NCL Sample Scouting Report
NCL Sample Scouting Report
Thank you for participating in the National Cyber League (NCL) Season! Our goal is to prepare the next generation of
cybersecurity professionals, and your participation is helping achieve that goal.
The NCL was founded in May 2011 to provide an ongoing virtual training ground for collegiate students to develop,
practice, and validate their cybersecurity skills in preparation for further learning, industry certifications, and career
readiness. The NCL scenario-based challenges were designed around performance-based exam objectives of
CompTIA certifications and are aligned to the National Initiative for Cybersecurity Education (NICE) Cybersecurity
Workforce Framework published by the National Institute of Standards and Technology (NIST).
As you look to a future career in cybersecurity, we hope you find this report to be valuable in both validating skills and
identifying areas for improvement across the nine NCL skills categories. You can use this NCL Scouting Report to:
Validate your skills to employers in any job application or professional portfolio;
Show case your achievements and strengths by including the Score Card view of your performance as part of your
résumé or simply sharing the validation link so that others may view the detailed version of this report.
This NCL Season had 7,200 students/players and 491 faculty/coaches from more than 500 two- and four-year schools
& 70 high schools across all 50 U.S. states registered to play. The Individual Game Capture the Flag (CTF) event took
place from October 22 through October 24. The Team Game CTF event took place from November 5 through
November 7. The games were conducted in real-time for students across the country.
NCL is powered by Cyber Skyline's cloud-based skills evaluation platform. Cyber Skyline hosted the
scenario-driven cybersecurity challenges for players to compete and track their progress in real-time.
Based on the the performance detailed in this NCL Scouting Report, you have earned 9 hours of
Continuing Education Units (CEUs) as approved by CompTIA. You can learn more about the NCL -
CompTIA alignment via nationalcyberleague.org/comptia.
Congratulations for your participation in the NCL Individual Game! We hope you will continue to develop your
knowledge and skills and make meaningful contributions as part of the Information Security workforce!
David Zeichick
NCL Commissioner
361
NATIONAL RANK
ST PLACE
OUT OF 6474 1815
PERFORMANCE SCORE
POINTS
OUT OF
3000 69.1%
ACCURACY
71.2%
COMPLETION
95 th National
Percentile Average: 698.4 Points Average: 65.3% Average: 31.0%
Cryptography 200
POINTS
OUT OF 80.0% COMPLETION: 75.0%
330 ACCURACY
Identify techniques used to encrypt or obfuscate messages and leverage tools to
extract the plaintext.
Forensics 200
POINTS
OUT OF 100.0% COMPLETION: 80.0%
300 ACCURACY
Utilize the proper tools and techniques to analyze, process, recover, and/or
investigate digital evidence in a computer-related incident.
Cryptography Module
Identify techniques used to encrypt or obfuscate messages and leverage tools to extract the plaintext.
616
NATIONAL RANK
TH PLACE
OUT OF 6474 200
POINTS
OUT OF
330
PERFORMANCE SCORE
80.0%
ACCURACY
75.0%
COMPLETION
Security Control Assessor
Secure Software Assessor
Exploitation Analyst
Cyber Operator
91 st National
Percentile Average: 134.1 Points Average: 85.2% Average: 53.1%
Security Architect
Decoding 1 (Easy) 45
POINTS
OUT OF 100.0% COMPLETION: 100.0%
45 ACCURACY
Identify the type of base encoding used and decode the data
Decoding 2 (Easy) 30
POINTS
OUT OF 100.0% COMPLETION: 100.0%
30 ACCURACY
Identify the cipher scheme used and decrypt the data
Decoding 3 (Easy) 20
POINTS
OUT OF 100.0% COMPLETION: 100.0%
20 ACCURACY
Identify the cipher scheme used and decrypt the data
Decoding 4 (Medium) 35
POINTS
OUT OF 100.0% COMPLETION: 100.0%
35 ACCURACY
Identify the alphabet encoding used and decode the data
Decoding 5 (Hard) 50
POINTS
OUT OF 60.0% COMPLETION: 100.0%
50 ACCURACY
Exploit an RSA implementation and extract the sensitive data that was encrypted
Steg (Easy) 20
POINTS
OUT OF 100.0% COMPLETION: 100.0%
20 ACCURACY
Identify the steganography technique used and extract the hidden data
SSL (Hard) 0
POINTS
OUT OF 0.0% COMPLETION: 0.0%
80 ACCURACY
Parse through hundreds of SSL certificates to identify any invalid or improperly
signed SSL certificates
322
NATIONAL RANK
ND PLACE
OUT OF 6474 200
POINTS
OUT OF
320
PERFORMANCE SCORE
66.7%
ACCURACY
66.7%
COMPLETION
Cyber Operator
Target Developer
Exploitation Analyst
Software Developer
96 th National
Percentile Average: 55.0 Points Average: 43.1% Average: 32.2%
Systems Security Analyst
Rock (Hard) 0
POINTS
OUT OF 0.0% COMPLETION: 0.0%
120 ACCURACY
Decompile and analyze a C++ binary file and reverse engineer its functionality
Forensics Module
Utilize the proper tools and techniques to analyze, process, recover, and/or investigate digital evidence in a
computer-related incident.
594
NATIONAL RANK
TH PLACE
OUT OF 6474 200
POINTS
OUT OF
300
PERFORMANCE SCORE
100.0%
ACCURACY
80.0%
COMPLETION
Cyber Defense Forensics
Analyst
Cyber Crime Investigator
Cyber Defense Incident
91 st National
Percentile Average: 163.7 Points Average: 73.5% Average: 59.6%
Responder
Cyber Defense Analyst
285
NATIONAL RANK
TH PLACE
OUT OF 6474 285
POINTS
OUT OF
340
PERFORMANCE SCORE
48.6%
ACCURACY
89.5%
COMPLETION
Cyber Defense Analyst
Systems Security Analyst
All-Source Analyst
Cyber Defense Forensics
96 th National
Percentile Average: 103.9 Points Average: 42.9% Average: 35.2%
Analyst
Data Analyst
719
NATIONAL RANK
TH PLACE
OUT OF 6474 155
POINTS
OUT OF
355
PERFORMANCE SCORE
66.7%
ACCURACY
50.0%
COMPLETION
Cyber Defense Analyst
All-Source Analyst
Cyber Defense Incident
Responder
89 th National
Percentile Average: 121.8 Points Average: 65.0% Average: 41.2%
Target Network Analyst
Cyber Operator
FTP (Easy) 80
POINTS
OUT OF 83.3% COMPLETION: 100.0%
80 ACCURACY
Analyze a capture of FTP traffic to identify user credentials and files accessed
Cracking (Medium) 55
POINTS
OUT OF 100.0% COMPLETION: 100.0%
55 ACCURACY
Analyze and identify WiFi network metadata and crack the WiFi password
TV (Medium) 20
POINTS
OUT OF 37.5% COMPLETION: 37.5%
100 ACCURACY
Analyze a websocket packet capture containing smart TV control commands
WiFi (Hard) 0
POINTS
OUT OF 0.0% COMPLETION: 0.0%
120 ACCURACY
Identify the vulnerable data fields to exploit the 802.11 PMKID vulnerability and
crack the WiFi network access password
1308
NATIONAL RANK
TH PLACE
OUT OF 6474 160
POINTS
OUT OF
300
PERFORMANCE SCORE
61.9%
ACCURACY
72.2%
COMPLETION
Systems Security Analyst
Target Developer
System Administrator
Research & Development
80 th National
Percentile Average: 134.2 Points Average: 66.9% Average: 58.3%
Specialist
Cyber Intel Planner
APTs (Easy) 30
POINTS
OUT OF 100.0% COMPLETION: 100.0%
30 ACCURACY
Identify attributes regarding popular Advanced Persistent Threats
510
NATIONAL RANK
TH PLACE
OUT OF 6474 175
POINTS
OUT OF
320
PERFORMANCE SCORE
84.2%
ACCURACY
72.7%
COMPLETION
Cyber Operator
Exploitation Analyst
Systems Security Analyst
Cyber Defense Incident
93 rd National
Percentile Average: 94.4 Points Average: 86.8% Average: 43.0%
Responder
Cyber Crime Investigator
Hashing (Easy) 15
POINTS
OUT OF 100.0% COMPLETION: 100.0%
15 ACCURACY
Generate password hashes for MD5, SHA1, and SHA256
Cracking 1 (Easy) 30
POINTS
OUT OF 100.0% COMPLETION: 100.0%
30 ACCURACY
Crack MD5 password hashes
Cracking 2 (Easy) 30
POINTS
OUT OF 75.0% COMPLETION: 100.0%
30 ACCURACY
Crack Windows NTLM password hashes
Cracking 3 (Medium) 45
POINTS
OUT OF 60.0% COMPLETION: 100.0%
45 ACCURACY
Build a wordlist or pattern config to crack password hashes of a known pattern
Cracking 4 (Hard) 0
POINTS
OUT OF 0.0% COMPLETION: 0.0%
95 ACCURACY
Build a wordlist to crack passwords not found in common wordlists
Zip (Medium) 30
POINTS
OUT OF 100.0% COMPLETION: 100.0%
30 ACCURACY
Crack the password of a ZIP archive file
187
NATIONAL RANK
TH PLACE
OUT OF 6474 310
POINTS
OUT OF
310
PERFORMANCE SCORE
87.5%
ACCURACY
100.0%
COMPLETION
Vulnerability Assessment
Analyst
Target Network Analyst
Cyber Operations Planner
98 th National
Percentile Average: 104.1 Points Average: 52.9% Average: 36.4%
Target Developer
Security Control Assessor
801
NATIONAL RANK
ST PLACE
OUT OF 6474 30
POINTS
OUT OF
325
PERFORMANCE SCORE
100.0%
ACCURACY
14.3%
COMPLETION
Cyber Operator
Software Developer
Exploitation Analyst
Systems Security Analyst
88 th National
Percentile Average: 66.5 Points Average: 59.1% Average: 30.2%
Database Administrator
Storage (Easy) 30
POINTS
OUT OF 100.0% COMPLETION: 33.3%
100 ACCURACY
Analyze source code on a web page and exploit local authentication measures
Pasta (Medium) 0
POINTS
OUT OF 0.0% COMPLETION: 0.0%
100 ACCURACY
Exploit the backdoor vulnerability present in a Node-RED IOT control server
Leek (Hard) 0
POINTS
OUT OF 0.0% COMPLETION: 0.0%
125 ACCURACY
Exploit the web server to obtain uninitialized server buffer memory and extract
sensitive server-side data such as encryption keys