News / speaker workshops

First Batch of Accepted Speaker Workshops at DEF CON 23 Now Posted

Read more →

Speaker Workshops at DEF CON 23 Call for Presentations Now Open

The Wall of Sheep would like to announce a call for presentations at DEF CON 23 at the Paris and Bally's Hotels in Las Vegas, NV from Friday, August 7th to Sunday, August 9th. This year, all accepted talks will be announced, recorded, and published by DEF CON Communications, Inc (yes, by the conference).

How: Complete the Call for Papers Form and send to cfp2015[at]wallofsheep[dot]com. Please also refer to the form for more details.

Read more →

On Preparing for Some of Our Events At DEF CON (e.g., Packet Detective, Wall of Sheep, Speaker Workshops)

Would you like to learn how tap into a network?

Do you want to learn how to capture people’s passwords or hear their phone conversations?

There are many learning opportunities at DEF CON, especially at the Wall of Sheep.  If you want to learn how to tap into a network, capture people's passwords, want to contribute to the Wall of Sheep, play Packet Detective, or play Capture The Packet, it is important that you come prepared with a computer with tools already installed!  You do not want to be downloading tools and software at the conference as the DEF CON network is arguably the world's most hostile network.

Computer Requirements

A computer with wired or wireless networking is required. Any platform is acceptable (e.g., Mac OS X, Windows, Linux, Android). Administrative access on the computer is required!

Tools Used

Here is a list of tools that are frequently used at the Wall of Sheep and thus you should install most of them on your computer:

You can also choose a Linux distro live-CD aimed at penetration testing such as Kali Linux (https://www.kali.org/) to get up-and-running quickly as it has almost all the above tools installed already.

Step 1: Configure Your Machine

You will need to set your computer to allow it to capture ALL the traffic on the network, not just information sent specifically for that machine. An example of this would be to set your network adapter to promiscuous mode.

Helpful videos can be found under Tools and Training of our website.

Step 2: Be the Detective

The steps, repeat:

  1. Monitor the traffic
  2. Save the captures
  3. Analyze the data

Once you have your machine configure and some of the tools installed, you can practice and hone your skills at the Wall of Sheep. The Wall of Sheep will supply you with a live feed of the DEF CON wireless network so you can capture packets and analyze the data.

Be sure to test your Packet Detective skills at the Packet Detective tables by experiencing the same type of challenges that are used in Capture The Packet.

Additional Information

There is bit more than installing the tools, configuring your machine, and the repetitive steps: you also need to understand the network you will be investigating. That is:

  • Are you going to tap into and sniff a wired network or a wireless network?
  • Does the network use a hub or a switch?
Read more →