Cyber Security Challenge
We are currently organizing coaching sessions in preparation for the Cyber Security Challenge that will take place in March. Students from the Royal Military Academy and from Molengeek are participating. Check the publication on BelDefNews...
ReadMost people using kali won't use it on a dedicated machine. For Windows users most would use kali from WSL (Windows Subsystem for Linux). Other would use a virtual machine in VirtualBox or other virtualization environment. In this post we will only cover VirtualBox. In this case it can be useful to have a folder on the host machine that can be shared in the kali environment.
ReadCyber Security Challenge 2022 will start in March 2022! It's time to register...
ReadThe Cyber Security Challenge is a Capture The Flag (CTF) competition for teams of maximum 4 students. Over a limited timeframe, the teams must solve challenges covering a wide range of security issues, e.g. cryptography, reverse engineering, network security, web or mobile application security, wireless and forensics analysis.
Read