Skip to content

NCAE 2025 Preparation

These are my notes for helping Blue Teams prepare for the NCAE Cyber Games. It's currently a work in progress and some notes are incomplete. You can access most relevant notes from here.

WARNING - Practice Using the Correct Environment!

The competition this year is going to be using a MicroTik router, NOT CentOS (as it is no longer maintained). This was announced on the NCAE Discord.

A new video was posted on the NCAE channel that goes over the new Mini Hack in the same way as the old one. It's very similar to the first Mini Hack and approachable even if you haven't watched the rest of the playlist after the video for the first Mini Hack.

Relevant Links

Notes

  • Linux Maneuvers → Place for brain-dumps and random considerations that don't seem to fit anywhere else. Includes some skills that might be important for one to know, depending on their role in a team.
  • Team Strategy → Map of our strat.
  • NCAE AI Prompt → AI prompt to put at the start of an LLM conversation (chatgpt, claude, etc). Will give context matching what is publicly known about the competition.

Core Linux Knowledge

Notes I've taken on modern Linux systems during competition prep.

  • systemd → systemd is the most popular "init" system in modern Linux environments. An init process is the first process ran after boot (PID 1). It manages and spawns most other processes.
  • systemd-journald → logs.
  • systemd-timers → a more granular alternative to cron.

Specific Topics

Niche topics that might be useful to know, depending on one's individual team responsibilities.

Sandbox Tutorial Video Notes

Notes from NCAE's Sandbox Tutorial Videos. These use the Mini Hack environment to teach players some fundamental concepts you might need for the competition.

Preparing a Game Plan

Players might find this information useful when developing a strategy.

SPICE Configuration

Copy/paste and automatic guest screen resizing are not available via the default in-browser remote desktop experience NCAE provides. If you want these features, you should make sure you know how to set them up:

System Hardening

A brainstormed list of potential attack vectors and corresponding defenses:


Misc.

Most of these are either in-progress, incomplete, or disorganized: