Shipping will be delayed while we are at DEF CON! (No shipping Aug 4th-11th)

That's right folks, there will be no shipping from August 4th - 11th.

Your orders will be processed as soon as our team returns.

Thank you


Wall of Sheep team


Read more →

Our Speaker Workshops Schedule at DEF CON 23 is Now LIVE!

Several amazing workshops also added:

There will also be a very special workshop from 3 - 4 PM on Saturday, August 8th.

For complete schedule, abstracts and bios, see

Read more →

New Batch of Accepted Speaker Workshops at DEF CON 23

Read more →

Two More Accepted Speaker Workshops at DEF CON 23 Posted

Read more →

First Batch of Accepted Speaker Workshops at DEF CON 23 Now Posted

Read more →

Speaker Workshops at DEF CON 23 Call for Presentations Now Open

The Wall of Sheep would like to announce a call for presentations at DEF CON 23 at the Paris and Bally's Hotels in Las Vegas, NV from Friday, August 7th to Sunday, August 9th. This year, all accepted talks will be announced, recorded, and published by DEF CON Communications, Inc (yes, by the conference).

How: Complete the Call for Papers Form and send to cfp2015[at]wallofsheep[dot]com. Please also refer to the form for more details.

Read more →

Update on HackRF Shipment

Our shipment leaves China between August 15th and 20th. We are being told we will have a demo unit ready for DEF CON.

Read more →

On Preparing for Some of Our Events At DEF CON (e.g., Packet Detective, Wall of Sheep, Speaker Workshops)

Would you like to learn how tap into a network?

Do you want to learn how to capture people’s passwords or hear their phone conversations?

There are many learning opportunities at DEF CON, especially at the Wall of Sheep.  If you want to learn how to tap into a network, capture people's passwords, want to contribute to the Wall of Sheep, play Packet Detective, or play Capture The Packet, it is important that you come prepared with a computer with tools already installed!  You do not want to be downloading tools and software at the conference as the DEF CON network is arguably the world's most hostile network.

Computer Requirements

A computer with wired or wireless networking is required. Any platform is acceptable (e.g., Mac OS X, Windows, Linux, Android). Administrative access on the computer is required!

Tools Used

Here is a list of tools that are frequently used at the Wall of Sheep and thus you should install most of them on your computer:

You can also choose a Linux distro live-CD aimed at penetration testing such as Kali Linux ( to get up-and-running quickly as it has almost all the above tools installed already.

Step 1: Configure Your Machine

You will need to set your computer to allow it to capture ALL the traffic on the network, not just information sent specifically for that machine. An example of this would be to set your network adapter to promiscuous mode.

Helpful videos can be found under Tools and Training of our website.

Step 2: Be the Detective

The steps, repeat:

  1. Monitor the traffic
  2. Save the captures
  3. Analyze the data

Once you have your machine configure and some of the tools installed, you can practice and hone your skills at the Wall of Sheep. The Wall of Sheep will supply you with a live feed of the DEF CON wireless network so you can capture packets and analyze the data.

Be sure to test your Packet Detective skills at the Packet Detective tables by experiencing the same type of challenges that are used in Capture The Packet.

Additional Information

There is bit more than installing the tools, configuring your machine, and the repetitive steps: you also need to understand the network you will be investigating. That is:

  • Are you going to tap into and sniff a wired network or a wireless network?
  • Does the network use a hub or a switch?
Read more →

Our DEF CON 22 Sponsors

Many thanks to our sponsors for DEF CON 22!

Wall of Sheep Title Sponsor: Splunk Twitter


Wi-Fi Sheep Hunt Title Sponsor: O'Reilly Twitter


Emerging Mobile Technology Showcase Title Sponsor: MobileIron Twitter


Emerging Mobile Technology Showcase Sponsor: Veracode Twitter


Packet Detective Title Sponsor: Fidelis Twitter


Wi-Fi Sheep Hunt Title Sponsor: Webhead Twitter


If you are interested in sponsoring the Wall of Sheep at an event, please e-mail to receive the latest sponsorship package. Thank you!


Read more →

Security Awareness Goes Young School

The Wall of Sheep is famous for promoting security awareness through the use of various shenanigans and contests. Who knows shenanigans better than kids? Therefore, to bring what we know about IT and information security to kids in grades three through high school will hopefully stimulate and mature their curiosity, creativity and innovation inherent in our hacking communities.

How else do hackers prefer to share and a conference!! Heal from the Wall of Sheep is organizing an ethical hacking and responsible computing conference promoting mentorship and community as core values. The conference organizers believe, “For innovation to perpetuate, it’s imperative that today’s young users are exposed to the bigger picture of how we got here and to help realize their potential.” Makes sense.

The conference is appropriately named, Hak4Kidz, focusing on STEM activities and security concerns for youths. The event location is sponsored by TechNexus, located in the Chicago downtown loop inside the Civic Opera Center, conveniently located walking distance from Union Station.

Three streams of content will be provided in the form of speakers under the age of 26 years old, workshops such as “How to Build & Run Your Own Minecraft Server” and activity stations. Activity stations will be incorporated into the Hak4Kidz jfCTF with challenges organized by age level difficulty for prizes. Hak4Kidz is currently accepting CFP submission and will close the CFP on July 15th.

According to the Hak4Kidz website ‘Activities’ section states, “Time to get your hak on with these educational activities:

  • jrCTF - junior Capture The Flag contest for prizes

  • Snap Circuits - Award winning engineering toy by Elenco

  • Networking Playground - Hooking up network gear and securing them

  • Homemade Hacks - Old tech meets new tech for alternative tech! And a robot!!

  • How I.T. Works - disassemble old electronics without getting "grounded"

  • InfoSec Career Mentoring - hacking is fun but hacking for a living is uber fun

  • Locksport - introduction to ethical lock-picking for sport only

For a first year conference there appears to be a great quantity of content to keep busy all day. Registration will be open until July 28th and the early bird discounted pricing will end on July 8th. If you plan to attend, get tickets soon before the workshop registration opens and all seats are taken.
Read more →