+172
00-mini-hack-overview.md
+172
00-mini-hack-overview.md
···+| Web not accessible | 1. Is Apache running? 2. Did you enable NAT? 3. Port forwarding rules exist? |+| Internal server can't reach router | Check internal IP on ether4, verify gateway in netplan |
+59
01-services-overview.md
+59
01-services-overview.md
···+1. **Understand what it does** - Don't rush into clicking buttons. Read documentation first. Even 5 minutes of research saves time later.+2. **Locate configuration files** - Services usually have config files in `/etc`. Files can be singular or multiple across different locations (main config + user-specific).+6. **Dependencies matter** - Some services rely on others. Changing one may require restarting dependent services.
+78
02-apache-web-service.md
+78
02-apache-web-service.md
···
+164
03-ssh-service.md
+164
03-ssh-service.md
···
+137
04-network-configuration.md
+137
04-network-configuration.md
···
+210
05-dns-rsync-cron.md
+210
05-dns-rsync-cron.md
···+DNS translates domain names to IP addresses (forward lookup) and IP addresses to domain names (reverse lookup).
+183
06-ufw-firewall.md
+183
06-ufw-firewall.md
···+UFW (Uncomplicated Firewall) sits on top of iptables and provides a more user-friendly interface for managing firewall rules on Ubuntu systems.+**Warning**: After deleting a rule, all rules are renumbered. Delete one at a time and re-check numbers.+**Security Tip**: If you're not using IPv6, consider deleting those rules to reduce attack surface:+UFW has built-in rules that process **before** and **after** your user-defined rules. These are stored in:+4. **Don't lock yourself out**: If configuring SSH remotely, make sure you allow SSH before enabling the firewall+5. **Monitor conflicts**: If a service stops working after enabling UFW, you likely forgot to allow its port+UFW rules persist across reboots once enabled. The firewall starts automatically on boot if you've run `sudo ufw enable`.
+293
07-active-connection-defense.md
+293
07-active-connection-defense.md
···+Monitoring and managing active network connections is critical during competitions. This guide covers tools for identifying who's connected to your system and how to terminate malicious connections.+**Best practice**: Use monitoring to buy time while someone else hardens the system. You can't watch connections for 6 hours straight.
+294
08-mikrotik-router.md
+294
08-mikrotik-router.md
···+Starting 2025, the NCAE competition replaced CentOS routers with MikroTik routers. MikroTik provides both a CLI and web GUI for configuration.
+129
README.md
+129
README.md
···+Quick reference guides for configuring services in Linux competitions. Assumes basic Linux knowledge (filesystem navigation, systemctl, ssh, etc.).+0. **[Mini-Hack Quick Start](00-mini-hack-overview.md)** - Complete mini-hack walkthrough checklist+4. **[Network Configuration](04-network-configuration.md)** - Static IPs across different distros+7. **[Active Connection Defense](07-active-connection-defense.md)** - Monitor and kill malicious connections