Cyber Security Challenge
Qualifiers for the Cyber Security Challenge 2024 will take place on 8 and 9 March 2024! It’s time to register…
ReadFor cyber security training, it’s beneficial to create accounts on well-known cyberranges that offer both free and paid training:
ReadIn our previous post of the Building Your Bash Toolkit series, we delved deep into the process_args function, a utility that enables our bash scripts to handle both piped and direct inputs effortlessly. With that power in hand, we are set to further simplify some of the common bash scripting tasks.
ReadIn the inaugural blog post of our Building Your Bash Toolkit series, we embarked on a journey to simplify our Bash interactions. Today, we dive deeper, introducing a utility function, process_args, that seamlessly merges both direct and piped inputs.
ReadWelcome to the first installment of our series on developing your own set of Bash tools. For those who frequently work in the terminal, you’ll understand the immense value in having a suite of custom tools tailored to your needs. This series aims to guide you in building that toolkit, ensuring you streamline and simplify those recurring actions in the terminal.
ReadCongratulations to the team Royal Military Hackademy who won the Cyber Security Challenge 2023!
ReadThe qualifiers of the Cyber Security Challenge 2023 took place last week-end. Congratulations to the teams from the Royal Military Academy and the Université Libre de Bruxelles who ranked 1st, 4th and 5th, out of almost 300 participating teams!
ReadWe are currently organizing coaching sessions in preparation for the Cyber Security Challenge that will take place in March. Students from the Royal Military Academy and from Molengeek are participating. Check the publication on BelDefNews…
ReadMost people using kali won’t use it on a dedicated machine. For Windows users most would use kali from WSL (Windows Subsystem for Linux). Other would use a virtual machine in VirtualBox or other virtualization environment. In this post we will only cover VirtualBox. In this case it can be useful to have a folder on the host machine that can be shared in the kali environment.
ReadYesterday we organized the 2nd session of our cyber security evening. This series of events is a collaboration between the Royal Military Academy and MolenGeek. It aims to contribute to the preparation of the future generation of cyber specialists.
ReadCyber Security Challenge 2022 will start in March 2022! It’s time to register…
ReadThe Cyber Security Challenge is a Capture The Flag (CTF) competition for teams of maximum 4 students. Over a limited timeframe, the teams must solve challenges covering a wide range of security issues, e.g. cryptography, reverse engineering, network security, web or mobile application security, wireless and forensics analysis.
Read