Loading…
Wild West Hackin' Fest - Deadwood 2024
Attending this event?
Monday, October 7
 

11:30am MDT

AirportCon
Monday October 7, 2024 11:30am - 10:00pm MDT
WWHF Deadwood 2024 Airport Shuttle Schedule
Monday, Oct. 7, 2024 –Airport Shuttle
Pick-up time from airport:
  • 11:30 a.m. MT
  • 2:30 p.m. MT
  • 5:30 p.m. MT
  • 10:00 p.m. MT
Stopping locations in order:
  1. The Lodge at Deadwood 
  2. Cadillac Jacks
  3. Hampton Inn at Tin Lizzie
  4. Deadwood Mountain Grand

Monday October 7, 2024 11:30am - 10:00pm MDT
Rapid City Airport

5:30pm MDT

Preconference Training Registration
Monday October 7, 2024 5:30pm - 8:30pm MDT
Monday October 7, 2024 5:30pm - 8:30pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD
 
Tuesday, October 8
 

7:00am MDT

Preconference Training Registration
Tuesday October 8, 2024 7:00am - 8:30am MDT
Speakers
Tuesday October 8, 2024 7:00am - 8:30am MDT
Deadwood Mountain Grand - General Sesson 1906 Deadwood Mountain Dr, Deadwood, SD

8:30am MDT

Advanced Endpoint Investigations
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
AT

Alissa Torres

Antisyphon Training
Alissa Torres is a blue team practitioner/educator turned consultant, laser-focused on the people element of the SecOps equation. With 3 dog-years of experience spanning roles in active and passive IT and security operations, she discovered her passion for adversary hunt while serving... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Homestake Adams Research and Cultural Center - Second Floor 150 Sherman St, Deadwood, SD 57732, USA

8:30am MDT

Advanced Network Threat Hunting
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Chris Brenton

Chris Brenton

Antisyphon Training
Chris Brenton, COO of Active Countermeasures, has been a leader in the IT and security industry for over 20 years. He’s a published author of multiple security books and the primary author of the Cloud Security Alliance’s online training material. As a Fellow Instructor, Chris... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Homestake Adams Research and Cultural Center - Second Floor 150 Sherman St, Deadwood, SD 57732, USA

8:30am MDT

Advanced Offensive Tooling
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Chris Traynor

Chris Traynor

Antisyphon Training
Chris began working for Black Hills Information Security (BHIS) in July 2022 as a Penetration Tester, where he is responsible for Pen Testing web apps, mobile app, APIs, and networks. Chris has over 15 years of experience in Web/Mobile App development, QA Automation, and Penetration... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Cadillac Jack's® Gaming Resort - Use SpringHill Suites Entrance 360 Main St, Deadwood, SD 57732, USA

8:30am MDT

Breaching the Cloud
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Beau Bullock

Beau Bullock

Senior Security Analyst, Antisyphon Training
Beau is a Senior Security Analyst at Black Hills Information Security where he performs penetration tests and red team assessments. He is the author of various red team/pentest tools such as MailSniper, PowerMeta, HostRecon, and DomainPasswordSpray. Beau is a host of the web shows... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Deadwood Gulch Resort, Trademark Collection by Wyndham 304 Cliff St, Deadwood, SD 57732, USA

8:30am MDT

Cyber Security Incident Command
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Gerard Johansen

Gerard Johansen

Antisyphon Training
Gerard Johansen is a cyber security professional with over a decade of experience in Incident Response, Digital Forensics, Security Operations and Cyber Threat Intelligence. During his tenure in the cyber security field, Gerard has served as both a digital forensics and instruction... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Homestake Adams Research and Cultural Center - Second Floor 150 Sherman St, Deadwood, SD 57732, USA

8:30am MDT

Defending the Enterprise
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Jordan Drysdale

Jordan Drysdale

Antisyphon Training
Jordan was around for the inception of Napster and the explosion of P2P networks. This drove his fascination with network systems and led him toward a career in IT. Jordan’s first gig in the industry included supporting Latin American networking customers for Hewlett Packard’s... Read More →
avatar for Kent Ickler

Kent Ickler

Antisyphon Training
Kent started his Information Technology career working for an Internet Service Provider supporting the MidWest’s broadband initiatives of the early 2000s. His interest in technology and business operations drove his career into working for multiple Fortune 500 companies and equipping... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

8:30am MDT

Hacking Active Directory: Fundamental and Techniques
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Dale Hobbs

Dale Hobbs

Antisyphon Training
Dale Hobbs started working with Black Hills Information Security (BHIS) as a contractor in Sept 2020 and came on board as a full-time employee in April 2021 as a Security Analyst. Prior to BHIS, Dale was the Security Manager for a large North American Retail company. Dale wanted to... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Martin Mason Hotel 33 Deadwood St, Deadwood, SD 57732, USA

8:30am MDT

Incident Response Foundations
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Derek Banks

Derek Banks

Antisyphon Training
Derek Banks has been a Security Analyst and Penetration Tester for Black Hills Information Security (BHIS) since 2014, but he has been a part of the IT industry for his entire career. Since graduating college with a BS in Computer Information Systems, Derek has explored many different... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Hampton Inn Deadwood at Tin Lizzie Gaming Resort - Lower Level 531 Main St, Deadwood, SD 57732, USA

8:30am MDT

Intro to IoT Hacking
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Dave Fletcher

Dave Fletcher

David Fletcher has been working for Black Hills Information Security (BHIS) as a Security Analyst since 2015. He has spent most of his career working for the US Air Force and engaged in a variety of disciplines within the IT industry including boundary defense, web and application... Read More →
avatar for Rick Wisser

Rick Wisser

Rick Wisser has been with the Black Hills Information Security (BHIS) team since 2015. He is a Security Analyst, GIAC Certified Incident Handler (GCIH), and a SANS NetWars Level 5 certificate holder. Rick has an associate degree in Electronic Technology and Computer Networking as... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Comfort Inn & Suites Deadwood 225 Cliff St, Deadwood, SD 57732, USA

8:30am MDT

Introduction to Cybersecurity in Space Systems (ICSS): Hardware Edition
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Tim Fowler

Tim Fowler

Tim Fowler joined Black Hills Information Security (BHIS) in September 2021 as a Security Analyst. He previously worked for multiple financial institutions in roles such as Cyber Security Research Scientist, Manager of Cyber Range Operations, and Security Engineering, as well as spending... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Deadwood Gulch Resort, Trademark Collection by Wyndham 304 Cliff St, Deadwood, SD 57732, USA

8:30am MDT

Introduction to Pentesting
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for John Strand

John Strand

Antisyphon Training
John Strand has consulted and taught thousands of classes and hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much-loved former SANS instructor and course author. John is a contributor to the industr... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
John's Home Meet at entrance of DMG by 8 a.m. to carpool

8:30am MDT

Introduction to Python
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Joff Thyer

Joff Thyer

Antisyphon Training
Joff Thyer has been a penetration tester and security analyst with Black Hills Information Security since 2013. Prior to joining the InfoSec world, he had a long career in the IT industry as a systems administrator and an enterprise network architect. He has an Associate’s in Computer... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Cadillac Jack's® Gaming Resort - Use SpringHill Suites Entrance 360 Main St, Deadwood, SD 57732, USA

8:30am MDT

Linux Command-Line for Analysts & Operators
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Hal Pomeranz

Hal Pomeranz

Antisyphon Training
Hal Pomeranz has spent almost forty years working with, and teaching others to manage and secure Unix and Linux systems. He is an independent consultant providing pragmatic Information Technology and Security solutions for some of the world’s largest commercial, government, and... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Homestake Adams Research and Cultural Center - Second Floor 150 Sherman St, Deadwood, SD 57732, USA

8:30am MDT

Modern Webapp Pentesting II: Webapp Internals
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Brian King

Brian King

Antisyphon Training
BB King has been pentesting webapps since 2008. He was the second hire into his employer’s application security team at a time when “PCI” was brand new and long before bug bounty programs – when experienced webapp pentesters had to be made, not found. His internal training... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Hampton Inn Deadwood at Tin Lizzie Gaming Resort - Lower Level 531 Main St, Deadwood, SD 57732, USA

8:30am MDT

Network Forensics and Incident Response
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Troy Wojewoda

Troy Wojewoda

Antisyphon Training
Troy Wojewoda is a security analyst and penetration tester at Black Hills Information Security. Prior to joining BHIS, Troy has held roles in application and system administration, host and network intrusion detection, wireless security, penetration testing, digital forensics, malware... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Cadillac Jack's® Gaming Resort - Use SpringHill Suites Entrance 360 Main St, Deadwood, SD 57732, USA

8:30am MDT

Next Level OSINT
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Mishaal Khan

Mishaal Khan

Mishaal is a highly respected figure in cybersecurity, with expertise in ethical hacking, Open Source Intelligence (OSINT), social engineering, and privacy. Mishaal's engaging approach involves live demos, making cybersecurity accessible and enjoyable, while his strength lies in rapidly... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Deadwood Mountain Grand - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

8:30am MDT

Offense for Defense
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Tim Medin

Tim Medin

Red Siege
Tim is the CEO of Red Siege, a infosec company focusing on pen testing. Tim is a former Senior Instructor and course author (SEC560) at SANS. Through the course of his career, Tim has performed penetration tests on a wide range of organizations and technologies. Tim has gained information... Read More →
avatar for Jason Downey

Jason Downey

Antisyphon Training - Red Siege
Jason Downey is a Security Consultant for Red Siege Information Security. Jason has over ten years of professional experience in IT and information security ranging in a variety of roles in network security roles with additional experience in systems administration. Jason has spoken in front of various audiences ranging from youth initiatives to majo... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Cadillac Jack's® Gaming Resort - Use SpringHill Suites Entrance 360 Main St, Deadwood, SD 57732, USA

8:30am MDT

Ransomware Attack Simulation and Investigation for Blue Teamers
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Markus Schober

Markus Schober

Antisyphon Training
Markus Schober is the founder of a blue team training and consulting company named Blue Cape Security. Prior to that, he served as a manger and Principal Security Consultant at IBM X-Force Incident Response. Over the past decade he has led numerous cyber security breach investigations... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Comfort Inn & Suites Deadwood 225 Cliff St, Deadwood, SD 57732, USA

8:30am MDT

Red Team Initial Access
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Michael Allen

Michael Allen

Antisyphon Training
Michael Allen is a Senior Security Analyst and Red Team Practice Lead who joined the team at Black Hills Information Security (BHIS) in 2019. Having started hacking and picking locks at an early age, Michael has since turned “doing things he’s not supposed to do and going places... Read More →

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Hampton Inn Deadwood at Tin Lizzie Gaming Resort - Lower Level 531 Main St, Deadwood, SD 57732, USA

8:30am MDT

Threat Hunting & Incident Response with Velociraptor
Tuesday October 8, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Eric Capuano

Eric Capuano

Antisyphon Training
Eric Capuano is a Director at LimaCharlie, co-founder of Recon InfoSec, and SANS DFIR Instructor. He has over a decade experience in Security Operations, Digital Forensics, and Incident Response.
avatar for Whitney Champion

Whitney Champion

Antisyphon Training
Whitney is the Lead Solutions Architect at LimaCharlie and a co-founder of Recon InfoSec. She has over a decade of experience in security operations and large-scale infrastructure automation and orchestration in both the private and public sector.

Tuesday October 8, 2024 8:30am - 5:00pm MDT
Cadillac Jack's® Gaming Resort - Use SpringHill Suites Entrance 360 Main St, Deadwood, SD 57732, USA
 
Wednesday, October 9
 

8:00am MDT

Preconference Training Registration
Wednesday October 9, 2024 8:00am - 9:30am MDT
Wednesday October 9, 2024 8:00am - 9:30am MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

8:30am MDT

Advanced Endpoint Investigations
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
AT

Alissa Torres

Antisyphon Training
Alissa Torres is a blue team practitioner/educator turned consultant, laser-focused on the people element of the SecOps equation. With 3 dog-years of experience spanning roles in active and passive IT and security operations, she discovered her passion for adversary hunt while serving... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Homestake Adams Research and Cultural Center - Second Floor 150 Sherman St, Deadwood, SD 57732, USA

8:30am MDT

Advanced Network Threat Hunting
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Chris Brenton

Chris Brenton

Antisyphon Training
Chris Brenton, COO of Active Countermeasures, has been a leader in the IT and security industry for over 20 years. He’s a published author of multiple security books and the primary author of the Cloud Security Alliance’s online training material. As a Fellow Instructor, Chris... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Homestake Adams Research and Cultural Center - Second Floor 150 Sherman St, Deadwood, SD 57732, USA

8:30am MDT

Advanced Offensive Tooling
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Chris Traynor

Chris Traynor

Antisyphon Training
Chris began working for Black Hills Information Security (BHIS) in July 2022 as a Penetration Tester, where he is responsible for Pen Testing web apps, mobile app, APIs, and networks. Chris has over 15 years of experience in Web/Mobile App development, QA Automation, and Penetration... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Cadillac Jack's® Gaming Resort - Use SpringHill Suites Entrance 360 Main St, Deadwood, SD 57732, USA

8:30am MDT

Breaching the Cloud
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Beau Bullock

Beau Bullock

Senior Security Analyst, Antisyphon Training
Beau is a Senior Security Analyst at Black Hills Information Security where he performs penetration tests and red team assessments. He is the author of various red team/pentest tools such as MailSniper, PowerMeta, HostRecon, and DomainPasswordSpray. Beau is a host of the web shows... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Deadwood Gulch Resort, Trademark Collection by Wyndham 304 Cliff St, Deadwood, SD 57732, USA

8:30am MDT

CTI 101
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Wade Wells

Wade Wells

Wade Wells is a seasoned cybersecurity expert with a robust background in threat hunting, cyber threat intelligence, and detection engineering, primarily in the financial sector. Wade holds a master's degree in cybersecurity from Georgia Tech, is a board member of BSides San Diego... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Deadwood Chamber of Commerce 501 Main St, Deadwood, SD

8:30am MDT

Cyber Security Incident Command
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Gerard Johansen

Gerard Johansen

Antisyphon Training
Gerard Johansen is a cyber security professional with over a decade of experience in Incident Response, Digital Forensics, Security Operations and Cyber Threat Intelligence. During his tenure in the cyber security field, Gerard has served as both a digital forensics and instruction... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Homestake Adams Research and Cultural Center - Second Floor 150 Sherman St, Deadwood, SD 57732, USA

8:30am MDT

Defending the Enterprise
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Kent Ickler

Kent Ickler

Antisyphon Training
Kent started his Information Technology career working for an Internet Service Provider supporting the MidWest’s broadband initiatives of the early 2000s. His interest in technology and business operations drove his career into working for multiple Fortune 500 companies and equipping... Read More →
avatar for Jordan Drysdale

Jordan Drysdale

Antisyphon Training
Jordan was around for the inception of Napster and the explosion of P2P networks. This drove his fascination with network systems and led him toward a career in IT. Jordan’s first gig in the industry included supporting Latin American networking customers for Hewlett Packard’s... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

8:30am MDT

Hacking Active Directory: Fundamentals and Techniques
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Dale Hobbs

Dale Hobbs

Antisyphon Training
Dale Hobbs started working with Black Hills Information Security (BHIS) as a contractor in Sept 2020 and came on board as a full-time employee in April 2021 as a Security Analyst. Prior to BHIS, Dale was the Security Manager for a large North American Retail company. Dale wanted to... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Martin Mason Hotel 33 Deadwood St, Deadwood, SD 57732, USA

8:30am MDT

Incident Response Foundations
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Derek Banks

Derek Banks

Antisyphon Training
Derek Banks has been a Security Analyst and Penetration Tester for Black Hills Information Security (BHIS) since 2014, but he has been a part of the IT industry for his entire career. Since graduating college with a BS in Computer Information Systems, Derek has explored many different... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Hampton Inn Deadwood at Tin Lizzie Gaming Resort - Lower Level 531 Main St, Deadwood, SD 57732, USA

8:30am MDT

Intro to IoT Hacking
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Dave Fletcher

Dave Fletcher

David Fletcher has been working for Black Hills Information Security (BHIS) as a Security Analyst since 2015. He has spent most of his career working for the US Air Force and engaged in a variety of disciplines within the IT industry including boundary defense, web and application... Read More →
avatar for Rick Wisser

Rick Wisser

Rick Wisser has been with the Black Hills Information Security (BHIS) team since 2015. He is a Security Analyst, GIAC Certified Incident Handler (GCIH), and a SANS NetWars Level 5 certificate holder. Rick has an associate degree in Electronic Technology and Computer Networking as... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Comfort Inn & Suites Deadwood 225 Cliff St, Deadwood, SD 57732, USA

8:30am MDT

Introduction to Cybersecurity in Space Systems (ICSS): Hardware Edition
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Tim Fowler

Tim Fowler

Tim Fowler joined Black Hills Information Security (BHIS) in September 2021 as a Security Analyst. He previously worked for multiple financial institutions in roles such as Cyber Security Research Scientist, Manager of Cyber Range Operations, and Security Engineering, as well as spending... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Deadwood Gulch Resort, Trademark Collection by Wyndham 304 Cliff St, Deadwood, SD 57732, USA

8:30am MDT

Introduction to Pentesting
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for John Strand

John Strand

Antisyphon Training
John Strand has consulted and taught thousands of classes and hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much-loved former SANS instructor and course author. John is a contributor to the industr... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
John's Home Meet at entrance of DMG by 8 a.m. to carpool

8:30am MDT

Introduction to Python
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Joff Thyer

Joff Thyer

Antisyphon Training
Joff Thyer has been a penetration tester and security analyst with Black Hills Information Security since 2013. Prior to joining the InfoSec world, he had a long career in the IT industry as a systems administrator and an enterprise network architect. He has an Associate’s in Computer... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Cadillac Jack's® Gaming Resort - Use SpringHill Suites Entrance 360 Main St, Deadwood, SD 57732, USA

8:30am MDT

Linux Command-Line for Analysts & Operators
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Hal Pomeranz

Hal Pomeranz

Antisyphon Training
Hal Pomeranz has spent almost forty years working with, and teaching others to manage and secure Unix and Linux systems. He is an independent consultant providing pragmatic Information Technology and Security solutions for some of the world’s largest commercial, government, and... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Homestake Adams Research and Cultural Center - Second Floor 150 Sherman St, Deadwood, SD 57732, USA

8:30am MDT

Modern Webapp Pentesting II: Webapp Internals
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Brian King

Brian King

Antisyphon Training
BB King has been pentesting webapps since 2008. He was the second hire into his employer’s application security team at a time when “PCI” was brand new and long before bug bounty programs – when experienced webapp pentesters had to be made, not found. His internal training... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Hampton Inn Deadwood at Tin Lizzie Gaming Resort - Lower Level 531 Main St, Deadwood, SD 57732, USA

8:30am MDT

Network Forensics and Incident Response
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Troy Wojewoda

Troy Wojewoda

Antisyphon Training
Troy Wojewoda is a security analyst and penetration tester at Black Hills Information Security. Prior to joining BHIS, Troy has held roles in application and system administration, host and network intrusion detection, wireless security, penetration testing, digital forensics, malware... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Cadillac Jack's® Gaming Resort - Use SpringHill Suites Entrance 360 Main St, Deadwood, SD 57732, USA

8:30am MDT

Next Level OSINT
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Mishaal Khan

Mishaal Khan

Mishaal is a highly respected figure in cybersecurity, with expertise in ethical hacking, Open Source Intelligence (OSINT), social engineering, and privacy. Mishaal's engaging approach involves live demos, making cybersecurity accessible and enjoyable, while his strength lies in rapidly... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Deadwood Mountain Grand - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

8:30am MDT

Offense for Defense
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Tim Medin

Tim Medin

Red Siege
Tim is the CEO of Red Siege, a infosec company focusing on pen testing. Tim is a former Senior Instructor and course author (SEC560) at SANS. Through the course of his career, Tim has performed penetration tests on a wide range of organizations and technologies. Tim has gained information... Read More →
avatar for Jason Downey

Jason Downey

Antisyphon Training - Red Siege
Jason Downey is a Security Consultant for Red Siege Information Security. Jason has over ten years of professional experience in IT and information security ranging in a variety of roles in network security roles with additional experience in systems administration. Jason has spoken in front of various audiences ranging from youth initiatives to majo... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Cadillac Jack's® Gaming Resort - Use SpringHill Suites Entrance 360 Main St, Deadwood, SD 57732, USA

8:30am MDT

Ransomware Attack Simulation and Investigation for Blue Teamers
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Markus Schober

Markus Schober

Antisyphon Training
Markus Schober is the founder of a blue team training and consulting company named Blue Cape Security. Prior to that, he served as a manger and Principal Security Consultant at IBM X-Force Incident Response. Over the past decade he has led numerous cyber security breach investigations... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Comfort Inn & Suites Deadwood 225 Cliff St, Deadwood, SD 57732, USA

8:30am MDT

Red Team Initial Access
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Speakers
avatar for Michael Allen

Michael Allen

Antisyphon Training
Michael Allen is a Senior Security Analyst and Red Team Practice Lead who joined the team at Black Hills Information Security (BHIS) in 2019. Having started hacking and picking locks at an early age, Michael has since turned “doing things he’s not supposed to do and going places... Read More →

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Hampton Inn Deadwood at Tin Lizzie Gaming Resort - Lower Level 531 Main St, Deadwood, SD 57732, USA

8:30am MDT

Threat Hunting & Incident Response with Velociraptor
Wednesday October 9, 2024 8:30am - 5:00pm MDT
Please use the Springhill Suite entry - Class will be held in the Charleston II (Lower Level)
Speakers
avatar for Eric Capuano

Eric Capuano

Antisyphon Training
Eric Capuano is a Director at LimaCharlie, co-founder of Recon InfoSec, and SANS DFIR Instructor. He has over a decade experience in Security Operations, Digital Forensics, and Incident Response.
avatar for Whitney Champion

Whitney Champion

Antisyphon Training
Whitney is the Lead Solutions Architect at LimaCharlie and a co-founder of Recon InfoSec. She has over a decade of experience in security operations and large-scale infrastructure automation and orchestration in both the private and public sector.

Wednesday October 9, 2024 8:30am - 5:00pm MDT
Cadillac Jack's® Gaming Resort - Use SpringHill Suites Entrance 360 Main St, Deadwood, SD 57732, USA

11:00am MDT

Airport Con
Wednesday October 9, 2024 11:00am - 4:00pm MDT
The Wild West Hackin’ Fest welcome committee will greet you on Wednesday, Oct. 9th with snacks, bottled waters, coloring books, swag, mini escape room, and lots of smiles. Find them right next to the baggage claim area of the Rapid City Airport. Be sure to check out the shuttle schedule here: https://wildwesthackinfest.com/conference/airport-con/
Speakers
Wednesday October 9, 2024 11:00am - 4:00pm MDT
Rapid City Airport

2:00pm MDT

Conference Registration
Wednesday October 9, 2024 2:00pm - 6:00pm MDT
Speakers
Wednesday October 9, 2024 2:00pm - 6:00pm MDT
Deadwood Mountain Grand - General Sesson 1906 Deadwood Mountain Dr, Deadwood, SD

2:00pm MDT

Spearphish General Store
Wednesday October 9, 2024 2:00pm - 6:00pm MDT
Wednesday October 9, 2024 2:00pm - 6:00pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

5:15pm MDT

Talkin' Bout [infosec] News - Live
Wednesday October 9, 2024 5:15pm - 6:00pm MDT
Wednesday October 9, 2024 5:15pm - 6:00pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

6:00pm MDT

Sponsor Stampede
Wednesday October 9, 2024 6:00pm - 9:00pm MDT
Prepare to join the best little Sponsor Stampede this side of the Mississippi! Prepare to meet your favorite Sponsors as we gather together in Downtown Deadwood for food, drink and little camaraderie.
Wednesday October 9, 2024 6:00pm - 9:00pm MDT
Various Locations on Main Street

8:30pm MDT

Open Mic Night
Wednesday October 9, 2024 8:30pm - 11:00pm MDT
Do you like to sing? Can you tell a joke or two? Perhaps you enjoy playing a musical instrument. Whatever your talent may be, we invite you to join the skilled Rock Stars from BHIS for the Second Annual Open Mic Night. 
Wednesday October 9, 2024 8:30pm - 11:00pm MDT
Elks Club
 
Thursday, October 10
 

7:30am MDT

Conference Registration
Thursday October 10, 2024 7:30am - 6:00pm MDT
Speakers
Thursday October 10, 2024 7:30am - 6:00pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

8:00am MDT

Martial Arts Workout
Thursday October 10, 2024 8:00am - 8:45am MDT
It's only a matter of time before there's an attempt to steal your briefcase full of case files.  Are you prepared?

The WWHF Agent Training Program will cover fundamental self defense techniques. These include: situational awareness, movement, strikes, and escapes from grabs and attacks.  More advanced concepts including ground fighting maybe covered on the second day. 
Speakers
avatar for Cameron Cartier

Cameron Cartier

Security Analyst, Black Hills Information Security
Cameron Cartier joined Black Hills Information Security in 2023 as a Security Analyst. She specializes in web, mobile, and API hacking but likes all new research areas as well. Cameron received a Masters degree in computer science from the University of Utah and she loves to learn... Read More →
Thursday October 10, 2024 8:00am - 8:45am MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

8:45am MDT

Welcome to Wild West Hackin' Fest
Thursday October 10, 2024 8:45am - 9:00am MDT

Thursday October 10, 2024 8:45am - 9:00am MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

9:00am MDT

Dawn of Enlightenment: The Golden Age of Cybersecurity Knowledge and Collaboration
Thursday October 10, 2024 9:00am - 9:50am MDT
The landscape of cyber knowledge and resource sharing has evolved dramatically from guarded secrets to open collaboration over the last 20 years."Dawn of Enlightenment: The Golden Age of Cybersecurity Knowledge and Collaboration" will begin by exploring the 'Dark Ages' of cyber education, where access to knowledge was often restricted by financial barriers or hoarded by the 1337. This retrospective will contrast sharply with modern advancements, where 'dawn broke'. Five, fundamentally distinct, use cases will be presented that highlight the seismic shift in how cybersecurity knowledge is accessed and shared today.As we look to the future, this talk will not only educate and entertain but also inspire. Every attendee will be equipped with a variety of tooling that aligns for different personality types and CHALLENGED to take up the mantle of openness and collaboration, ensuring that the spirit of this new age continues to thrive. Prepare to be inspired, educated, and entertained!
Speakers
avatar for Dr. Gerald Auger

Dr. Gerald Auger

Dr. Auger is a 20+ year cybersecurity professional, academic, and author. He has been the cybersecurity architect at MUSC, a multi-billion dollar academic medical center. He has built cybersecurity programs from the ground up, educates as Adjunct Faculty in The Citadel Military College... Read More →

Thursday October 10, 2024 9:00am - 9:50am MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

10:00am MDT

{JWT}.{Misuse}.&Abuse
Thursday October 10, 2024 10:00am - 10:50am MDT
JWTs are an incredibly flexible tool that make life easier for developers because they are standardized, widely supported, and include important security features by default. However, like any powerful tool, JWTs can be dangerous when used incorrectly, or for unintended purposes. In this talk, I aim to shine a light on common JWT misuse and abuse. I'll start by briefly describing JWTs and common use cases for them. I'll then present real world scenarios of misuse and abuse from applications that I've tested as a consultant, and written as an engineer. As I present each scenario, I'll demonstrate the various features and failures live, and discuss how the specific implementation of JWTs can be hardened. The end result will be an enlightening and entertaining presentation of information and experience that will provide the viewer with a practical knowledge of how, and how not, to use JWTs.
Speakers
avatar for Tim Tomes

Tim Tomes

Application Security Engineer with extensive experience in the information technology and security industries. Experience ranges from software development to full-scope penetration testing (red teaming) as both a technician and leader for both the United States Military and private... Read More →

Thursday October 10, 2024 10:00am - 10:50am MDT
Deadwood Mountain Grand - Track 1 1906 Deadwood Mountain Dr, Deadwood, SD

10:00am MDT

Tackling the AI Spin Cycle: A Briefing on AI Governance, Laws, and Tools
Thursday October 10, 2024 10:00am - 10:50am MDT
This presentation titled "Tackling the AI Spin Cycle: A Briefing on AI Governance, Laws, and Tools" will introduce the conference attendee to the complex landscape of artificial intelligence (AI) governance and regulation. As AI technologies continue to evolve rapidly, it has become increasingly important to establish robust frameworks to ensure ethical and responsible deployment.
Everything is Piling Up! We will explore the mess of AI governance, including legal, ethical, and technical considerations. We will navigate through the spin cycle of existing laws and regulations governing AI, highlighting both their strengths and limitations in addressing the unique challenges posed by AI applications.
We'll sort the delicates from the heavy duty by looking at emerging tools and methodologies designed to facilitate effective AI governance, including transparency mechanisms, accountability frameworks, and ethical AI guidelines.
By providing insights into the current state of AI governance and offering practical guidance on navigating this evolving landscape, this presentation aims to sort through the mess and give the conference attendee of feeling comfortable in their own clothes by understanding AI governance better.



Speakers
avatar for Kelli Tarala

Kelli Tarala

Kelli Tarala is a cybersecurity consultant, author, and speaker. She is the founder of Enclave Security and Auditscripts.com, and currently enjoys Governance, Risk, Compliance, and Privacy consulting at Black Hills Information Security.As an industry-recognized subject matter expert... Read More →

Thursday October 10, 2024 10:00am - 10:50am MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

10:00am MDT

Playing the game of tag with modern day AV and EDRs: A guide to evading the watchdogs.
Thursday October 10, 2024 10:00am - 10:50am MDT
The perpetual race to safeguard and secure our infrastructures have given birth to robust defensive mechanisms, such as antiviruses (AV), Endpoint Detection and Response (EDRs), and Extended detection and response (XDR) just to name a few. Over the years the detection methodologies employed by them have evolved. From the very basic string and hash matching techniques, defensive mechanisms have enhanced their capabilities by employing machine learning, in memory scanning and other sophisticated techniques. From the perspective of a maldev, developing a malware is considerably easier as compared to evading it.
In this talk we will discuss various techniques employed by maldevs to circumvent detection measure implemented by modern day AVs and EDRs. This talk will solely focus on the Windows ecosystem. We will discuss the nitty gritties of the Windows OS, followed by various detection techniques implemented by AVs and EDRs. After understanding the detection methods we will shift our focus on various techniques that can be implemented to bypass aforementioned detection techniques. Some techniques included are Unhooking, BlockDLL, Repatching, API Hashing, ETW and AMSI patching etc.
In order to better understand the concepts discussed, we present real life PoCs. These PoCs will showcase the discussed evasion techniques on a popular red teaming tool (Juicy Potato). Furthermore these PoCs will showcase the exact detection methods and how we were able to bypass them to gain access.
Speakers
avatar for Aryan Jogia

Aryan Jogia

Aryan is a security researcher with over 3+ years of experience. He’s a full time maldev and loves to evade AV and EDRs. His research interests are not just limited to Windows, but he even develops low level code for *nix systems. Even though his expertise lies in the domain of... Read More →
avatar for Chetanya Kunndra

Chetanya Kunndra

Chetanya Kunndra is a security researcher with over 2+ years of experience. His major area of expertise lies within the domain of pentesting and red teaming. Apart from red teaming, he has a knack for developing automation toolkits. He often dabbles with maldev and reverse engineering... Read More →

Thursday October 10, 2024 10:00am - 10:50am MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

10:00am MDT

BHIS Content and Community Meetup
Thursday October 10, 2024 10:00am - 12:00pm MDT
We would love the opportunity to meet the community. Join Deb, Zach, and Jason from the BHIS and Antisyphon webcasts, and part of the Content & Community team, at Wild West Hackin' Fest. We love getting to meet you. We've talked AT you through the webcasts, now we want to talk WITH you in person. So, if you're available and want to come meet others from Discord, LinkedIn, and all the other places the community gathers, then this is a great opportunity for us to all get to know each other and become friends! 

Martin Mason Hotel Ballroom, 33 Deadwood St., Deadwood
Thursday October 10, 2024 10:00am - 12:00pm MDT
Martin Mason Hotel 33 Deadwood St, Deadwood, SD 57732, USA

10:00am MDT

Wrangling Identity in the AWS Cloud with your DevSecOps Lasso
Thursday October 10, 2024 10:00am - 12:00pm MDT
One of the most important foundations in cloud is identity and access management. Striking the right balance of velocity, guardrails, and acceptable risk is incredibly challenging.  Fortunately it’s easy to close those gaps with open source tooling and cloud provider tools. In this workshop we’ll explore CI/CD workflows, IAM Policy creation, and continuous auditing for the AWS Cloud. Attendees will leave the workshop with a firm understanding of how to integrate AWS with Github actions, AWS Codebuild, Codepipeline, and more. Don’t miss this session with Antisyphon instructor Andrew Krug. Attendees should bring a laptop with any modern Linux virtual machine or MacOS.
Speakers
avatar for Andrew Krug

Andrew Krug

Andrew Krug is a Security Geek specializing in Cloud and Identity and Access Management. Krug brings 15 years experience at the intersection of security, education, and systems administration. As a fierce advocate for Open Source and founder of ThreatResponse tool suite, Andrew has... Read More →

Thursday October 10, 2024 10:00am - 12:00pm MDT
Homestake Adams Research and Cultural Center - Second Floor 150 Sherman St, Deadwood, SD 57732, USA

10:00am MDT

Practical Soldering
Thursday October 10, 2024 10:00am - 12:00pm MDT
Are you interested in learning how to solder? Well you are in luck! This year Rick Wisser and Dave Fletcher from BHIS have put together a soldering workshop where you can get some hands on experience soldering on a working project. Rick and Dave have had several years of experience related to all types of soldering related to contract manufacturing of printed circuit boards. The goal of the workshop is to get you familiar with soldering and how to avoid common mistakes in solder techniques. Rick and Dave will share proper techniques, tips, and pointers that simplifies the manual soldering process.
Speakers
avatar for Dave Fletcher

Dave Fletcher

David Fletcher has been working for Black Hills Information Security (BHIS) as a Security Analyst since 2015. He has spent most of his career working for the US Air Force and engaged in a variety of disciplines within the IT industry including boundary defense, web and application... Read More →
avatar for Rick Wisser

Rick Wisser

Rick Wisser has been with the Black Hills Information Security (BHIS) team since 2015. He is a Security Analyst, GIAC Certified Incident Handler (GCIH), and a SANS NetWars Level 5 certificate holder. Rick has an associate degree in Electronic Technology and Computer Networking as... Read More →

Thursday October 10, 2024 10:00am - 12:00pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

10:00am MDT

Spearphish General Store
Thursday October 10, 2024 10:00am - 6:00pm MDT
Thursday October 10, 2024 10:00am - 6:00pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

10:00am MDT

Sponsor Exhibits
Thursday October 10, 2024 10:00am - 6:00pm MDT
Thursday October 10, 2024 10:00am - 6:00pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

10:00am MDT

Hands-on-Labs
Thursday October 10, 2024 10:00am - 6:00pm MDT
Thursday October 10, 2024 10:00am - 6:00pm MDT
Deadwood Mountain Grand - Main Stage 1906 Deadwood Mountain Dr, Deadwood, SD

10:00am MDT

MetaCTF
Thursday October 10, 2024 10:00am - 6:00pm MDT
Thursday October 10, 2024 10:00am - 6:00pm MDT
Deadwood Mountain Grand - Main Stage 1906 Deadwood Mountain Dr, Deadwood, SD

10:00am MDT

ProCircular Escape Room - Sponsored by Gravwell
Thursday October 10, 2024 10:00am - 6:15pm MDT
Step into the shoes of a cybersecurity professional in the form of a cyber escape room experience. In this interactive session, you and your team will face a simulated crisis: A cyber attacker, has breached your company's defenses and is stealing sensitive data. Your mission? Work together to uncover the hacker's username and password, track down the stolen files, and identify the type of information that has been compromised.
 
This scenario challenges participants to think critically and collaborate effectively. A mysterious briefcase, filled with cryptic clues and hidden messages, has been left behind by the attacker. To thwart the hacker's plans, you'll need to decipher the clues, recognize phishing attempts, and classify the compromised data. As you progress, you’ll learn cybersecurity skills, such as creating strong passwords, cryptography basics, phishing email identification, and data classification skills, while racing against the clock to secure your company’s most valuable assets.
 
Can your team outsmart the hacker and prevent a data breach? Join us in the ProCircular Cyber Escape Room to find out!
Speakers
avatar for Brandon Potter

Brandon Potter

CTO, ProCircular
With over 20 years of experience in Information Technology, including 14 years in cybersecurity, Brandon brings a wealth of knowledge and a dynamic approach to the industry. He excels at forging strong partnerships with clients, understanding their unique business objectives, and... Read More →
Sponsors
avatar for Gravwell

Gravwell

Get the best out of your data, even the binary kind. Our built-from-scratch modern solution offers unrestricted data ingest and powerful root cause analysis. Cut through the cybersecurity noise with half the compute power. Ideal for from SOC Analysts to CISOs and even IT heroes who... Read More →
Thursday October 10, 2024 10:00am - 6:15pm MDT
Deadwood Mountain Grand - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

11:00am MDT

Digital Doppelgängers: The Dual Faces of Deepfake Technology
Thursday October 10, 2024 11:00am - 11:50am MDT
In society, evolving artificial intelligence leverages cutting-edge technology to create synthetic text, audio, and video clips at a concerning rate. These emerging innovations pose significant threats to organizations' cybersecurity protocols and defenses. This presentation examines the multifaceted nature of deepfakes, offering insights into their creation and detection, what organizations need to do to educate their users, and the technology available to protect against these latest strains of social engineering attacks.
Speakers
avatar for James McQuiggan

James McQuiggan

Security Awareness Advocate, KnowBe4
James McQuiggan has over 20 years of experience in cybersecurity and is currently Security Awareness Advocate for KnowBe4, where he is responsible for amplifying the organization’s messaging related to the importance of, effectiveness of and the need for new-school security awareness... Read More →

Thursday October 10, 2024 11:00am - 11:50am MDT
Deadwood Mountain Grand - Track 1 1906 Deadwood Mountain Dr, Deadwood, SD

11:00am MDT

I didn't waste my life gaming - I learned cyber security
Thursday October 10, 2024 11:00am - 11:50am MDT
This presentation offers an exploration into the origins, innovations, and implications of hacking in the gaming industry. In a virtual world where pixels and code meet human creativity, video games have taken off in popularity within the last 70 years. Beginning with a look at the rudimentary hacks of early classics, we will explore how the earliest video game hacks shaped the future of gaming and cybersecurity. From memory manipulation and code injection using tools like GameShark and Cheat Engine, to the creative exploitation of glitches and zero day discoveries such as Log4Shell, video games have always been a target for manipulation aimed at gaining an unfair advantage. There have been notable video game hacks that have impacted security as a whole, and these could continue to get more severe as more complex technology emerges with the rise of virtual reality. This journey will walk through the evolution and predictions for what video game and virtual reality hacking could mean for the future of security. By examining the intersection of video gaming and security, this can offer insights that are relevant to practitioners, researchers, and gamers alike.
Speakers
avatar for Jenna Lawrence

Jenna Lawrence

Jenna Lawrence is a Security Engineer at L2 Cyber Solutions based in Denver, Colorado. Most of her day-to-day work is consulting on a government contract with a focus on maintaining security related documentation and managing vulnerabilities in the organization. Previously, she was... Read More →
avatar for Samantha Peters

Samantha Peters

Samantha Peters is an industry professional and Army veteran currently working full time as an enterprise penetration tester. I've always had a natural curiosity and stubbornness which led to a lot of late nights trying to understand why and how video games and their exploits worked... Read More →

Thursday October 10, 2024 11:00am - 11:50am MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

11:00am MDT

Designing Active Directory Job Functional Security - One Group for Least Privilege
Thursday October 10, 2024 11:00am - 11:50am MDT
Speakers
avatar for Kent Ickler

Kent Ickler

Antisyphon Training
Kent started his Information Technology career working for an Internet Service Provider supporting the MidWest’s broadband initiatives of the early 2000s. His interest in technology and business operations drove his career into working for multiple Fortune 500 companies and equipping... Read More →
Thursday October 10, 2024 11:00am - 11:50am MDT
Deadwood Mountain Grand - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

12:00pm MDT

Lunch
Thursday October 10, 2024 12:00pm - 1:00pm MDT
Thursday October 10, 2024 12:00pm - 1:00pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

12:30pm MDT

Book Signing
Thursday October 10, 2024 12:30pm - 1:00pm MDT
Join us for an exclusive book signing with Mishaal Khan, the co-author of “The Phantom CISO”. Meet the author, bring your copy or grab one on-site, and enjoy the chance to chat with him all week long!
Speakers
avatar for Mishaal Khan

Mishaal Khan

Mishaal is a highly respected figure in cybersecurity, with expertise in ethical hacking, Open Source Intelligence (OSINT), social engineering, and privacy. Mishaal's engaging approach involves live demos, making cybersecurity accessible and enjoyable, while his strength lies in rapidly... Read More →
Thursday October 10, 2024 12:30pm - 1:00pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

12:30pm MDT

CTF 101 – How to Play and Win
Thursday October 10, 2024 12:30pm - 1:00pm MDT
Capture the Flag (CTF) competitions offer a great way to acquire new technical skills while having fun and meeting new people. If you have never participated in a CTF event before, it can feel intimidating to try. This quick talk will walk you through the different types of cybersecurity competitions and go over jeopardy-style CTFs. You will learn what skills are needed to participate, how to approach the challenges, and what are some of the common tools you may want to be familiar with. We will go over a few example CTF challenges as a group. We hope that you walk away not only with some new security skills but also the confidence to participate in a CTF on your own.
Speakers
RB

Roman Bohuk

MetaCTF
Roman Bohuk is the co-founder and CEO of MetaCTF, a cybersecurity training company. Since 2014, his team has run over 250 cybersecurity competitions for various universities, Fortune 500 companies, and conferences, including the 2023 International Cybersecurity Challenge and the 2023... Read More →
Thursday October 10, 2024 12:30pm - 1:00pm MDT
Deadwood Mountain Grand - Main Stage 1906 Deadwood Mountain Dr, Deadwood, SD

1:00pm MDT

Unlocking Physical Security: 3D Printing Your Way Inside
Thursday October 10, 2024 1:00pm - 1:15pm MDT
Every hacker wants more cool stuff and many of us have a 3D printer gathering dust in the corner. In my presentation "Unlocking Physical Security: 3D Printing Your Way Inside." I will inspire the audience to buy more filament and start preheating their print beds to extrude a collection of valuable physical security tools (both offensive and defensive). This talk goes over a handful of original (never before seen) designs, 3D-printable versions of existing tools, explains how to use each tool with demonstration videos, offers practical advice to those who want to 3D print their own physical security tools, and shows the audience where they can find my models and others to print.
Speakers
avatar for Noah Pack

Noah Pack

Noah Pack is a penetration tester at WebCheck Security with 10+ years of experience in 3D printing and CAD. Noah owns and operates JPID Engineering, a 3D printing and consulting business. He has hundreds of downloads of his CAD models from websites like Printables, Thingiverse, and... Read More →

Thursday October 10, 2024 1:00pm - 1:15pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

1:00pm MDT

Gravwell CE for Logs: The Truth Is In There
Thursday October 10, 2024 1:00pm - 1:30pm MDT
Whether you're experimenting in your homelab or building "Management Pacification Dashboards" for work, logs are crucial.

Join Gravwell founder Corey Thuen as he uses the Gravwell CE (free 15gb/day for personal OR commercial use) to teach basic log correlation, plus a bit of advanced techniques to show the "art of the possible".
Speakers
avatar for Corey Thuen

Corey Thuen

Gravwell Co Founder & CEO, Gravwell
Corey Thuen co-founded Gravwell to enable log management of every data type an organization might need for success -- analyzing binary packets alongside syslog with a dash of business KPIs enables analytics that improve the entire organization, not just reduce security risk.Prior... Read More →

Thursday October 10, 2024 1:00pm - 1:30pm MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

1:00pm MDT

EDR Internals for macOS and Linux
Thursday October 10, 2024 1:00pm - 1:50pm MDT
Endpoint Detection and Response (EDR) agents typically comprise multiple sensory components that collect information from various telemetry sources the operating system provides. Many public blogs and conference talks have covered Windows telemetry sources, such as kernel callbacks and ETW, but only some mention macOS and Linux equivalents.

Developers using macOS often have privileged cloud accounts or access to intellectual property such as source code. Linux servers may host customer-facing interfaces or applications that access sensitive databases. Defenders must have confidence in their tools for these systems, and attackers must understand how to evade them.

This talk will detail telemetry sources available to EDR on macOS and Linux and compare them to Windows equivalents. The sources commonly used to monitor process creation, shared library loading, networking, and file activity will be described based on the presenter's observations while reverse engineering popular EDR agents.
Speakers
avatar for Kyle Avery

Kyle Avery

Kyle Avery has been interested in computers for his entire life. Growing up, he and his dad self-hosted game servers and ran their own websites. He focused on offensive security in university and has spent the last few years learning about malware and post-exploitation. Kyle previously... Read More →

Thursday October 10, 2024 1:00pm - 1:50pm MDT
Deadwood Mountain Grand - Track 1 1906 Deadwood Mountain Dr, Deadwood, SD

1:00pm MDT

The Hackening: Lessons learned compromising MSPs!
Thursday October 10, 2024 1:00pm - 1:50pm MDT
The security community often criticizes MSPs, claiming they offer lax security, don't take security seriously, and generally implement weak practices. Some presentations even use "fake" MSP breaches as their foundation.
But what if we actually tested this ourselves?
Join Matt Lee and Jason Slagle as they delve into the data and lessons learned from attempts to breach MSPs. We'll review findings from our efforts to assess and breach a sample of 60 MSPs that volunteered for this study.
Will we succeed? Will we be blocked? What commonalities and weaknesses will we uncover? Join us to discover what we learned.
Speakers
avatar for Matt Lee

Matt Lee

Matt Lee has dedicated the last 13 years to raising the cyber security tide in the SMB, and MSP markets. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction, and security/compliance, protected... Read More →
avatar for Jason Slagle

Jason Slagle

Jason Slagle is a many year veteran of systems and network administration. Having worked on everything from Linux systems to Cisco networks and SAN storage, he is always looking for ways to make his work repeatable and automated.  Jason has recently taken up a more active interest... Read More →

Thursday October 10, 2024 1:00pm - 1:50pm MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

1:00pm MDT

Level Up OSINT
Thursday October 10, 2024 1:00pm - 3:00pm MDT
Dive into the dynamic world of Open Source Intelligence (OSINT) with this two-hour workshop designed to give you a tantalizing taste of practical online investigations and threat hunting. Led by a seasoned professional, this immersive session offers a condensed yet impactful introduction to essential OSINT techniques.

Experience the power of hands-on learning as you engage in live demonstrations, exploring key concepts such as operational security (OpSec), search engine queries, username and phone number lookups, social media reconnaissance, breached records analysis, government data exploration, network reconnaissance, historical records, and essential documentation, all within the span of this engaging workshop. Through interactive exercises and guided discussions, participants will gain a glimpse into the world of OSINT.

Join us for this brief yet immersive journey into the realm of online investigations and threat hunting, and take your first step towards mastering the art of OSINT.
Speakers
avatar for Mishaal Khan

Mishaal Khan

Mishaal is a highly respected figure in cybersecurity, with expertise in ethical hacking, Open Source Intelligence (OSINT), social engineering, and privacy. Mishaal's engaging approach involves live demos, making cybersecurity accessible and enjoyable, while his strength lies in rapidly... Read More →

Thursday October 10, 2024 1:00pm - 3:00pm MDT
Homestake Adams Research and Cultural Center - Second Floor 150 Sherman St, Deadwood, SD 57732, USA

1:25pm MDT

Mind Over Malware: Harnessing Psychology to Fortify Cybersecurity
Thursday October 10, 2024 1:25pm - 1:40pm MDT
Discover how psychological theories can revolutionize cybersecurity practices! This presentation explores the transformative potential of Attention Restoration Theory (ART) and Social Cognitive Theory (SCT) in enhancing cybersecurity measures. By optimizing work environments to rejuvenate mental focus (ART) and leveraging social influences and self-efficacy to boost security compliance (SCT), let's shed light on strategies that minimize human errors and amplify vigilance. Dive into a session that blends theory with practical solutions, paving the way for a cybersecurity culture that's as robust as user-centric. Get ready to shift from traditional defenses to psychologically empowered cybersecurity tactics!
Speakers
avatar for Jenn Ferreras

Jenn Ferreras

Jenn, a Malware Threat Hunter who mistakenly took a turn into cybersecurity while chasing a particularly deceptive flamingo image on Twitter. Now deep in the throes of a cybersecurity Ph.D., Jenn explores the peculiar quirks of human behavior in the digital security realm.Before cybersecurity... Read More →

Thursday October 10, 2024 1:25pm - 1:40pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

1:40pm MDT

Jargon
Thursday October 10, 2024 1:40pm - 2:10pm MDT
Jargon is a shellcode obfuscation method that substitutes dictionary words in place of shellcode bytes and uses each word's position in a dictionary array to resolve the shellcode bytes at runtime. This provides two benefits - your loader doesn't have any shellcode, and the use of dictionary words reduces the entropy of your loader, sidestepping entropy detections built into some AV & EDR. We've found Jargon to be highly effective in evading detection.
Speakers
avatar for Mike Saunders

Mike Saunders

Principal Consultant, Red Siege
Mike Saunders is Red Siege Information Security’s Principal Consultant. Mike has over 25 years of IT and security expertise, having worked in the ISP, banking, insurance, and agriculture businesses. Mike gained knowledge in a range of roles throughout his career, including system... Read More →

Thursday October 10, 2024 1:40pm - 2:10pm MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

1:50pm MDT

Let's Talk Hacking SNMP
Thursday October 10, 2024 1:50pm - 2:05pm MDT
Although Simple Network Management Protocol (SNMP) is a critical protocol for system and network administrators, a comprehensive SNMP version 1/2c/3 hacking methodology has not been clearly documented. This presentation will explain how to correctly perform SNMP password attacks, test SNMP read/write permissions, and how to exploit any successful access. A Python wrapper script will be introduced to automate these tedious steps across a large scope of systems especially given Windows's required access to multi-function devices. In addition to describing how to correctly assess SNMP, recommended approaches for mitigation will be stated so that SNMP can be locked down to to only authorized persons.
Speakers
avatar for Lucas Hennessy

Lucas Hennessy

Lucas Hennessy is a manager at Crowe LLP where he leads the penetration testing services for the financial services industry. He graduated from Purdue University with a Bachelor of Science double major in Cybersecurity and Network Engineering Technology. Having spent two years competing... Read More →

Thursday October 10, 2024 1:50pm - 2:05pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

2:00pm MDT

Red Team Tactics in a DevOps Deployment
Thursday October 10, 2024 2:00pm - 2:50pm MDT
Ever wondered how a red team targets DevOps automation and CI/CD environments? Join us as we provide unique insight into a real-world attack path that ended in a complete compromise of an organizations cloud resources and third-party platforms. In this presentation, we will uncover some red team tradecraft that highlights the difficulty of securing build servers, deployment processes, and source-code repositories. We will look at what was done right, what was done wrong, and how understanding your target environment can lead to bringing down the house of cards without ever stepping onto the internal network. This is a high-paced technical talk that includes initial access, lateral movement, privilege escalation, evasion, and persistence of a CI/CD deployment in the cloud.
Speakers
avatar for Mike Felch

Mike Felch

Mike Felch (known online as @ustayready) is a red teamer with over 25 years in cybersecurity. Mike works as a Principal Security Consultant at TrustedSec on the Targeted Ops red team where his primary focus is on long-term engagements covering a variety of technology stacks, network... Read More →

Thursday October 10, 2024 2:00pm - 2:50pm MDT
Deadwood Mountain Grand - Track 1 1906 Deadwood Mountain Dr, Deadwood, SD

2:00pm MDT

Hack the Boardroom: Mastering the Art of Communicating Cyber Risks to Secure Funding
Thursday October 10, 2024 2:00pm - 2:50pm MDT
In today’s relentless cybersecurity battlefield, technical teams often find themselves lost in translation when conveying complex risks and vulnerabilities to senior executives and board members. Breaking through this communication barrier is essential for securing the support and funding necessary to drive pivotal cybersecurity initiatives.
Speakers
avatar for Jaclyn (Jax) Scott

Jaclyn (Jax) Scott

Jaclyn "Jax" Scott is a distinguished leader within the cybersecurity sector, bringing together nearly 16 years of in-depth experience both from the military and civilian sectors spanning IT and cybersecurity. A key highlight of her career includes critical strategic support to global... Read More →

Thursday October 10, 2024 2:00pm - 2:50pm MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

2:00pm MDT

SOC Meet and Greet
Thursday October 10, 2024 2:00pm - 4:00pm MDT
**Join Us for the SOC Meet and Greet!**

Ever wondered what it takes to run a successful Security Operations Center (SOC) program? Are you interested in learning how to effectively protect organizations from evolving threats?

Don’t miss the opportunity to connect with experts in the field at our inaugural SOC Meet and Greet! This event is designed for professionals at all levels who want to deepen their understanding of SOC operations and enhance their skills.


Thursday 2 p.m. to 4 p.m. - Martin Mason Ballroom, 33 Deadwood Street, Deadwood
Thursday October 10, 2024 2:00pm - 4:00pm MDT
Martin Mason Hotel 33 Deadwood St, Deadwood, SD 57732, USA

2:15pm MDT

Evil Twin Attack Without WiFi Pineapple
Thursday October 10, 2024 2:15pm - 2:30pm MDT
The goal of the presentation is to showcase how to perform the Evil Twin Attack exploit without the use of a Wifi pineapple as well as to showcase how to bypass randomization of wireless channels on wireless access points
Speakers
avatar for Roy Bull

Roy Bull

Self-Taught Cyber Security Professional with a background in Software Engineering, IT Technical Support, Security Engineering, and proficiency in Electrical engineering and Reverse Engineering.

Thursday October 10, 2024 2:15pm - 2:30pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

2:20pm MDT

Warhorse
Thursday October 10, 2024 2:20pm - 2:50pm MDT
Attack Automation Framework. Existing tool but major rewrite.
Speakers
RM

Ralph May

Ralph is a security analyst and penetration tester at Black Hills Information Security. Ralph is also a co-developer and instructor of the Practical Physical Exploitation course. Before joining BHIS, Ralph spent five years performing offensive operations on a wide range of security... Read More →

Thursday October 10, 2024 2:20pm - 2:50pm MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

2:40pm MDT

Beyond Blacklists: Security in the Age of AI
Thursday October 10, 2024 2:40pm - 2:55pm MDT
As Artificial Intelligence (AI) and Large Language Models (LLMs) diffuse into everyday business use, these new technologies present novel challenges for IT Staff, Security, Compliance and Development Teams. How can practitioners ensure AI is used securely and follows company and industry guidelines? This session will present an overview of AI usage in the enterprise and how companies can safely control and harness this new power that AI can provide.
Speakers
avatar for Feynman Liang

Feynman Liang

Dr. Feynman Liang is the Chief Technology Officer for Blueteam AI with a PhD from UC Berkeley and 10+ years of AI experience. He develops products which enable businesses to confidently adopt GenAI technologies while continuing to meet their security compliance requirements. As @feynman... Read More →

Thursday October 10, 2024 2:40pm - 2:55pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

3:00pm MDT

RITA
Thursday October 10, 2024 3:00pm - 3:30pm MDT
The open source threat hunting tool RITA has just dropped a new version and it has been completely updated. The backend is 10X faster, it has an ASCII graphical interface based on Charm Bracelet BubbleTea, and the workflow has been optimized so that everything is available through a single screen. In this talk I'll show you how to get RITA up and running and how to use it to find potential command and control channels on your network.
Speakers
avatar for Chris Brenton

Chris Brenton

Antisyphon Training
Chris Brenton, COO of Active Countermeasures, has been a leader in the IT and security industry for over 20 years. He’s a published author of multiple security books and the primary author of the Cloud Security Alliance’s online training material. As a Fellow Instructor, Chris... Read More →

Thursday October 10, 2024 3:00pm - 3:30pm MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

3:00pm MDT

Offense for Defense
Thursday October 10, 2024 3:00pm - 3:50pm MDT
This presentation focuses on the offensive tools that defenders should running, to identify high-impact security issues on their network. Explore the proactive advantages of offensive security tools that can be quickly and easily be run by defenders to better protect and defend their network. Attendees will learn how offensive security tools enable defenders to stay ahead of potential adversaries, enhancing network resilience and safeguarding against breaches effectively.
Speakers
avatar for Tim Medin

Tim Medin

Red Siege
Tim is the CEO of Red Siege, a infosec company focusing on pen testing. Tim is a former Senior Instructor and course author (SEC560) at SANS. Through the course of his career, Tim has performed penetration tests on a wide range of organizations and technologies. Tim has gained information... Read More →

Thursday October 10, 2024 3:00pm - 3:50pm MDT
Deadwood Mountain Grand - Track 1 1906 Deadwood Mountain Dr, Deadwood, SD

3:00pm MDT

A Post-Incident Case Study for SMB Response Teams
Thursday October 10, 2024 3:00pm - 3:50pm MDT
This presentation will delve into a real-world cybersecurity incident involving a masked application attack on an SMB environment. Using an anonymized incident narrative, we'll walk through the response process from the perspective of a small to medium-sized business team. The presentation will highlight the importance of early detection, the challenges of identifying sophisticated threats, and the critical role of proper incident response procedures.

We'll examine the attack timeline, from the initial malware download disguised as legitimate software to the attacker's lateral movement and attempts at data exfiltration. Key focus areas will include the significance of user awareness, the value of multi-layered security controls, and the effectiveness of SIEM and endpoint detection solutions in identifying suspicious activities.

The presentation will also cover practical lessons learned, including the importance of least privilege principles, robust password policies, and regular security testing. We'll discuss how SMBs can improve their security posture by implementing these lessons and leveraging available tools and best practices.
By analyzing this incident, attendees will gain valuable insights into real-world attack techniques, effective response strategies, and proactive measures to enhance their organization's cybersecurity resilience. The session will conclude with actionable takeaways for SMBs to better prepare for and respond to similar threats in their own environments.
Speakers
avatar for Amanda Berlin

Amanda Berlin

(@infosystir) Amanda Berlin is a Lead Incident Detection Engineer for Blumira and the CEO and owner of the nonprofit corporation Mental Health Hackers. She is the author for a Blue Team best practices book called Defensive Security Handbook: Best Practices for Securing Infrastructure... Read More →
Thursday October 10, 2024 3:00pm - 3:50pm MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

3:05pm MDT

Tow Away Zone: The Dark-Side of Domain Parking
Thursday October 10, 2024 3:05pm - 3:20pm MDT
Companies or individuals often sit on domains for later use, and can even make a “passive income" off of these unused domains. The monetary incentives of the domain parking system lead to these parked domains becoming littered with malware and potentially putting consumers in danger. This talk is essentially a PSA, and gives an overview of the phenomenon including stakeholder analysis, perverse incentives, and why you might want to reconsider parking your domains.
Speakers
avatar for Cameron Cartier

Cameron Cartier

Security Analyst, Black Hills Information Security
Cameron Cartier joined Black Hills Information Security in 2023 as a Security Analyst. She specializes in web, mobile, and API hacking but likes all new research areas as well. Cameron received a Masters degree in computer science from the University of Utah and she loves to learn... Read More →

Thursday October 10, 2024 3:05pm - 3:20pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

3:15pm MDT

A Hacker's Guide to Mindfulness
Thursday October 10, 2024 3:15pm - 5:15pm MDT
"A Hacker's Guide to Mindfulness" aims to explore the intersection of mindfulness practices and the hacker mindset. Hacker’s are already uniquely trained to question assumptions and just “see what happens”; this is the core curiosity needed to unlock the cheat codes in life via various mindfulness practices.

This workshop will give attendees an introduction to a large amount of mindfulness practices relating them to things most of us do every day in our infosec jobs. We won't just talk about these techniques, we will go through these exercises so the attendees can do them at least once together and have a solid starting point to expand their practice after the workshop.

Workshop topics:
* Core Programming: Understanding how our beliefs were programmed into us at an early age and what we can and should do about that.
* Limiting Beliefs: Identifying and overcoming limiting beliefs that hinder personal and professional growth.
* Brules (Bullshit Rules): Examining and challenging societal and industry norms that may be limiting or outdated.
* Meditation: Exploring different meditation practices and their benefits for mental clarity, stress reduction, and improved focus.
* Breathwork: Techniques for using breathwork to manage stress, increase energy levels, and enhance mindfulness.
* Burnout: Strategies for preventing and recovering from burnout in the fast-paced world of hacking and programming.
* Distraction: Techniques for minimizing distractions and increasing productivity in coding and problem-solving tasks.
* Life Purpose: exploring who am I?, where am I going? and a different approach to goal setting
* Spiritual DevOps: Applying principles of DevOps to spiritual growth, including continuous improvement and collaboration.
Speakers

Thursday October 10, 2024 3:15pm - 5:15pm MDT
Homestake Adams Research and Cultural Center - Second Floor 150 Sherman St, Deadwood, SD 57732, USA

3:30pm MDT

Lessions Learned in a Year of Social Engineering
Thursday October 10, 2024 3:30pm - 3:45pm MDT
Many organizations current policies and controls allow for their helpdesks to reset users passwords and multi-factor authentication, which makes those helpdesks a prime target for social engineering attacks such as those demonstrated in the past by threat actors like the ALPHV/BlackCat ransomware groups. This talk will cover common tactics successfully used by threat actors, and emulated by BHIS's ANTISOC team, as well as policies and procedures that can help deter such attacks.
Speakers
avatar for Alice Thorne

Alice Thorne

Alice is a security analyst on the ANTISOC team for Black Hills Information Security, where she has found success and enjoyment in social engineering.Prior to working at Black Hills Information Security, Alice did stuff and things, where she made memories and had experiences.Outside... Read More →

Thursday October 10, 2024 3:30pm - 3:45pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

3:40pm MDT

Adam and Eve
Thursday October 10, 2024 3:40pm - 4:10pm MDT
Adam and Eve is a Remote Access Tool, socket (and HTTP) server used to interact with Active Directory Environments across the Internet via a Flask API. It is modular so custom commands, as well as custom scripts can be uploaded and invoked on a client machine in real time.
Speakers
avatar for Darryl Baker

Darryl Baker

Darryl G. Baker, CISSP, CEH is a cybersecurity consultant for Trimarc, LLC and is a "Swiss Army Knife" of technology. After serving in the U.S. Army for 10 years, he shifted his focus primarily to technology and cybersecurity. He has published multiple whitepapers, as well as webcasts... Read More →

Thursday October 10, 2024 3:40pm - 4:10pm MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

3:55pm MDT

Getting Started in Entra ID Security
Thursday October 10, 2024 3:55pm - 4:10pm MDT
Speakers
avatar for Jonathan Rogers

Jonathan Rogers

Jonathan Rogers is a lifelong nerd with a never ending curiosity and a passion to know how things work. He loves helping others learn more about cybersecurity and helping them secure their companies. He's the father to an amazing wife and awesome son. As his day job he works as a... Read More →

Thursday October 10, 2024 3:55pm - 4:10pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

4:00pm MDT

The Art of Lurking: Effective C2 Channels
Thursday October 10, 2024 4:00pm - 4:50pm MDT
Lurking means to wait or move in a secret way so that you cannot be seen. On a red team or assumed breach operation, our success hinges on how our implants communicate with us. The way these communications happen - how fast, how often, and how much data is exchanged - is key to realistically mimicking cyber attackers. In this talk, I'll break down the essentials of choosing a Command and Control (C2) channel and share some clever tactics and commonly used services that help us stay under the radar and gain the upper hand in our target's environment. Get ready for a behind-the-scenes look at the stealthy side of cybersecurity.
Speakers
avatar for Corey Overstreet

Corey Overstreet

Senior Security Consultant, Red Siege
Corey has been engaged with Fortune 500 organizations across a variety of industries, including financial services, government services, and healthcare and is widely recognized for his in-depth OSINT talks and workshops. Additionally, he is a Black Hat trainer and has spoken at conferences... Read More →

Thursday October 10, 2024 4:00pm - 4:50pm MDT
Deadwood Mountain Grand - Track 1 1906 Deadwood Mountain Dr, Deadwood, SD

4:00pm MDT

Critical Infrastructure in Critical Condition: Avoiding Doubt in the Face of Fear and Uncertainty
Thursday October 10, 2024 4:00pm - 4:50pm MDT
As a “person of a certain age, with certain experiences”, I can attest that life is fraught with uncertainty. Society is increasingly dependent on undependable technology. (This is, after all, why we all have jobs.) Whether from extreme weather, hostile events, squirrels with poor judgment, or from the random chaos of normal life, disruptions seem increasingly frequent. Incidents are also likely to be more complex, with more chaotic effects. Without electricity for power, communications can be disrupted. Without water, medical care becomes virtually impossible very quickly. The potential effects have gone beyond inconvenient to existential.

Adding fear to uncertainty, China has announced its intention to annex Taiwan by 2027. US cybersecurity leadership has testified that a Chinese hacking group known as Volt Typhoon has been conducting campaigns to pre-position malware in US water infrastructure. The goal of these campaigns is to create a credible threat (disruption of the water supply, with predictable consequences) to the US in support of its annexation of Taiwan.

As civic-minded members of the cybersecurity community, how can we respond to these threats in ways that will avoid encouraging doubt and will inspire confidence in the communities and neighborhoods in which we live? I hope that you will leave this talk better informed, and inspired to do at least one thing in your neighborhood and community that will influence others to do the same
Speakers
avatar for Ray Davidson

Ray Davidson

Ray Davidson recently retired from leading the Michigan Cyber Civilian Corps, which was the first state-sponsored team of civilian incident responders in the country. He is currently working to expand the practice of cyber civil defense across the country, with particular attention... Read More →
Thursday October 10, 2024 4:00pm - 4:50pm MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

4:20pm MDT

Still living with AD(H)D in Infosec
Thursday October 10, 2024 4:20pm - 4:45pm MDT
I’ve been in Infosec for almost 20 years. I also have AD(H)D. This talk is my story; how I kept feeling something was off until diagnosed 5 years ago, what impact ADHD and being diagnosed had on my life and why one should always confront realities and get the best out of it.I'll also talk about what I learned since last year and the talk I did at WWHF 2023 and about which advantages me and others with a similar diagnose has that makes them unique and helped them accomplish great things in life.An important learning for me since I started talking about neurodiversity is that there is an overrepresentation of mental diagnoses in infosec. This is my attempt to educate, break down taboos and inspire others to learn about themselves and others and hopefully get a better life.
Speakers
avatar for Klaus Agnoletti

Klaus Agnoletti

Klaus Agnoletti has been an all-round infosec professional since 2004. As a long-time active member of the infosec community in Copenhagen, Denmark, he co-founded BSides København in 2019. Currently he's a freelance storytelling cyber security advisor specializing in security transformation... Read More →

Thursday October 10, 2024 4:20pm - 4:45pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

4:20pm MDT

PowerPug
Thursday October 10, 2024 4:20pm - 4:50pm MDT
Speakers
avatar for Jake Hildreth

Jake Hildreth

Jake Hildreth is a man of many roles - a devoted husband, a fun-loving dad, and a seasoned IT expert. With over twenty years entrenched in the world of technology, he serves as a trusted Senior Security Consultant at Trimarc, leading Trimarc's Active Directory (AD) Security Assessment... Read More →

Thursday October 10, 2024 4:20pm - 4:50pm MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

5:00pm MDT

DarkWidow
Thursday October 10, 2024 5:00pm - 5:30pm MDT
This is a Dropper/Post-Exploitation Tool targeting Windows machine.

The capabilities it possesses are:
1. Indirect Dynamic Syscall
2. SSN + Syscall address sorting via Modified TartarusGate approach
3. Remote Process Injection via APC Early Bird (MITRE ATT&CK TTP: T1055.004)
4. Spawns a sacrificial Process as the target process
5. ACG(Arbitrary Code Guard)/BlockDll mitigation policy on spawned process
6. PPID spoofing (MITRE ATT&CK TTP: T1134.004)
7. Api resolving from TIB (Directly via offset (from TIB) -> TEB -> PEB -> resolve Nt Api) (MITRE ATT&CK TTP: T1106)
8. Cursed Nt API hashing
9. If blessed with Admin privilege:
Disables Event Log via killing all threads of svchost.exe, i.e. killing the whole process (responsible svchost.exe)

Version 2 is upcoming!
Will be released at BlackHat Asia 2024 at 18th of April, 2024, which has Synthetic Frame Thread Stack Spoofing version enabled.

And in the End, I will showcase my tool demo video which would perform a successful Execution of payload and provide Crystal clear Event Log against Sophos XDR enabled Environment.



Speakers
avatar for Soumyanil Biswas

Soumyanil Biswas

Currently into Security Research. Though I have an electronics background, I have an immense interest in information security. Former Speaker BSides Singapore 2023. Black Hat Asia 2024 Presenter.I'm learning new stuff day in and day out. I'm passionate about offensive security more... Read More →

Thursday October 10, 2024 5:00pm - 5:30pm MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

5:00pm MDT

When I Grow Up, I Wanna Be a Script Kiddie
Thursday October 10, 2024 5:00pm - 5:50pm MDT
Meterpreter session 1 opened! ... "Wait, you're using Metasploit? Pfft, why didn't you write your own custom implant-loader-beacon-shellcode-dropper-payload, you n00b!?! Skill issue, RTFM and git gud." Ah, to tool or not to tool, that is... a question. Whether you're rocking some l33t Arch Linux RICE to write your own custom kernel and C2 framework, or you're hacking with someone else's PowerShell script: join John Hammond for a slap in the face presentation on why your righteous tooling doesn't matter. We'll dig into the good, the bad, and the ugly -- vim or nano? Python or Rust? Who cares... but let's ask why it is up for debate in the first place. Filled to the brim with imposter syndrome, breaking down the gates from gatekeepers, this session is a comedy farce that you've got to `git checkout`. Ya stinkin' script kiddie.
Speakers
avatar for John Hammond

John Hammond

John Hammond is a cybersecurity researcher, educator and content creator. As part of the Research & Development Threat Operations team at Huntress, John spends his days analyzing malware and making hackers earn their access. Previously, as a Department of Defense Cyber Training Academy... Read More →

Thursday October 10, 2024 5:00pm - 5:50pm MDT
Deadwood Mountain Grand - Track 1 1906 Deadwood Mountain Dr, Deadwood, SD

5:00pm MDT

Counter-Terrorism with Strings
Thursday October 10, 2024 5:00pm - 5:50pm MDT
Several real-world case studies will be presented in which analysis of network-based evidence was sufficiently done with nothing more sophisticated than 'strings'.
Speakers
JH

Jonathan Ham

Jonathan Ham is an anthropologist who was academically kidnapped in 1992 and forced into cybersecurity by well-meaning college friends. He was made to learn TCP/IP at the bit-level of protocol structures, and to learn to fight evil at all 7 layers of the OSI model. From the ashes... Read More →

Thursday October 10, 2024 5:00pm - 5:50pm MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

6:00pm MDT

Chuckwagon Steak Dinner
Thursday October 10, 2024 6:00pm - 8:00pm MDT
Your dinner is prepared by the renowned chuck wagon cooking duo, Clayton and Rhonda Sanders.
Steak- Locally grown ball tip sirloin beef steak
Sides- Clayton’s secret recipe; slow-cooked baked beans. Dutch oven sides include fresh sliced fire-fried potatoes with bacon, onion, bell peppers, and seasonings.
Thursday October 10, 2024 6:00pm - 8:00pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

6:15pm MDT

Trivia
Thursday October 10, 2024 6:15pm - 6:45pm MDT
Speakers
Thursday October 10, 2024 6:15pm - 6:45pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

7:00pm MDT

A Knight of Chess
Thursday October 10, 2024 7:00pm - 9:00pm MDT
Thursday October 10, 2024 7:00pm - 9:00pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

7:00pm MDT

Old Time Photos
Thursday October 10, 2024 7:00pm - 10:00pm MDT
Thursday October 10, 2024 7:00pm - 10:00pm MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

7:30pm MDT

Calf Roping and Stick Horse Rodeo
Thursday October 10, 2024 7:30pm - 9:30pm MDT
Don't miss the opportunity to learn from, compete with and chew the fat with Wild West Hackin' Fest very own Cowboy!  Cowboy Carl (aka: John's uncle) will teach you the best techniques for calf roping.

While you are at it, bring you best barrel racing move and compete in the first annual WWHF Stick Rodeo.

These events are sure to keep you grinning!
Speakers
avatar for Cowboy Carl

Cowboy Carl

Join us for an unforgettable experience with Cowboy Carl at the Wild West Hackin' Fest! Hailing from the ranches of Northern South Dakota, Carl brings his authentic cowboy charm and humor to the event. Whether he's sharing tales from the trail or offering insights from his daily ranch... Read More →
Thursday October 10, 2024 7:30pm - 9:30pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

8:00pm MDT

Lockpicking Gun Fight
Thursday October 10, 2024 8:00pm - 9:00pm MDT
Speakers
JH

Jonathan Ham

Jonathan Ham is an anthropologist who was academically kidnapped in 1992 and forced into cybersecurity by well-meaning college friends. He was made to learn TCP/IP at the bit-level of protocol structures, and to learn to fight evil at all 7 layers of the OSI model. From the ashes... Read More →
Thursday October 10, 2024 8:00pm - 9:00pm MDT
Deadwood Mountain Grand - General Sesson 1906 Deadwood Mountain Dr, Deadwood, SD

8:00pm MDT

Whose Slide is it?
Thursday October 10, 2024 8:00pm - 9:00pm MDT
Speakers
Thursday October 10, 2024 8:00pm - 9:00pm MDT
Deadwood Mountain Grand - Main Stage 1906 Deadwood Mountain Dr, Deadwood, SD
 
Friday, October 11
 

6:30am MDT

Run with BHIS
Friday October 11, 2024 6:30am - 7:30am MDT
Speakers
Friday October 11, 2024 6:30am - 7:30am MDT
Meet at Deadwood Mountain Grand Hotel Entrance 1906 Deadwood Mountain Dr, Deadwood, SD

7:30am MDT

Conference Registration
Friday October 11, 2024 7:30am - 5:00pm MDT
Speakers
Friday October 11, 2024 7:30am - 5:00pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

8:00am MDT

Martial Arts Workout
Friday October 11, 2024 8:00am - 8:45am MDT
It's only a matter of time before there's an attempt to steal your briefcase full of case files.  Are you prepared?

The WWHF Agent Training Program will cover fundamental self defense techniques. These include: situational awareness, movement, strikes, and escapes from grabs and attacks.  More advanced concepts including ground fighting maybe covered on the second day. 
Speakers
avatar for Cameron Cartier

Cameron Cartier

Security Analyst, Black Hills Information Security
Cameron Cartier joined Black Hills Information Security in 2023 as a Security Analyst. She specializes in web, mobile, and API hacking but likes all new research areas as well. Cameron received a Masters degree in computer science from the University of Utah and she loves to learn... Read More →
Friday October 11, 2024 8:00am - 8:45am MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

8:45am MDT

Updates and Announcements
Friday October 11, 2024 8:45am - 9:00am MDT
Speakers
Friday October 11, 2024 8:45am - 9:00am MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

9:00am MDT

Hiding in Plain Sight - Shellcode Obfuscation Techniques
Friday October 11, 2024 9:00am - 9:50am MDT
It doesn’t matter how advanced your shellcode loader is, if you don’t protect your shellcode from prying AV & EDR sensors, you’re going to have a bad time. From simple encryption schemes like the Caesar cipher to more complex schemes like AES, reversing arrays, steganography, encoding shellcode as other data types, and other techniques, this talk will cover a variety of ways to hide shellcode in your loader. I’ll demonstrate how these techniques score against many engines using VirusTotal. In some cases, AV engines will detect the decoding routine. I’ll also discuss techniques you can use to break this detection. I will also be sharing a repository demonstrating the different evasion techniques discussed in this talk. Note – this talk will not cover behavioral evasion techniques like unhooking, direct and indirect syscalls, or other evasion techniques. Whether you’re new to obfuscating shellcode or an experienced pro, there’s something in this talk for you!
Speakers
avatar for Mike Saunders

Mike Saunders

Principal Consultant, Red Siege
Mike Saunders is Red Siege Information Security’s Principal Consultant. Mike has over 25 years of IT and security expertise, having worked in the ISP, banking, insurance, and agriculture businesses. Mike gained knowledge in a range of roles throughout his career, including system... Read More →

Friday October 11, 2024 9:00am - 9:50am MDT
Deadwood Mountain Grand - Track 1 1906 Deadwood Mountain Dr, Deadwood, SD

9:00am MDT

GeoINT Mastery: A pixel is worth a thousand words
Friday October 11, 2024 9:00am - 9:50am MDT
After this talk, you will never see images the same way again. This enlightening session explores the dynamic realm of GeoINT (Geospatial Intelligence), a captivating subset of OSINT (Open Source Intelligence) that unlocks a wealth of hidden insights within images and videos. From identifying objects, landscapes, and aircrafts to interpreting symbols, shadows, and reflections, we'll go deep into the art of imagery analysis. Learn how to decode the language of trees, signs, text and logos, and uncover the strategic implications behind seemingly mundane details. This talk promises to give you a taste of some next level skills that you can easily learn as I take you through multiple demos.
Speakers
avatar for Mishaal Khan

Mishaal Khan

Mishaal is a highly respected figure in cybersecurity, with expertise in ethical hacking, Open Source Intelligence (OSINT), social engineering, and privacy. Mishaal's engaging approach involves live demos, making cybersecurity accessible and enjoyable, while his strength lies in rapidly... Read More →

Friday October 11, 2024 9:00am - 9:50am MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

9:00am MDT

Demystifying Deep Fakes
Friday October 11, 2024 9:00am - 9:50am MDT
One area of increasing concern is the use of AI to create deep fakes in order to manipulate the public’s opinion on topics. In this talk, we will learn how AI is used to create deep fakes. We will also discuss current strategies that attendees can use to spot deep fakes and describe existing research and tools used for deep fake detection. After the talk, attendees will have a better understanding of deep fake technology and be armed with some techniques they can use to protect themselves.
Speakers
avatar for Anmol Agarwal

Anmol Agarwal

Dr. Anmol Agarwal is a senior security researcher focused on securing 5G and 6G. Her research interests include AI and Machine Learning security. She is also a part-time adjunct professor teaching Machine Learning to doctoral students. She holds a doctoral degree in cybersecurity... Read More →

Friday October 11, 2024 9:00am - 9:50am MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

9:00am MDT

ProCircular Escape Room - Sponsored by Gravwell
Friday October 11, 2024 9:00am - 4:00pm MDT
Step into the shoes of a cybersecurity professional in the form of a cyber escape room experience. In this interactive session, you and your team will face a simulated crisis: A cyber attacker, has breached your company's defenses and is stealing sensitive data. Your mission? Work together to uncover the hacker's username and password, track down the stolen files, and identify the type of information that has been compromised.
 
This scenario challenges participants to think critically and collaborate effectively. A mysterious briefcase, filled with cryptic clues and hidden messages, has been left behind by the attacker. To thwart the hacker's plans, you'll need to decipher the clues, recognize phishing attempts, and classify the compromised data. As you progress, you’ll learn cybersecurity skills, such as creating strong passwords, cryptography basics, phishing email identification, and data classification skills, while racing against the clock to secure your company’s most valuable assets.
 
Can your team outsmart the hacker and prevent a data breach? Join us in the ProCircular Cyber Escape Room to find out!
Speakers
avatar for Brandon Potter

Brandon Potter

CTO, ProCircular
With over 20 years of experience in Information Technology, including 14 years in cybersecurity, Brandon brings a wealth of knowledge and a dynamic approach to the industry. He excels at forging strong partnerships with clients, understanding their unique business objectives, and... Read More →
Sponsors
avatar for Gravwell

Gravwell

Get the best out of your data, even the binary kind. Our built-from-scratch modern solution offers unrestricted data ingest and powerful root cause analysis. Cut through the cybersecurity noise with half the compute power. Ideal for from SOC Analysts to CISOs and even IT heroes who... Read More →
Friday October 11, 2024 9:00am - 4:00pm MDT
Deadwood Mountain Grand - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

9:00am MDT

Spearphish General Store
Friday October 11, 2024 9:00am - 4:00pm MDT
Friday October 11, 2024 9:00am - 4:00pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

9:00am MDT

Visit the Sponsors
Friday October 11, 2024 9:00am - 4:00pm MDT
Friday October 11, 2024 9:00am - 4:00pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

9:00am MDT

Hands-on-Labs
Friday October 11, 2024 9:00am - 4:00pm MDT
Friday October 11, 2024 9:00am - 4:00pm MDT
Deadwood Mountain Grand - Main Stage 1906 Deadwood Mountain Dr, Deadwood, SD

9:00am MDT

MetaCTF
Friday October 11, 2024 9:00am - 4:00pm MDT
Friday October 11, 2024 9:00am - 4:00pm MDT
Deadwood Mountain Grand - Main Stage 1906 Deadwood Mountain Dr, Deadwood, SD

10:00am MDT

Never Say Anything: NSA Hacking for Defense at Scale
Friday October 11, 2024 10:00am - 10:50am MDT
In my first career, I spent 35 years at the National Security Agency as a Vulnerability Analyst for the defense, from junior analyst to executive manager. I also had the honor of helping found and lead two of the Nation’s largest organizations dedicated to this mission – the Systems and Network Attack Center, and the Vulnerability Analysis and Operational Group. At NSA, Vulnerability Analysis for defense was a “full spectrum” activity, designed to emulate the resources of a nation-state adversary and their ability to operate at scale. In this talk, I’ll offer a historical and personal perspective how this field of analysis evolved from a focus on mathematics and cryptography, through systems and software, and then to “live” operational systems. And what’s it like to spend a career as a cyberdefender for the DoD and the nation, but homed inside of an intelligence agency? We’ll discuss the mission, technical, and cultural interplay of cyberdefense and offense/intelligence as it played out at NSA. War stories, culture clashes, bureaucratic mazes? Of course! But in the end, better security for all.
Speakers
avatar for Tony Sager

Tony Sager

Tony is currently Senior VP & Chief Evangelist for the Center for Internet Security (CIS), leading a wide variety of strategic, partnership, and outreach activities. He led the work which later became known as the CIS Critical Security Controls – an independent, volunteer-developed... Read More →

Friday October 11, 2024 10:00am - 10:50am MDT
Deadwood Mountain Grand - Track 1 1906 Deadwood Mountain Dr, Deadwood, SD

10:00am MDT

Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security
Friday October 11, 2024 10:00am - 10:50am MDT
Alethe takes audiences on a riveting journey into the realm of red teaming through captivating narratives and insightful analysis. Delving into real-life experiences, the keynote unveils the complexities and nuances of red team engagements, showcasing both the spectacular failures, and successful heists that provide invaluable lessons for enhancing organizational security. From epic missteps to meticulously planned operations, attendees will gain a deeper understanding of the pivotal role red teaming plays in fortifying defenses against emerging threats. Through engaging storytelling and practical insights, this presentation offers a compelling exploration of red teaming's transformative impact on shaping the security landscape of tomorrow.
Speakers
avatar for Alethe Denis

Alethe Denis

Senior Security Consultant, Bishop Fox
Alethe Denis is a Senior Security Consultant on the Red Team at Bishop Fox, who has advised and developed solutions and strategies that have driven improvement of global security programs. Her work has helped businesses unlock opportunities to enhance security awareness as well as... Read More →

Friday October 11, 2024 10:00am - 10:50am MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

10:00am MDT

Making the Jump: Everything You Need to Know About Moving into a Cybersecurity Leadership Role
Friday October 11, 2024 10:00am - 10:50am MDT
Does this describe you?

You have years of technical work experience under your belt. You’ve held many different roles and have worked successfully with other teams and departments. You’re great at what you do.

But you also have a spark in you – the one that lights up when you're mentoring new team members or brainstorming solutions with your peers. You have no problem dealing with difficult people and situations. You love a good challenge that requires multiple teams to solve, and people genuinely like working with you.

And you’ve been thinking lately: Should I make the move over to leadership?

Leadership means more responsibility, potentially less hands-on technical work, and maybe even some office politics. But it also means having a bigger voice, the chance to build a team and mentor others, and more opportunities for your career. Staying in your current role means mastering your craft, having more autonomy, and avoiding some of the headaches of management, but it might also mean hitting a ceiling in terms of influence or earning potential.
So, which path is right for YOU? It all boils down to what gets you fired up, what kind of impact you want to make, and where you'll be happiest.
In this talk, you’ll hear all about the good, the bad, and the ugly about being in cybersecurity leadership. You’ll learn about what it takes to succeed as a leader on technical teams. You’ll also learn about some tried-and-true ways of breaking into management roles. Whether you're itching for a change or just curious about your options, this talk will give you the information you need so you can choose your own path.


Speakers
avatar for Naomi Buckwalter

Naomi Buckwalter

Naomi Buckwalter, CISSP CISM, is the Senior Director of Product Security for Contrast Security and author of the LinkedIn course: “Training today for tomorrow's solutions - Building the Next Generation of Cybersecurity Professionals”. She is the founder and Executive Director... Read More →

Friday October 11, 2024 10:00am - 10:50am MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

10:00am MDT

BYOS: Bring Your Own Satellite
Friday October 11, 2024 10:00am - 12:00pm MDT
Speakers
avatar for Tim Fowler

Tim Fowler

Tim Fowler joined Black Hills Information Security (BHIS) in September 2021 as a Security Analyst. He previously worked for multiple financial institutions in roles such as Cyber Security Research Scientist, Manager of Cyber Range Operations, and Security Engineering, as well as spending... Read More →

Friday October 11, 2024 10:00am - 12:00pm MDT
Homestake Adams Research and Cultural Center - Second Floor 150 Sherman St, Deadwood, SD 57732, USA

10:00am MDT

Practical Soldering
Friday October 11, 2024 10:00am - 12:00pm MDT
Are you interested in learning how to solder? Well you are in luck! This year Rick Wisser and Dave Fletcher from BHIS have put together a soldering workshop where you can get some hands on experience soldering on a working project. Rick and Dave have had several years of experience related to all types of soldering related to contract manufacturing of printed circuit boards. The goal of the workshop is to get you familiar with soldering and how to avoid common mistakes in solder techniques. Rick and Dave will share proper techniques, tips, and pointers that simplifies the manual soldering process.
Speakers
avatar for Dave Fletcher

Dave Fletcher

David Fletcher has been working for Black Hills Information Security (BHIS) as a Security Analyst since 2015. He has spent most of his career working for the US Air Force and engaged in a variety of disciplines within the IT industry including boundary defense, web and application... Read More →
avatar for Rick Wisser

Rick Wisser

Rick Wisser has been with the Black Hills Information Security (BHIS) team since 2015. He is a Security Analyst, GIAC Certified Incident Handler (GCIH), and a SANS NetWars Level 5 certificate holder. Rick has an associate degree in Electronic Technology and Computer Networking as... Read More →

Friday October 11, 2024 10:00am - 12:00pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

11:00am MDT

Risk AIssessment
Friday October 11, 2024 11:00am - 11:50am MDT
In this talk, we'll present Risk AIssessment - a risk assessment framework for AI-enabled applications. With the rush to embed generative AI in everything but your toaster (oh, it's in that now too?) there are a lack of usable assessment frameworks for organizations that are deploying these AI-enabled applications. The NIST AI RMF is fantastic if you're building AI foundation models or consumer services, but it's ill-suited and overly complex for organizations just adopting an application that has generative AI features. In this talk, we'll introduce the framework and show how organizations can utilize it to evaluate their risk to decide whether to adopt an application, prioritize compensating controls, or select between competing applications. Finally, we'll share case studies from using Risk AIssessment in numerous consulting engagements and show how it can be used in your organization to highlight risks.
Speakers
avatar for Jake Williams

Jake Williams

Jake Williams (aka MalwareJake) is a seasoned security researcher with decades of experience in the technology and security industries. Jake is a former startup founder, former senior SANS instructor and course author, and an intelligence community and military veteran. He loves forensics... Read More →

Friday October 11, 2024 11:00am - 11:50am MDT
Deadwood Mountain Grand - Track 1 1906 Deadwood Mountain Dr, Deadwood, SD

11:00am MDT

Offensive Lab Environments - Without the Suck
Friday October 11, 2024 11:00am - 11:50am MDT
From building payloads, testing evasions, and practicing offensive techniques, a must-have for every seasoned tester is a lab environment. Join Travis as he demonstrates various methods for deploying dynamic AD lab environments for attack simulation with ease.
Speakers
avatar for Travis Kaun

Travis Kaun

Travis began his Information Security career-building *nix chops by managing firewalls and monitoring intrusion detection systems. After time spent on the defensive side in corporate roles, Travis put on an offensive cap for a consulting role and hasn’t looked back. Travis is a... Read More →

Friday October 11, 2024 11:00am - 11:50am MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

11:00am MDT

Not Doomed…Yet
Friday October 11, 2024 11:00am - 11:50am MDT
Let’s talk about the elephant in the room—or rather, the AI in the network. It's causing more drama than the 2017 Tay bot on Twitter. Sorry, not sorry, I meant “X”. From GenAI hoodwinking finance firms out of $25 million, to the shocking revelation that 77% of companies found their AI sitting in the corner with a dunce cap, marked "breached" in the past year. This conversation isn’t about whether ChatGPT is a security issue; it’s the fact that securing AI holes are big enough to drive a bus through. Sideways. This talk is more than just a chance to poke fun at our collective cybersecurity misfortunes; it’s a call to action. Because if we can’t laugh at our impending digital doom, what can we do? (Hint: Fix it. We can actually fix it.)
Speakers
avatar for Chloé Messdaghi

Chloé Messdaghi

CEO & Founder, SustainCyber
Chloé Messdaghi is a cybersecurity leader dedicated to building strong relationships that drive the development of security standards and policies. She spearheads initiatives to strengthen AI security measures and fosters collaborative efforts to enhance industry-wide practices... Read More →

Friday October 11, 2024 11:00am - 11:50am MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

12:00pm MDT

Lunch
Friday October 11, 2024 12:00pm - 1:00pm MDT
Friday October 11, 2024 12:00pm - 1:00pm MDT
Deadwood Mountain Grand - General Session 1906 Deadwood Mountain Dr, Deadwood, SD

1:00pm MDT

Jigsaw
Friday October 11, 2024 1:00pm - 1:30pm MDT
Jigsaw is a shellcode obfuscation routine designed to hide your shellcode without requiring the use of encryption routines. Jigsaw works by generating an array (positions[]) the size of your shellcode and populates the array with random numbers, each representing a unique position in the original shellcode array. Jigsaw then creates a new shellcode array, jigsaw[], by iterating through the array of randomized positions. If first entry of the randomized positions array (positions[0]) is 100, then Jigsaw selects the byte at shellcode[100] and inserts it into jigsaw[0]. Jigsaw repeats this process until all shellcode bytes have been populated to the jigsaw[] array. While this tool is new, our testing indicates very few AV/EDR are aware of this technique. As a result, this technique could be an effective part of your shellcode loader arsenal.
Speakers
avatar for Mike Saunders

Mike Saunders

Principal Consultant, Red Siege
Mike Saunders is Red Siege Information Security’s Principal Consultant. Mike has over 25 years of IT and security expertise, having worked in the ISP, banking, insurance, and agriculture businesses. Mike gained knowledge in a range of roles throughout his career, including system... Read More →

Friday October 11, 2024 1:00pm - 1:30pm MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

1:00pm MDT

All on Red: Shifting the Betting Odds to Defense
Friday October 11, 2024 1:00pm - 1:50pm MDT
You often hear the term, it only takes an adversary one main find to compromise an entire organization. The odds don't seem to be in our favor when it comes to defense. This talk will dive into effective methods to flip the odds into your own favor and things you can do quickly that doesn't take a three year strategic roadmap for. We'll be getting into some techniques you can leverage in deception and detection as well as methods that I've seen stop our red teams in the past. If I were a betting man, my bet is on defense.
Speakers
avatar for David Kennedy

David Kennedy

TrustedSec & Binary Defense Systems
David Kennedy, is the founder of Binary Defense and TrustedSec and is considered an industry leader in cybersecurity. Former Chief Security Officer of Diebold, David has led global cybersecurity teams, testified before Congress, and shapes cybersecurity policy. He co-authored the... Read More →

Friday October 11, 2024 1:00pm - 1:50pm MDT
Deadwood Mountain Grand - Track 1 1906 Deadwood Mountain Dr, Deadwood, SD

1:00pm MDT

That's a Deal and That's a Legally Binding Offer: The Dark Side of AI
Friday October 11, 2024 1:00pm - 1:50pm MDT
Let's explore the darker side of AI! In this talk, we'll dissect various attack vectors such as prompt injection, malicious input designed to manipulate AI output; data extraction, which aim to siphon off sensitive information embedded within AI models; and evasion attacks, a nebulous category that includes techniques to deceive AI systems into incorrect processing or ignoring malicious content altogether.
Speakers
avatar for Brian Mead

Brian Mead

I'm a seasoned cybersecurity professional with over 8 years of hands-on experience specializing in offensive security and conducting red team operations. With a passion for uncovering vulnerabilities and outsmarting adversaries, I thrive in the dynamic and challenging landscape of... Read More →
avatar for TJ Toterhi

TJ Toterhi

I am an information security professional with experience in offensive and defensive operations. I am a penetration tester that's passionate about breaking and fixing systems and software. Realizing that not everyone shares this interest, I enjoy the opportunity to spread the good... Read More →

Friday October 11, 2024 1:00pm - 1:50pm MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

1:00pm MDT

Felon in Five Minutes
Friday October 11, 2024 1:00pm - 2:00pm MDT
Felon in Five Minutes:
 
Peel back the mystique behind the most basic and effective ways that threat actors, criminals, and pentesters breach physical locations. All of these techniques can be done in less than five minutes.
 
Learn how to properly manage expectations and scoping for your next Physical Security adventures.
Speakers
avatar for Joseph Kingstone

Joseph Kingstone

Joseph Kingstone joined Black Hills Information Security (BHIS) in Fall 2021 as a Security Analyst. In this role, Joseph performs external and internal penetration tests, C2 pivots, and red teams. He’s had a desire to work at BHIS since transitioning into IT—and eventually penetration... Read More →

Friday October 11, 2024 1:00pm - 2:00pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

1:00pm MDT

A Journey through Insecure Destialization
Friday October 11, 2024 1:00pm - 4:00pm MDT
Discovering and exploiting Insecure Deserialization vulnerabilities is not a simple task. In some cases, testers are fortunate that the work has been done for them, and a known exploit can be leveraged to exploit this vulnerability. But honestly, that's no fun, and the reality is that sometimes it'll be on the tester to do the hard work. In this workshop, I will take participants on a journey through Insecure Deserialization. Together, we'll discover a novel Insecure Deserialization vulnerability in a custom application, and step through the process of building and executing a zero-day exploit to compromise the affected application and server. At each bend in the trail, we'll explore the specifics of the process and the tools needed, and seek to gain an understanding of how and why developers create these dangerous vulnerabilities. Our journey will end with a discussion about the challenges of remediating Insecure Deserialization flaws, and participants will step back into reality with a new perspective of this potent and mysterious vulnerability.
Speakers
avatar for Tim Tomes

Tim Tomes

Application Security Engineer with extensive experience in the information technology and security industries. Experience ranges from software development to full-scope penetration testing (red teaming) as both a technician and leader for both the United States Military and private... Read More →

Friday October 11, 2024 1:00pm - 4:00pm MDT
Homestake Adams Research and Cultural Center - Second Floor 150 Sherman St, Deadwood, SD 57732, USA

1:40pm MDT

KC7
Friday October 11, 2024 1:40pm - 2:10pm MDT
KC7 is a free cybersecurity game that simulates end-to-end intrusions against a fictional company, using data modeled on real-world threat actors. Players ranging from students to professionals use Kusto Query Language (KQL) within the Azure Data Explorer (ADX) to analyze complex datasets, including Web, Email, and Endpoint logs, answering CTF-style questions that guide them through an investigative journey. At the core of this educational approach is the development of an investigative mindset, through immersive and fun interactive scenarios that span the entire Cyber Kill Chain. These scenarios enhance players' skills in analyzing cybersecurity data and contextualizing it within adversary strategies and tactics.

For WWHF the game scenario will revolve around:

Celestial Cowboy Couture, founded in 2015 and based in Deadwood, South Dakota, specializes in unique, high-quality Western and space-themed apparel, including holographic belts and star-patterned outerwear. The brand's popularity surged after high-profile fashion magazines featured famous male model John Strand in their campaigns, attracting celebrities and athletes alike. However, this increased visibility has also made the company a target for cybercriminals, threatening its digital assets like customer databases and design software.

After demoing how the game is made and a walkthrough of the gameplay experience I will open up the game for attendees to play so they can investigate the intrusion themselves. The game is fun, but the skills learned are real. The integration of threat intelligence encourages a deeper understanding of the operational context of cyber threats. By organizing threat actor behaviors and techniques according to the MITRE ATT&CK framework, the platform creates a diverse array of realistic intrusion scenarios. This method facilitates practical learning of ATT&CK techniques, moving beyond abstract descriptions by allowing participants to experience what these techniques look like in data.



Speakers
avatar for Jibby Saetang

Jibby Saetang

Jibby Saetang, a watchmaker and jeweler, also serves as a Threat Intelligence Analyst and Content Lead at KC7 Foundation. His cybersecurity journey with a cheap laptop from Target. With that, he started exploring platforms like TryHackMe, KC7Cyber, and the Antisyphon Training Cyber... Read More →
Friday October 11, 2024 1:40pm - 2:10pm MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

2:00pm MDT

Abusing API Security
Friday October 11, 2024 2:00pm - 2:50pm MDT
Abusing API Security will discuss how to look at API security in a different way through multiple API attack techniques with a particular focus on GraphQL and gRPC.
Speakers
avatar for Charles Shirer

Charles Shirer

Charles has over 20 years of IT experience with the last 10 years in Information Security. Charles has done systems Adminstration, penetration testing, threat hunting, and security research In his spare time Charles plays retro video games, works on the SEC BSD Open source project... Read More →

Friday October 11, 2024 2:00pm - 2:50pm MDT
Deadwood Mountain Grand - Track 1 1906 Deadwood Mountain Dr, Deadwood, SD

2:00pm MDT

Your Favorite Coffee Shop Is Not Just Serving Espressos: How Threat Actors Use Victims to Create More Victims
Friday October 11, 2024 2:00pm - 2:50pm MDT
99% of US businesses have 20 users or fewer. In this talk we will discuss how to engage and protect the small businesses that form the backbone of our communities. We'll cover how to convey the risks small business insecurity poses to larger businesses downstream from them in the supply chain and some techniques you can bring to your favorite small business.

Speakers
avatar for James Bierly

James Bierly

James is a cybersecurity consultant and co-founder of Secure Point Solutions, He helps small businesses and IT Providers to protect their data, systems, and networks from cyber threats. He has over 10 years of experience in information technology and cybersecurity, with certifications... Read More →

Friday October 11, 2024 2:00pm - 2:50pm MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

2:15pm MDT

Badge Cloning - A Penetration Tester's Guide to Capturing and Writing Badges
Friday October 11, 2024 2:15pm - 4:00pm MDT
In this workshop, we distill key tactics from the comprehensive Practical Physical Exploitation course, tailored specifically for penetration testers looking to attack Physical Access Controls (PACS).

Participants will embark on a journey through the ins and outs of cloning badges during physical penetration tests. Explore the intricacies of long-range, short-range, and Stealth cloning tactics, gaining hands-on experience in the art of badge duplication. Delve into the realm of implantable devices, understanding their role in modern access control exploitation.

Join us as we uncover the nuances of downgrade/upgrade attacks and the protocols that make them possible. Learn to navigate the landscape of access control systems with expert guidance, equipping yourself with the knowledge to identify and exploit vulnerabilities.

By the end of this session, you'll wield an arsenal of cutting-edge techniques, ready to transform your facility into a bastion of high-security readiness. Don't miss this opportunity to elevate your skills and refine your physical security penetration testing skills.
Speakers
RM

Ralph May

Ralph is a security analyst and penetration tester at Black Hills Information Security. Ralph is also a co-developer and instructor of the Practical Physical Exploitation course. Before joining BHIS, Ralph spent five years performing offensive operations on a wide range of security... Read More →

Friday October 11, 2024 2:15pm - 4:00pm MDT
Deadwood Mountain Grand - Track 4 - Backstage 1906 Deadwood Mountain Dr, Deadwood, SD

2:20pm MDT

Wireshark
Friday October 11, 2024 2:20pm - 2:50pm MDT
Wireshark is a great network protocol analyzer and open-source tool used for troubleshooting, analysis, and security testing of networks. It captures and displays data packets traveling across a network in real time. Users can inspect packet details and use this knowledge to assist them in diagnosing network issues and with monitoring traffic.
Using Wireshark, you can filter, and search based on protocols, addresses, or keywords to help in a more targeted analysis of the traffic flowing on a network. It supports research with numerous protocols including TCP, UDP, HTTP and more.
Wireshark is a very user-friendly application which has a good graphical interface which assists in displaying the packet information in an easy-to-read format which includes the source and destination addresses, packet timing, and even payload contents. Wireshark is used for many varied reasons and professions including network administrators, security professionals, and developers alike. It helps these (and others) to better understand network behaviors, troubleshooting connectivity problems and even assist in anomaly detection and/or security threats.
Bottom line is that Wireshark is a great and indispensable tool that will provide deep insight and network behavior for those looking to manage or secure networks.
Speakers
avatar for David Brackin

David Brackin

I am an 80’s child who is late joining the fun in the cybersecurity realm but throughout my life I have worked in various fields, and I have always been involved with computers and tinkering/hacking in one way or another. Whether I was troubleshooting in the U.S. Navy or leading... Read More →

Friday October 11, 2024 2:20pm - 2:50pm MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

3:00pm MDT

Halberd
Friday October 11, 2024 3:00pm - 3:30pm MDT
Halberd is an open source offensive security tool that delivers simple, fast & effective security testing. Leveraging Halberd, security teams can execute attack techniques in cloud via an incredibly simple web interface that can be spun up locally in seconds. Most organizations are hybrid & multi-cloud and setting up / managing tools to test different platforms is hard. Halberd allows users to test across multiple attack surfaces such as Entra ID, M365, Azure and AWS from a single interface. Apart from executing attack techniques, Halberd offers various recon dashboards that allow for advanced information gathering in a target environment and also auditing.
It's developed natively in python and is designed to be incredibly modular, so adding new techniques and even new attack surfaces (GCP is next) is also incredibly easy. Halberd aims to be a powerful attack emulation tool but also a security tool that everyone from a red teamer to a detection engineer can use, so we can all start testing regularly & frequently, and be confident in our defenses.
Speakers
avatar for Arpan Abani Sarkar

Arpan Abani Sarkar

I am a security engineer with extensive experience in detection engineering, threat research and threat hunting. I have worked on developing threat detections to enterprise D&R platforms, built new enterprise threat hunting services and consulted organization on threat hunting & insider... Read More →

Friday October 11, 2024 3:00pm - 3:30pm MDT
Deadwood Mountain Grand - Track 3 - Hotel Lobby 3rd Floor 1906 Deadwood Mountain Dr, Deadwood, SD

3:00pm MDT

Vunerability-cetric Pentesting
Friday October 11, 2024 3:00pm - 3:50pm MDT
Interacting with vulnerabilities is a core security practice. For a pentester, vulnerabilities should form a map to making risk actual, but our tools in this space often get in our way. Sirius Scan is a tactical vulnerability scanner. One dedicated to you, the operator.

In this talk, we will fluidly interact with and exploit network vulnerabilities by leveraging several open-source tools and tying their interactions with vulnerability intelligence.

Speakers
avatar for Matthew Toussain

Matthew Toussain

A graduate of the U.S. Air Force Academy with a B.S. in computer science and the SANS Technology Institute with an M.S. in information security engineering, Matthew has served as the senior cyber tactics development lead for the U.S. Air Force (USAF) and worked as a security analyst... Read More →

Friday October 11, 2024 3:00pm - 3:50pm MDT
Deadwood Mountain Grand - Track 1 1906 Deadwood Mountain Dr, Deadwood, SD

3:00pm MDT

One Arrow, One Breach: The Medieval Mindset in Cyber Defense
Friday October 11, 2024 3:00pm - 3:50pm MDT
In cybersecurity, the wisdom has often been likened to the defense strategies of medieval castles: every attack repelled. This talk, "One Arrow, One Breach," challenges this notion, presenting a shift in approaching cybersecurity. Led by Kevin Johnson, this presentation delves into the antiquated belief that all attacks must be stopped to ensure security. Drawing parallels with medieval defense, Kevin argues for a strategic approach, emphasizing the importance of identifying and stopping the most critical threats rather than dispersing our resources across all points of attack.Using real-world examples from his penetration testing experience, Kevin will demonstrate how this focused approach leads to more efficient use of resources and improved risk management. Attendees will gain insights into prioritizing threats and rethink their overall approach to cybersecurity.
Speakers
avatar for Kevin Johnson

Kevin Johnson

CEO, Secure Ideas, LLC
Kevin Johnson is CEO of Secure Ideas, a consulting company dedicated to security testing and training. Kevin passionately advocates for cybersecurity through his work with Secure Ideas, as a global board member for OWASP and as a faculty member at IANS. During his over 30 years in... Read More →
Friday October 11, 2024 3:00pm - 3:50pm MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

4:00pm MDT

CULTivating Growth and Connection
Friday October 11, 2024 4:00pm - 4:50pm MDT
In this talk Wade will explore the psychological and social benefits of community involvement and mentorship, such as increased belonging, mental health, and professional growth. We'll discuss how these engagements enhance networking, skill development, and foster mutual learning and leadership. Additionally, practical strategies for effectively participating in communities and developing mentoring relationships will be outlined, addressing challenges like time management and cultural differences. The session aims to provide participants with actionable steps to enhance their personal and professional lives through active community and mentorship roles. Ideal for those seeking to strengthen community ties and pursue meaningful mentorship.
Speakers
avatar for Wade Wells

Wade Wells

Wade Wells is a seasoned cybersecurity expert with a robust background in threat hunting, cyber threat intelligence, and detection engineering, primarily in the financial sector. Wade holds a master's degree in cybersecurity from Georgia Tech, is a board member of BSides San Diego... Read More →

Friday October 11, 2024 4:00pm - 4:50pm MDT
Deadwood Mountain Grand - General Sesson 1906 Deadwood Mountain Dr, Deadwood, SD

5:00pm MDT

Wild West Hackin' Fest Awards Ceremony
Friday October 11, 2024 5:00pm - 5:15pm MDT

Friday October 11, 2024 5:00pm - 5:15pm MDT
Deadwood Mountain Grand - General Sesson 1906 Deadwood Mountain Dr, Deadwood, SD

8:00pm MDT

Dance Party
Friday October 11, 2024 8:00pm - 11:00pm MDT
Friday October 11, 2024 8:00pm - 11:00pm MDT
Elks Club
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.