LABS & Workshops
We’re adding more labs, but for now keep your schedule open for these exciting activities! Workshops will be announced early summer.
Hands-On Hardware Hacking Labs
Returning for another year with more additions! Do you have what it takes to attempt the hardware hacks that we have in store for you during the hardware hacking challenge??? With our hardware hacking labs, you will get to try techniques utilized to hack “Internet of Things” devices.
Labs will be set up to help identify potential ports of interest on printed circuit boards (PCB), learn how to connect and enumerate those ports, find interesting information within the integrated circuits (can you say passwords), and dump the firmware with tools already set up to help gather information from the device(s). We have taken the trials, tribulations, and frustrations of having to de-solder integrated circuits from the PCB, tear apart the casings to expose the secrets, fumble through soldering headers into the board and those really tiny resistors (ughh).
With these labs, you have the opportunity to play with tools like the jtagulator, Shikra and Bus Pirate. If you are not familiar with those tools you will be after we get done with you. So, come get your hands dirty and enjoy the company of fellow hacktivists during the third annual Wild West Hackin’ Fest in Legendary Deadwood, South Dakota!!!!
A Lock Picking Gun Fight Tournament
WWHF TOOL SHED
Registration for the Workshops opens at 9am Mtn on Wednesday, July 31st. You must already be registered for the conference to get into a workshop. So mark your calendar as these fill up fast!
Free Workshops (Registration Required)
- Offensive WMI
- Threat Hunting Using DNS
- Advanced Cubicles and Compromises
- Open Source Intelligence
- Seeing the Red through the Blue
- C# for Blue Team
- How To Create How To’s
Instructor: Christopher Truncer
Equipment Required: Bring Your Own Laptop
Time: 2 hours
Date: Thursday, Oct 24th – 9am to 11am
WMI has recently been publicized for its offensive use cases. Attackers, and now red teams, are discovering how powerful WMI can be when used beyond its original intent. Even with the recent surge in WMI use, not everyone knows how to interact with it. This workshop intends to showcase how you can leverage WMI on assessments to do nearly anything you would want to do in a post-exploitation scenario. Want to read files, perform a directory listing, detect active user accounts, run commands (and receive their output), download/upload files, and do all of the above (plus more) remotely?
The goal for this workshop will be to enable students to walk away with an understanding of how WMI, a service installed and enabled by default since Windows 2000, is utilized by attackers, demystify interacting with the service locally and remotely, and give students the ability to leverage WMI in the same manner as attackers.
Bio: Christopher Truncer (@ChrisTruncer) is a co-founder and red team lead with FortyNorth Security. He is a co-founder and current developer of the Veil-Framework, a project aimed to bridge the gap between advanced red team and penetration testing tools, WMImplant, EyeWitness, and other open-source software. Chris began developing tools that are not only designed for the offensive community, but can enhance the defensive community’s ability to defend their network as well.