Signal Chief Is Legit Now!

Signal Chief in SLC

A couple of months ago I got an email from the training developer for the 25W SLC course asking if it would be possible for them to use some of the articles that I’ve posted here as a daily handout to be used for a short 15 minute discussion.

Happy Birth(day) CYBERCOM

Today marked several historic events for the Department of Defense.  In the course of a couple of hours, three big events happened. 

Boss of the SOC

Splunk

Back in November I had the chance to attend the Splunk .conf conference here in DC.  One of the big after hours events of the conference is the Boss of the SOC (BOTS) competition that puts teams against each other to try and analyze a set of data to identify a variety of indicators of compromise from an incident. After a little bit of talking, Splunk decided to release the BOTS app as an open-source project.

cyrptogram

TACLANE Encrypted Tunnel

Here is another CTF problem from last years Army Cyber Stakes Challenge.  You are provided a solid line of characters (see below) and have to turn it into the flag.  The trick is that because there aren’t any line breaks, you have to figure it out.

where_am_i

SNMP Packets

Another problem from ACSC5. You’ve been able to get on a router and capture some traffic in an effort to map out the the corporate network. Your intelligence team has told you that your target device has an IP address of 172.16.58.47 but no one knows that actual location of it. Examine the network traffic and see if you can figure out the location of that device.

Bash Command Line Arguments

Computer Code

I frequently write BASH scripts for use at work.  I am a firm believer that if I am going to do something more than once or twice, script the stupid thing out.  When possible, I’m a big fan of using command line arguments when I write scripts just to make things easier and also allow even more scripting, but I always forget how the hell to handle the things…..No more.