News / Defcon
|10:00 AM||n-Way DJ Tag Team! phreakocious, Tense Future, yurk, + Special Guest(s)||Habikki|
|12:00 PM||phreakocious / TBD||phreakocious||VNA|
|1:00 PM||Tense Future||DJ %27||Taishi||phreakocious|
|2:00 PM||DJ Rene||Deep Therapy||AliKat||yurk|
|3:00 PM||AliKat||Habikki||DJ Rene|
|4:00 PM||AliKat||DJ Rene||DJ Federico Nan|
phreakocious (@phreakocious, https://soundcloud.com/phreakocious, https://mixcloud.com/phreakocious)
Inspired by experiences at Detroit raves and private parties in the early 90s, phreakocious bought a pair of 1200s in Y2K and has shaken booties with the finest in funky techno, house, and breaks ever since. The orchestrator of musical shenanigans at the Wall of Sheep and Packet Hacking Village since DC20 (or was it 19?).
DJ %27, (@djpercent27, https://www.mixcloud.com/djpercent27)
DJing since the 80s and HackMiami resident DJ/VJ, DJ %27 has also performed at chillout and pool areas for DEF CON 20 and 21.
DJ Alikat (@suckitpig, http://alikat.ca, https://mixcloud.com/alikat)
DJ Alikat was born under the rainy lights of Vancouver’s nightlife with a pawful of skills that were passed down to her from some high profile mentors on the scene. A champion in the lost art of crate digging, Alikat’s passion for music is rooted in a history of endlessly searching for those hidden vinyl gems that taught her the art of mixing, scratching and working the room. She’s brought her process with her into the digital world, putting in the hours searching for those Internet gems that’ll light up the dance floor.
Emerging from the Los Angeles warehouse and underground music culture of the early 90s, spending the 2000’s in the European club and festival circuit; nurturing a global dance music community for more than two decades. Returning to the Los Angeles music scene in 2010, CTRL can be found mixing it up in underground clubs and at events like California’s Wasteland Weekend and Nevada's DEF CON.
Deep Therapy (@therapy_life, https://www.mixcloud.com/SoundboxMiami, http://www.residentadvisor.net/dj/deeptherapy)
Based out of South Florida (Miami, Ft. Lauderdale, and West Palm Beach) The duo began hosting and DJ'n their own college radio shows. Constantly achieving new heights of dancefloor energy and pushing the boundaries of convention, Deep Therapy is recognized as one of South Florida’s essential DJ’s. Deep Therapy has been featured on Sirius XM radio in Ultra Music Festival Radio, opening up for Infected Mushroom as well as performing at Ultra Music Festival Miami two years in a row and holds a residency at Club Space in Miami in the Technoloft.
Federico Nan (https://soundcloud.com/dj-federico-nan)
Federico Nan designs his sets with compelling sounds that lure you into having to move your body. He spent nights crafting his sound spinning in Capital Federal, Gran Buenos Aires, Las Leñas, Salta, San Martín de los Andes and Pinamar. Federico has the scope to scan the dance floor and inject his infectious grooves into the atmosphere. Creating energy with the crowd is Federico's passion and his love for Acid House and Techno add to the experience he creates.
DJ turned Enterprise Architect (with a security focus), Habikki has been rocking the southwest for over a decade. His knack for blurring the lines of genres shines in each set, bridging soul, high energy, melodic and, fist pumping as the mood strikes. Habikki prefers closing slots and longer sets found on the second stage where he's open to use the dance floor as his canvas. An Arizona staple, this artist has held residencies at Club Myst, Afterhours at Polyesthers, a monthly at UC Berkeley Radio and a pool party regular at Luxor.
With over a decade of experience as a college radio DJ at KWCR on Nerd Show, kampf has waded long and deep through the muddied waters of electronic music, casting his rod time and again to obtain, then share the eclectic, the compelling, the sounds off the beaten path and those lesser know varieties or species. Resident DJ for the DEF CON Chillout Lounge and for DEF CON Radio on SomaFM.com. Spinning vinyl for WoS/Packet Hacking Village since DEF CON 20!
DJ Rene (https://soundcloud.com/dj-rene)
DJ Rene is best known for his eclectic style of quick mixes that transcend from the old school original style of mixing to the new ever changing art of mixing and scratching. At age 15, he started to play music for his own birthday party and was soon hooked on the energy he was able to provide. He has gone on to spin at some of the biggest social events in the U.S. and opened for some of the best international DJ's. He has residencies in D.C. and Thailand and has spun at the world famous Full Moon Party in Koh Phangan, Thailand.
Tense Future (https://soundcloud.com/tensefuture)
It goes largely unnoticed, but most people spend a majority of their waking hours pondering, planning, stressing about what may come... it's been this way forever. Gathering, searching, learning, negotiating... Every action we take is an attempt to make the next one less labored. Tense Future is the result of this recursive internal monologue inside the mind of Daniel Samarin, who can only find relief from the neural thrashing in the regular beat of synthesized percussion.
Hailing from Austin with a smooth mixing style incorporating various facets of dance music, TK's primary focus has been house. Wrecking the decks since 2001 with funky, jazzy, groovy, techy, get up and go music heavily influenced by producers such as Derrick Carter, Inland Knights and DJ Dan. At the height of the funky house movement he has been told by fans, "I started listening to funky house because of you." TK's roots are grounded in the Houston underground house scene and venues like the Underground Lounge, Lotus Lounge, Clarks and Deans, as well as Karma Lounge, Bambu Lounge and Red Eyed Fly in Austin. Pumped to be back for DEF CON 23 alongside VNA, pheakocious, yurk and all the others. Hack all the things!
VNA has been spinning in the Houston area since the turn of the century. His flexible musical palette encompasses blends of prog, tech, funky house, electro, occasionally some cut-and-scratch breaks. This DJ’s mission is to keep the night going by infusing his eclectic style into the sounds he pumps into the crowd. VNA has spun at various clubs in the Houston area, the longest of which being Revolve @ Numbers, and also frequently guested many other residencies of his assorted crewmates in the Texas scene. Classically a vinyl DJ and member of the legendary Traffic Crew, he stays true to his origins. VNA is super glad to be back again for DEF CON 23 this year.
The man, the myth, the legend.
Several amazing workshops also added:
- How Machine Learning Finds Malware Needles in an AppStore Haystack by Theodora Titonis
- Sniffing Scada by Karl Koscher
There will also be a very special workshop from 3 - 4 PM on Saturday, August 8th.
For complete schedule, abstracts and bios, see http://www.wallofsheep.com/pages/speaker-workshops-at-def-con-23
- Creating REAL Threat Intelligence With Evernote by Salvador Grec
- Fishing To Phishing: It's All About Slimy Creatures by Wayne Crowder
- From XSS to Root on Your NAS by Tony Martin
- Haking the Next Generation by David Schwartzberg
- Mobile Data Loss - Threats & Countermeasures by Mike Raggo
- Remaining Covert in an Overt World by Mike Raggo
- Violating Web Services by Ron Taylor
For abstract and bios, see http://www.wallofsheep.com/pages/speaker-workshops-at-def-con-23
- Is Your Android App Secure? by Sam Bowne
- The Packets Made Me Do It: Getting Started with Distributed Full Packet Capture Using OpenFPC by Leon Ward
For abstract and bios, see http://www.wallofsheep.com/pages/speaker-workshops-at-def-con-23
- 802.11 Monitoring with PCAP2XML/SQLITE by Vivek Ramachandran
- The Digital Cockroach Bait Station: How to Build Spam Honeypots by Robert Simmons
- dnstap - A Standard Interface to Real Time DNS Transaction Flows by Paul Vixie
- Global Honeypot Trends by Elliot Brink
- Hacker's Practice Ground by Lokesh Pidawekar
- I See You by Brian Wohlwinder and Andrew Beard
- MITM 101: Easy Traffic Interception Techniques Using Scapy by Bob Simpson
- PowerShell for Penetration Testers by Nikhil Mittal
For abstract and bios, see http://www.wallofsheep.com/pages/speaker-workshops-at-def-con-23
The Wall of Sheep would like to announce a call for presentations at DEF CON 23 at the Paris and Bally's Hotels in Las Vegas, NV from Friday, August 7th to Sunday, August 9th. This year, all accepted talks will be announced, recorded, and published by DEF CON Communications, Inc (yes, by the conference).
How: Complete the Call for Papers Form and send to cfp2015[at]wallofsheep[dot]com. Please also refer to the form for more details.
On Preparing for Some of Our Events At DEF CON (e.g., Packet Detective, Wall of Sheep, Speaker Workshops)
Would you like to learn how tap into a network?
Do you want to learn how to capture people’s passwords or hear their phone conversations?
There are many learning opportunities at DEF CON, especially at the Wall of Sheep. If you want to learn how to tap into a network, capture people's passwords, want to contribute to the Wall of Sheep, play Packet Detective, or play Capture The Packet, it is important that you come prepared with a computer with tools already installed! You do not want to be downloading tools and software at the conference as the DEF CON network is arguably the world's most hostile network.
A computer with wired or wireless networking is required. Any platform is acceptable (e.g., Mac OS X, Windows, Linux, Android). Administrative access on the computer is required!
Here is a list of tools that are frequently used at the Wall of Sheep and thus you should install most of them on your computer:
- Wireshark (http://www.wireshark.org/)
- Ettercap (http://ettercap.github.io/ettercap/)
- tcpdump (http://www.tcpdump.org/)
- WinDump (http://www.winpcap.org/windump/) --Windows only
- ngrep (http://ngrep.sourceforge.net/)
- NetworkMiner (http://www.netresec.com/?page=NetworkMiner)
- Xplico (http://www.xplico.org/)
- Cain & Abel (http://www.oxid.it/cain.html) -- Windows only
You can also choose a Linux distro live-CD aimed at penetration testing such as Kali Linux (https://www.kali.org/) to get up-and-running quickly as it has almost all the above tools installed already.
Step 1: Configure Your Machine
You will need to set your computer to allow it to capture ALL the traffic on the network, not just information sent specifically for that machine. An example of this would be to set your network adapter to promiscuous mode.
Helpful videos can be found under Tools and Training of our website.
Step 2: Be the Detective
The steps, repeat:
- Monitor the traffic
- Save the captures
- Analyze the data
Once you have your machine configure and some of the tools installed, you can practice and hone your skills at the Wall of Sheep. The Wall of Sheep will supply you with a live feed of the DEF CON wireless network so you can capture packets and analyze the data.
Be sure to test your Packet Detective skills at the Packet Detective tables by experiencing the same type of challenges that are used in Capture The Packet.
There is bit more than installing the tools, configuring your machine, and the repetitive steps: you also need to understand the network you will be investigating. That is:
- Are you going to tap into and sniff a wired network or a wireless network?
- Does the network use a hub or a switch?
Many thanks to our sponsors for DEF CON 22!
Wall of Sheep Title Sponsor: Splunk
Wi-Fi Sheep Hunt Title Sponsor: O'Reilly
Emerging Mobile Technology Showcase Title Sponsor: MobileIron
Emerging Mobile Technology Showcase Sponsor: Veracode
Packet Detective Title Sponsor: Fidelis
Wi-Fi Sheep Hunt Title Sponsor: Webhead
If you are interested in sponsoring the Wall of Sheep at an event, please e-mail firstname.lastname@example.org to receive the latest sponsorship package. Thank you!
The Wall of Sheep is famous for promoting security awareness through the use of various shenanigans and contests. Who knows shenanigans better than kids? Therefore, to bring what we know about IT and information security to kids in grades three through high school will hopefully stimulate and mature their curiosity, creativity and innovation inherent in our hacking communities.
How else do hackers prefer to share and collaborate...at a conference!! Heal from the Wall of Sheep is organizing an ethical hacking and responsible computing conference promoting mentorship and community as core values. The conference organizers believe, “For innovation to perpetuate, it’s imperative that today’s young users are exposed to the bigger picture of how we got here and to help realize their potential.” Makes sense.
The conference is appropriately named, Hak4Kidz, focusing on STEM activities and security concerns for youths. The event location is sponsored by TechNexus, located in the Chicago downtown loop inside the Civic Opera Center, conveniently located walking distance from Union Station.
Three streams of content will be provided in the form of speakers under the age of 26 years old, workshops such as “How to Build & Run Your Own Minecraft Server” and activity stations. Activity stations will be incorporated into the Hak4Kidz jfCTF with challenges organized by age level difficulty for prizes. Hak4Kidz is currently accepting CFP submission and will close the CFP on July 15th.
According to the Hak4Kidz website ‘Activities’ section states, “Time to get your hak on with these educational activities:
jrCTF - junior Capture The Flag contest for prizes
Snap Circuits - Award winning engineering toy by Elenco
Networking Playground - Hooking up network gear and securing them
Homemade Hacks - Old tech meets new tech for alternative tech! And a robot!!
How I.T. Works - disassemble old electronics without getting "grounded"
InfoSec Career Mentoring - hacking is fun but hacking for a living is uber fun
Locksport - introduction to ethical lock-picking for sport only”
The Wall of Sheep would like to announce a call for presentations at DEF CON 22 at the Rio Hotel and Casino in Las Vegas, NV from Thursday, August 7th to Sunday, August 10th. The Wall of Sheep will be delivering talks that increase security awareness ranging from demos to hands-on trainings. This year, we are looking for content that focus on practice and process. In the past, we have accepted talks on "cool new attacks" and the latest security research, which is great, but not in line with our goal. This year for the speaker workshops we would like to provide skills that can be immediately applied after the conference. Our audience ranges from those who are new to security to the most seasoned practitioners in the security industry. Introductory talks are welcome!
Topics of interests include:
- Tools on network sniffing, intrusion detection and monitoring, forensics
- Tools for data collection (e.g., Yara, Cuckoo Sandbox)
- Python or Ruby programming for security practitioners
- Hardening the enterprise using open source tools
- Getting multi-vendor tools working together
- Tool/task automation and optimization
- Incident response process and procedures
The Wall of Sheep will not accept product or vendor related pitches. If your talk is a thinly-veiled advertisement for a new product or service your company is offering, please do not apply!
Each presentation slot is 30 minutes which should include time for Q&A. However, if you have an amazing presentation/workshop that would be 1-2 hours please feel free to submit it. If we have time and it is in line with our goals mentioned above, then there is a good chance you will be selected.
To submit a presentation, please submit the following information in the form below to email@example.com
Date of Submission:
Primary Speaker Name:
Primary Speaker Twitter name (If you want it known if you are accepted):
Primary Speaker Facebook page (If you want it known if you are accepted):
Primary Speaker Title and Company (if applicable):
Primary Speaker Email Address:
Primary Speaker Phone Number:
Additional Speakers' name(s), titles, and social information:
Additional Email Addresses:
Is there a specific day or time you MUST speak by?
Name of Presentation:
This text will be used for the website and printed materials. In a nutshell, what your presentation will cover. Attendees will read this to get an idea of what they should know before your presentation, and what they will learn after. Use these paragraphs to tell people how technical the talk is, what tools will be used, what materials to read in advance to get the most out of your presentation. This abstract is the primary way people will be drawn to your session. Presentations that are submitted without abstracts (e.g. that have only PPT or white papers attached or only point to a URL) will not be considered.
Equipment Needs & Special Requests
(The Wall of Sheep will provide 1 projector feed, and microphones. If you need to multiple output for a demo please mention below)
This text will be used for the website and printed materials. Cover any professional history that is relevant to the presentation, including past jobs, tools that you have written, etc. Let people know who you are and why you are qualified to speak on our topic. Presentations that are submitted without biographies will not be considered.
Terms and Conditions
By submitting you agree to the Terms and Conditions below, please read and accept these terms by inserting your name in the appropriate area, otherwise your application will be considered incomplete and returned to you.
* Grant of Copyright Use
- I warrant that the above work has not been previously published elsewhere, or if it has, that I have obtained permission for its publication by the Wall of Sheep and that I will promptly supply Wall of Sheep with wording for crediting the original publication and copyright owner.
- If I am selected for presentation, I hereby give the Wall of Sheep permission to duplicate, record, and redistribute this presentation; including video, audio, handouts(s) to the conference attendees for educational, on-line and all other purposes.
* Terms of Speaking Requirements
- I will submit a completed (and possibly updated) presentation and a reference to all of the tool(s), law(s), Web sites and/or publications referenced to at the end of my talk and as described in this CFP submission by noon PST, July 31st, 2014.
- I will submit a final Abstract and Biography to the Wall of Sheep by noon PST, July 31st, 2014.
- I will include a detailed bibliography as either a separate document or included within the presentation of all resources cited and/or used in my presentation.
- I will complete my presentation within the time allocated to me - not running over the time allocation.
- I understand that the Wall of Sheep will provide 1 LCD projector feed, 2 screens, and microphones. I understand that I am responsible for providing all other necessary equipment, including laptops and machines (with VGA output), to complete my presentation.
- I understand that I will be responsible for my own hotel and travel expenses.
Yes, I, (insert primary speaker name), have read and agree to the Grant of Copyright Use.
I, (insert your name here), have read and understand and agree to the terms as detailed in the Agreement to Terms of Speaking Requirements.