7%
320 ACCURACY
Identify actionable exploits and vulnerabilities and use them to bypass the
security measures in code and compiled binaries.

Forensics 200
POINTS
OUT OF 100.0% COMPLETION: 80.0%
300 ACCURACY
Utilize the proper tools and techniques to analyze, process, recover, and/or
investigate digital evidence in a computer-related incident.

Log Analysis 285


POINTS
OUT OF 48.6% COMPLETION: 89.5%
340 ACCURACY
Utilize the proper tools and techniques to establish a baseline for normal
operation and identify malicious activities using log files from various services.

Network Traffic Analysis 155


POINTS
OUT OF 66.7% COMPLETION: 50.0%
355 ACCURACY
Identify malicious and benign network traffic to demonstrate an understanding of
potential security breaches.

Open Source Intelligence 160


POINTS
OUT OF 61.9% COMPLETION: 72.2%
300 ACCURACY
Utilize publicly available information such as search engines, public repositories,
social media, and more to gain in-depth knowledge on a topic or target.

Password Cracking 175


POINTS
OUT OF 84.2% COMPLETION: 72.7%
320 ACCURACY
Identify types of password hashes and apply various techniques to efficiently
determine plaintext passwords.

Scanning & Reconnaissance 310


POINTS
OUT OF 87.5% COMPLETION: 100.0%
310 ACCURACY
Identify and use the proper tools to gain intelligence about a target including its
services and potential vulnerabilities.

Web Application Exploitation 30


POINTS
OUT OF 100.0% COMPLETION: 14.3%
325 ACCURACY
Identify actionable exploits and vulnerabilities and use them to bypass the
security measures in online services.
Note: Survey module (100 points) was excluded from this report.

1 | Learn more at nationalcyberleague.org | Verify this report at cyberskyline.com/report/SAMPLE_REPORT


The National Cyber League Student Player
A Community Where Cybersecurity Is a Passion
[email protected]

Cryptography Module
Identify techniques used to encrypt or obfuscate messages and leverage tools to extract the plaintext.

TOP NICE WORKROLES

616
NATIONAL RANK
TH PLACE
OUT OF 6474 200
POINTS
OUT OF
330
PERFORMANCE SCORE
80.0%
ACCURACY
75.0%
COMPLETION
Security Control Assessor
Secure Software Assessor
Exploitation Analyst
Cyber Operator

91 st National
Percentile Average: 134.1 Points Average: 85.2% Average: 53.1%
Security Architect

Decoding 1 (Easy) 45
POINTS
OUT OF 100.0% COMPLETION: 100.0%
45 ACCURACY
Identify the type of base encoding used and decode the data

Decoding 2 (Easy) 30
POINTS
OUT OF 100.0% COMPLETION: 100.0%
30 ACCURACY
Identify the cipher scheme used and decrypt the data

Decoding 3 (Easy) 20
POINTS
OUT OF 100.0% COMPLETION: 100.0%
20 ACCURACY
Identify the cipher scheme used and decrypt the data

Decoding 4 (Medium) 35
POINTS
OUT OF 100.0% COMPLETION: 100.0%
35 ACCURACY
Identify the alphabet encoding used and decode the data

Decoding 5 (Hard) 50
POINTS
OUT OF 60.0% COMPLETION: 100.0%
50 ACCURACY
Exploit an RSA implementation and extract the sensitive data that was encrypted

Steg (Easy) 20
POINTS
OUT OF 100.0% COMPLETION: 100.0%
20 ACCURACY
Identify the steganography technique used and extract the hidden data

Cyber Cat (Easy) 0


POINTS
OUT OF 0.0% COMPLETION: 0.0%
50 ACCURACY
Identify the metadata and encoding used to hide data in an image file

SSL (Hard) 0
POINTS
OUT OF 0.0% COMPLETION: 0.0%
80 ACCURACY
Parse through hundreds of SSL certificates to identify any invalid or improperly
signed SSL certificates

2 | Learn more at nationalcyberleague.org | Verify this report at cyberskyline.com/report/SAMPLE_REPORT


The National Cyber League Student Player
A Community Where Cybersecurity Is a Passion
[email protected]

Enumeration & Exploitation Module


Identify actionable exploits and vulnerabilities and use them to bypass the security measures in code and
compiled binaries.

TOP NICE WORKROLES

322
NATIONAL RANK
ND PLACE
OUT OF 6474 200
POINTS
OUT OF
320
PERFORMANCE SCORE
66.7%
ACCURACY
66.7%
COMPLETION
Cyber Operator
Target Developer
Exploitation Analyst
Software Developer

96 th National
Percentile Average: 55.0 Points Average: 43.1% Average: 32.2%
Systems Security Analyst

Micro (Easy) 100


POINTS
OUT OF 100.0% COMPLETION: 100.0%
100 ACCURACY
Analyze a Lua script source code and reverse engineer its functionality

Shinny (Medium) 100


POINTS
OUT OF 100.0% COMPLETION: 100.0%
100 ACCURACY
Analyze an obfuscated Python program and reverse engineer its functionality

Rock (Hard) 0
POINTS
OUT OF 0.0% COMPLETION: 0.0%
120 ACCURACY
Decompile and analyze a C++ binary file and reverse engineer its functionality

Forensics Module
Utilize the proper tools and techniques to analyze, process, recover, and/or investigate digital evidence in a
computer-related incident.

TOP NICE WORKROLES

594
NATIONAL RANK
TH PLACE
OUT OF 6474 200
POINTS
OUT OF
300
PERFORMANCE SCORE
100.0%
ACCURACY
80.0%
COMPLETION
Cyber Defense Forensics
Analyst
Cyber Crime Investigator
Cyber Defense Incident

91 st National
Percentile Average: 163.7 Points Average: 73.5% Average: 59.6%
Responder
Cyber Defense Analyst

Archive (Easy) 100


POINTS
OUT OF 100.0% COMPLETION: 100.0%
100 ACCURACY
Fix a corrupted rar file to recover the archive's original contents

Docter (Medium) 100


POINTS
OUT OF 100.0% COMPLETION: 100.0%
100 ACCURACY
Identify and extract files hidden inside a Microsoft Word document file

Where in the World? (Hard) 0


POINTS
OUT OF 0.0% COMPLETION: 0.0%
100 ACCURACY
Analyze the available information in a photograph to identify where the photo was
taken

3 | Learn more at nationalcyberleague.org | Verify this report at cyberskyline.com/report/SAMPLE_REPORT


The National Cyber League Student Player
A Community Where Cybersecurity Is a Passion
[email protected]

Log Analysis Module


Utilize the proper tools and techniques to establish a baseline for normal operation and identify malicious
activities using log files from various services.

TOP NICE WORKROLES

285
NATIONAL RANK
TH PLACE
OUT OF 6474 285
POINTS
OUT OF
340
PERFORMANCE SCORE
48.6%
ACCURACY
89.5%
COMPLETION
Cyber Defense Analyst
Systems Security Analyst
All-Source Analyst
Cyber Defense Forensics

96 th National
Percentile Average: 103.9 Points Average: 42.9% Average: 35.2%
Analyst
Data Analyst

Wild Web (Easy) 110


POINTS
OUT OF 70.0% COMPLETION: 100.0%
110 ACCURACY
Analyze a web server's access logs to identify trends and suspicious access

Mountains (Medium) 100


POINTS
OUT OF 31.3% COMPLETION: 100.0%
100 ACCURACY
Execute commands on an Alpine Linux server to identify installed packages

Intrusion Detection (Hard) 75


POINTS
OUT OF 55.6% COMPLETION: 71.4%
130 ACCURACY
Analyze an IDS log to identify indicators of compromise and attack signatures

Network Traffic Analysis Module


Identify malicious and benign network traffic to demonstrate an understanding of potential security breaches.

TOP NICE WORKROLES

719
NATIONAL RANK
TH PLACE
OUT OF 6474 155
POINTS
OUT OF
355
PERFORMANCE SCORE
66.7%
ACCURACY
50.0%
COMPLETION
Cyber Defense Analyst
All-Source Analyst
Cyber Defense Incident
Responder

89 th National
Percentile Average: 121.8 Points Average: 65.0% Average: 41.2%
Target Network Analyst
Cyber Operator

FTP (Easy) 80
POINTS
OUT OF 83.3% COMPLETION: 100.0%
80 ACCURACY
Analyze a capture of FTP traffic to identify user credentials and files accessed

Cracking (Medium) 55
POINTS
OUT OF 100.0% COMPLETION: 100.0%
55 ACCURACY
Analyze and identify WiFi network metadata and crack the WiFi password

TV (Medium) 20
POINTS
OUT OF 37.5% COMPLETION: 37.5%
100 ACCURACY
Analyze a websocket packet capture containing smart TV control commands

WiFi (Hard) 0
POINTS
OUT OF 0.0% COMPLETION: 0.0%
120 ACCURACY
Identify the vulnerable data fields to exploit the 802.11 PMKID vulnerability and
crack the WiFi network access password

4 | Learn more at nationalcyberleague.org | Verify this report at cyberskyline.com/report/SAMPLE_REPORT


The National Cyber League Student Player
A Community Where Cybersecurity Is a Passion
[email protected]

Open Source Intelligence Module


Utilize publicly available information such as search engines, public repositories, social media, and more to gain
in-depth knowledge on a topic or target.

TOP NICE WORKROLES

1308
NATIONAL RANK
TH PLACE
OUT OF 6474 160
POINTS
OUT OF
300
PERFORMANCE SCORE
61.9%
ACCURACY
72.2%
COMPLETION
Systems Security Analyst
Target Developer
System Administrator
Research & Development

80 th National
Percentile Average: 134.2 Points Average: 66.9% Average: 58.3%
Specialist
Cyber Intel Planner

Rules of Conduct (Easy) 15


POINTS
OUT OF 100.0% COMPLETION: 100.0%
15 ACCURACY
Introductory challenge on acceptable conduct during NCL

APTs (Easy) 30
POINTS
OUT OF 100.0% COMPLETION: 100.0%
30 ACCURACY
Identify attributes regarding popular Advanced Persistent Threats

Unknown Hash (Easy) 45


POINTS
OUT OF 30.0% COMPLETION: 100.0%
45 ACCURACY
Identify the protocol associated with a hash digest and its associated files

Hacker Location (Medium) 0


POINTS
OUT OF 0.0% COMPLETION: 0.0%
50 ACCURACY
Identify the location encoding scheme which uses only 3 words

Stolen Camera (Medium) 70


POINTS
OUT OF 100.0% COMPLETION: 100.0%
70 ACCURACY
Extract camera serial number from an image and identify stolen camera registries

Tom's Hotel (Hard) 0


POINTS
OUT OF 0.0% COMPLETION: 0.0%
90 ACCURACY
Identify attributes from a photo to pin point the location that the photo was taken

5 | Learn more at nationalcyberleague.org | Verify this report at cyberskyline.com/report/SAMPLE_REPORT


The National Cyber League Student Player
A Community Where Cybersecurity Is a Passion
[email protected]

Password Cracking Module


Identify types of password hashes and apply various techniques to efficiently determine plaintext passwords.

TOP NICE WORKROLES

510
NATIONAL RANK
TH PLACE
OUT OF 6474 175
POINTS
OUT OF
320
PERFORMANCE SCORE
84.2%
ACCURACY
72.7%
COMPLETION
Cyber Operator
Exploitation Analyst
Systems Security Analyst
Cyber Defense Incident

93 rd National
Percentile Average: 94.4 Points Average: 86.8% Average: 43.0%
Responder
Cyber Crime Investigator

Hashing (Easy) 15
POINTS
OUT OF 100.0% COMPLETION: 100.0%
15 ACCURACY
Generate password hashes for MD5, SHA1, and SHA256

Cracking 1 (Easy) 30
POINTS
OUT OF 100.0% COMPLETION: 100.0%
30 ACCURACY
Crack MD5 password hashes

Cracking 2 (Easy) 30
POINTS
OUT OF 75.0% COMPLETION: 100.0%
30 ACCURACY
Crack Windows NTLM password hashes

Cracking 3 (Medium) 45
POINTS
OUT OF 60.0% COMPLETION: 100.0%
45 ACCURACY
Build a wordlist or pattern config to crack password hashes of a known pattern

Cracking 4 (Hard) 0
POINTS
OUT OF 0.0% COMPLETION: 0.0%
95 ACCURACY
Build a wordlist to crack passwords not found in common wordlists

Zip (Medium) 30
POINTS
OUT OF 100.0% COMPLETION: 100.0%
30 ACCURACY
Crack the password of a ZIP archive file

Kali Linux (Hard) 25


POINTS
OUT OF 100.0% COMPLETION: 66.7%
75 ACCURACY
Crack the new yescrypt password hashes included in Kali Linux

6 | Learn more at nationalcyberleague.org | Verify this report at cyberskyline.com/report/SAMPLE_REPORT


The National Cyber League Student Player
A Community Where Cybersecurity Is a Passion
[email protected]

Scanning & Reconnaissance Module


Identify and use the proper tools to gain intelligence about a target including its services and potential
vulnerabilities.

TOP NICE WORKROLES

187
NATIONAL RANK
TH PLACE
OUT OF 6474 310
POINTS
OUT OF
310
PERFORMANCE SCORE
87.5%
ACCURACY
100.0%
COMPLETION
Vulnerability Assessment
Analyst
Target Network Analyst
Cyber Operations Planner

98 th National
Percentile Average: 104.1 Points Average: 52.9% Average: 36.4%
Target Developer
Security Control Assessor

Port (Easy) 100


POINTS
OUT OF 100.0% COMPLETION: 100.0%
100 ACCURACY
Perform a port scan and identify services running on a remote host

Treasure Hunt (Medium) 100


POINTS
OUT OF 100.0% COMPLETION: 100.0%
100 ACCURACY
Perform a directory scan and identify hidden files on a remote HTTP server

Mail (Hard) 110


POINTS
OUT OF 66.7% COMPLETION: 100.0%
110 ACCURACY
Perform a targeted service scan of a SMTP server to identify the names of users
in the server directory

Web Application Exploitation Module


Identify actionable exploits and vulnerabilities and use them to bypass the security measures in online services.

TOP NICE WORKROLES

801
NATIONAL RANK
ST PLACE
OUT OF 6474 30
POINTS
OUT OF
325
PERFORMANCE SCORE
100.0%
ACCURACY
14.3%
COMPLETION
Cyber Operator
Software Developer
Exploitation Analyst
Systems Security Analyst

88 th National
Percentile Average: 66.5 Points Average: 59.1% Average: 30.2%
Database Administrator

Storage (Easy) 30
POINTS
OUT OF 100.0% COMPLETION: 33.3%
100 ACCURACY
Analyze source code on a web page and exploit local authentication measures

Pasta (Medium) 0
POINTS
OUT OF 0.0% COMPLETION: 0.0%
100 ACCURACY
Exploit the backdoor vulnerability present in a Node-RED IOT control server

Leek (Hard) 0
POINTS
OUT OF 0.0% COMPLETION: 0.0%
125 ACCURACY
Exploit the web server to obtain uninitialized server buffer memory and extract
sensitive server-side data such as encryption keys

7 | Learn more at nationalcyberleague.org | Verify this report at cyberskyline.com/report/SAMPLE_REPORT

You might also like