Special Events 2018

We’re adding more events, but for now keep your schedule open for these exciting activities!

Wednesday, 10/24

Old Time Photos 4-8pm

We’re excited to have Handlebar Photo Co. at this year’s event, giving attendees the opportunity to get into the Wild West spirit!

Welcome Party 7-9pm

Once you get registered come check out the labs and sponsors before our party! We’ll have a cash bar, snacks, hacker trivia and slide roulette.

Thursday, 10/25

A Lock Picking Gun Fight Tournament 6pm – 7pm

Jonathan Ham and Deviant Ollam introduce the basic structure of the most common physical locks, and a demonstration of the most common tools and techniques used to defeat them. Then, after some practice time with all necessary tools provided, a tournament will be held.
 
Several different models of Nerf(tm) Guns will be provided for gunslingers to choose from, each disabled with a commercial trigger lock. For each round of the tournament a duel will commence, players start back-to-back, then pace away towards a table with a small lock challenge. The cowboy or cowgirl able to most quickly unlock the challenge, load it Nerf Gun, and shoot his or her opponent “dead”, wins the round.
 
The last lockpicker/gunslinger standing will be awarded a very cool prize!
 

Friday, 10/26

Chuckwagon Dinner 5pm – end

A special treat! A steak dinner cooked on an open fire. An alternative vegetarian meal will be available. This is included in the price of your ticket. Spouse dinner tickets are available as an add-on when purchasing your ticket.

Party 8pm – end

Exciting things coming…stay tuned!

Other Events 

MetaCTF

The MetaCTF Team and WWHF crew has been hard at work preparing an exciting set of
challenges for this year’s competition. Similar to last year, the CTF will span both days of the conference, starting after the opening keynotes and closing on Friday afternoon. As opposed to the stump-the-chump style events, this is a learning CTF. While there will be plenty of hard challenges, the goal is for you to walk away with some new tools, techniques, and skills. Challenges will span a number of categories including reconnaissance and web exploitation to forensics and maybe even some hardware hacking. It will be team based, so make sure to get some friends together or meet some new people at the conference!

You will need an updated Kali machine, but we will provide everything else. More information can be found here.

Open-Source Hackathon

Calling all open-source builders! Help build a security tool that everyone will want in their arsenal. Join Sprocket Security and friends in a community-driven hackathon! We’ll be building an on-demand proxy tool that leverages multiple cloud environments giving you the ability to source your traffic from multiple IP addresses. Think of it as your own private TOR network for your redteam and pentest engagements. No more defenses throttling and blocking you! The community will start from scratch and collaboratively design, architect, and code this tool and release it at the end of the conference for everyone! We welcome all experience levels. There is a lot of moving parts to this project that you can help with. Even if you don’t know how to code, you can contribute and make new friends.

C# Hackathon (2 hours)

The .NET framework is built in to every modern version of Windows. It is an amazing attack surface to explore. This will be a hands on workshop led by Joe Moles & Zac Brown. We will explore .NET / C# techniques for circumventing security controls.  Lots of time for questions and writing your own code.  This will be useful for both offense and defense. If you have never used C# or are an expert, this will be a fun way to learn and explore. We will cover Program Structure and Compilation, Shellcode Execution, Process Hollowing, PE Loaders and bypassing security controls.
 
Bio: Joe Moles leads a team of security analysts to help organizations defend their endpoints against threats. An IR and digital forensics specialist, Joe Moles has more than a decade of experience running security operations and e-discovery. Prior to joining Red Canary, Joe built and led security operations, incident response, and e-discovery programs for Fortune 500 companies like OfficeMax and Motorola. He is regarded as an industry thought leader and regularly contributes to the Red Canary blog.

Bio: Zac Brown is a Principal Software Engineer at Red Canary focused on Blue Team Detection & Engineering. Prior to working at Red Canary, he worked for Microsoft on the Windows team and later the Office 365 Security Team. Zac likes long walks on the beach, operating systems internals, and working on compilers. In his non-existent free time, he enjoys spending time with his wife and dogs, reading, and cooking.

The workshop and waitlist are full. Thank you to everyone who signed up! If you have signed up and your plans change, please let us know if we can release your spot.

Kali Linux Dojo (2 hours)

Join Johhny Long for this special opportunity to strengthen your Kali skills and knowledge in a hands-on environment.
 
Bio: Johnny Long spent his career as a professional hacker. He is the author of numerous security books including No-Tech Hacking and Google Hacking for Penetration Testers and a contributor to Kali Linux Revealed. He is the founder of Hackers for Charity and currently works with the Offensive Security team.
 

The workshop and waitlist are full. Thank you to everyone who signed up! If you have signed up and your plans change, please let us know if we can release your spot.

Offensive WMI Workshop (2 hours)

WMI has recently been publicized for its offensive use cases. Attackers, and now red teams, are discovering how powerful WMI can be when used beyond its original intent. Even with the recent surge in WMI use, not everyone knows how to interact with it. This workshop intends to showcase how you can leverage WMI on assessments to do nearly anything you would want to do in a post-exploitation scenario. Want to read files, perform a directory listing, detect active user accounts, run commands (and receive their output), download/upload files, and do all of the above (plus more) remotely?
 
The goal for this workshop will be to enable students to walk away with an understanding of how WMI, a service installed and enabled by default since Windows 2000, is utilized by attackers, demystify interacting with the service locally and remotely, and give students the ability to leverage WMI in the same manner as attackers.
 
Bio: Christopher Truncer (@ChrisTruncer) is a co-founder and red team lead with FortyNorth Security. He is a co-founder and current developer of the Veil-Framework, a project aimed to bridge the gap between advanced red team and penetration testing tools, WMImplant, EyeWitness, and other open-source software. Chris began developing tools that are not only designed for the offensive community, but can enhance the defensive community’s ability to defend their network as well.
 
The workshop and waitlist are full. Thank you to everyone who signed up! If you have signed up and your plans change, please let us know if we can release your spot.
 

Hands-On Hardware Hacking Labs

Returning for another year with more additions! Do you have what it takes to attempt the hardware hacks that we have in store for you during the hardware hacking challenge??? With our hardware hacking labs, you will get to try techniques utilized to hack “Internet of Things” devices. Labs will be set up to help identify potential ports of interest on printed circuit boards (PCB), learn how to connect and enumerate those ports, find interesting information within the integrated circuits (can you say passwords), and dump the firmware with tools already set up to help gather information from the device(s). We have taken the trials, tribulations, and frustrations of having to de-solder integrated circuits from the PCB, tear apart the casings to expose the secrets, fumble through soldering headers into the board and those really tiny resistors (ughh). With these labs, you have the opportunity to play with tools like the jtagulator, Shikra and Bus Pirate. If you are not familiar with those tools you will be after we get done with you. So, come get your hands dirty and enjoy the company of fellow hacktivists during the second annual Wild West Hackin’ Fest in Legendary Deadwood, South Dakota!!!!

Retro Gaming Room

Want to get your hands on some old school games or comics?  WWHF will have a Retro Gaming Room set up filled with vintage games and comic books to re-live your childhood. Bring Your Own Fun Dip!
 
About: Heroes & Villains and Rushmore Coin were established in 2017 to boost a growing market both retro gaming, comic collecting, the investment in precious metals, and numismatics.  Our goal is to provide exceptional customer service and fair prices across all facets of our business.