CSC

Cyber Security Challenge

Cyber Security Challenge Belgium 2024

News CSC

Qualifiers for the Cyber Security Challenge 2024 will take place on 8 and 9 March 2024! It’s time to register…

Read
Using TryHackMe Cyberrange for CSC Workshops

CSC HTB

For cyber security training, it’s beneficial to create accounts on well-known cyberranges that offer both free and paid training:

Read
Building Your Bash Toolkit: Simplifying Key-Value Extractions with `extract_value`

CSC bash Tools Bash-Toolkit

In our previous post of the Building Your Bash Toolkit series, we delved deep into the process_args function, a utility that enables our bash scripts to handle both piped and direct inputs effortlessly. With that power in hand, we are set to further simplify some of the common bash scripting tasks.

Read
Building Your Bash Toolkit: Creating a Dynamic Argument Processor in Bash

CSC bash Tools Bash-Toolkit

In the inaugural blog post of our Building Your Bash Toolkit series, we embarked on a journey to simplify our Bash interactions. Today, we dive deeper, introducing a utility function, process_args, that seamlessly merges both direct and piped inputs.

Read
Building Your Bash Toolkit: Getting Started

CSC bash Tools Bash-Toolkit

Welcome to the first installment of our series on developing your own set of Bash tools. For those who frequently work in the terminal, you’ll understand the immense value in having a suite of custom tools tailored to your needs. This series aims to guide you in building that toolkit, ensuring you streamline and simplify those recurring actions in the terminal.

Read
Cyber Security Challenge : Congrats!!

CSC News

Congratulations to the team Royal Military Hackademy who won the Cyber Security Challenge 2023!

Read
Cyber Security Challenge : Qualifiers

CSC News

The qualifiers of the Cyber Security Challenge 2023 took place last week-end. Congratulations to the teams from the Royal Military Academy and the Université Libre de Bruxelles who ranked 1st, 4th and 5th, out of almost 300 participating teams!

Read
We are coaching students for the Cyber Security Challenge

News Press review CSC

We are currently organizing coaching sessions in preparation for the Cyber Security Challenge that will take place in March. Students from the Royal Military Academy and from Molengeek are participating. Check the publication on BelDefNews…

Read
Mounting a host folder in WSL or VirtualBox Kali machine

Kali CSC

Most people using kali won’t use it on a dedicated machine. For Windows users most would use kali from WSL (Windows Subsystem for Linux). Other would use a virtual machine in VirtualBox or other virtualization environment. In this post we will only cover VirtualBox. In this case it can be useful to have a folder on the host machine that can be shared in the kali environment.

Read
Cyber Security Evening

News CSC

Yesterday we organized the 2nd session of our cyber security evening. This series of events is a collaboration between the Royal Military Academy and MolenGeek. It aims to contribute to the preparation of the future generation of cyber specialists.

Read
Cyber Security Challenge 2022

News CSC

Cyber Security Challenge 2022 will start in March 2022! It’s time to register…

Read
Cyber Security Challenge

News CSC

The Cyber Security Challenge is a Capture The Flag (CTF) competition for teams of maximum 4 students. Over a limited timeframe, the teams must solve challenges covering a wide range of security issues, e.g. cryptography, reverse engineering, network security, web or mobile application security, wireless and forensics analysis.

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept