News
Shipping will be delayed while we are at DEF CON! (No shipping Aug 4th-11th)
That's right folks, there will be no shipping from August 4th - 11th.
Your orders will be processed as soon as our team returns.
Thank you
Wall of Sheep team
Our Speaker Workshops Schedule at DEF CON 23 is Now LIVE!
Several amazing workshops also added:
- How Machine Learning Finds Malware Needles in an AppStore Haystack by Theodora Titonis
- Sniffing Scada by Karl Koscher
There will also be a very special workshop from 3 - 4 PM on Saturday, August 8th.
For complete schedule, abstracts and bios, see http://www.wallofsheep.com/pages/speaker-workshops-at-def-con-23
New Batch of Accepted Speaker Workshops at DEF CON 23
- Creating REAL Threat Intelligence With Evernote by Salvador Grec
- Fishing To Phishing: It's All About Slimy Creatures by Wayne Crowder
- From XSS to Root on Your NAS by Tony Martin
- Haking the Next Generation by David Schwartzberg
- Mobile Data Loss - Threats & Countermeasures by Mike Raggo
- Remaining Covert in an Overt World by Mike Raggo
- Violating Web Services by Ron Taylor
For abstract and bios, see http://www.wallofsheep.com/pages/speaker-workshops-at-def-con-23
Two More Accepted Speaker Workshops at DEF CON 23 Posted
- Is Your Android App Secure? by Sam Bowne
- The Packets Made Me Do It: Getting Started with Distributed Full Packet Capture Using OpenFPC by Leon Ward
For abstract and bios, see http://www.wallofsheep.com/pages/speaker-workshops-at-def-con-23
First Batch of Accepted Speaker Workshops at DEF CON 23 Now Posted
- 802.11 Monitoring with PCAP2XML/SQLITE by Vivek Ramachandran
- The Digital Cockroach Bait Station: How to Build Spam Honeypots by Robert Simmons
- dnstap - A Standard Interface to Real Time DNS Transaction Flows by Paul Vixie
- Global Honeypot Trends by Elliot Brink
- Hacker's Practice Ground by Lokesh Pidawekar
- I See You by Brian Wohlwinder and Andrew Beard
- MITM 101: Easy Traffic Interception Techniques Using Scapy by Bob Simpson
- PowerShell for Penetration Testers by Nikhil Mittal
For abstract and bios, see http://www.wallofsheep.com/pages/speaker-workshops-at-def-con-23
Speaker Workshops at DEF CON 23 Call for Presentations Now Open
The Wall of Sheep would like to announce a call for presentations at DEF CON 23 at the Paris and Bally's Hotels in Las Vegas, NV from Friday, August 7th to Sunday, August 9th. This year, all accepted talks will be announced, recorded, and published by DEF CON Communications, Inc (yes, by the conference).
How: Complete the Call for Papers Form and send to cfp2015[at]wallofsheep[dot]com. Please also refer to the form for more details.
Update on HackRF Shipment
Our shipment leaves China between August 15th and 20th. We are being told we will have a demo unit ready for DEF CON.
On Preparing for Some of Our Events At DEF CON (e.g., Packet Detective, Wall of Sheep, Speaker Workshops)
Would you like to learn how tap into a network?
Do you want to learn how to capture people’s passwords or hear their phone conversations?
There are many learning opportunities at DEF CON, especially at the Wall of Sheep. If you want to learn how to tap into a network, capture people's passwords, want to contribute to the Wall of Sheep, play Packet Detective, or play Capture The Packet, it is important that you come prepared with a computer with tools already installed! You do not want to be downloading tools and software at the conference as the DEF CON network is arguably the world's most hostile network.
Computer Requirements
A computer with wired or wireless networking is required. Any platform is acceptable (e.g., Mac OS X, Windows, Linux, Android). Administrative access on the computer is required!
Tools Used
Here is a list of tools that are frequently used at the Wall of Sheep and thus you should install most of them on your computer:
- Wireshark (http://www.wireshark.org/)
- Ettercap (http://ettercap.github.io/ettercap/)
- tcpdump (http://www.tcpdump.org/)
- WinDump (http://www.winpcap.org/windump/) --Windows only
- ngrep (http://ngrep.sourceforge.net/)
- NetworkMiner (http://www.netresec.com/?page=NetworkMiner)
- Xplico (http://www.xplico.org/)
- Cain & Abel (http://www.oxid.it/cain.html) -- Windows only
You can also choose a Linux distro live-CD aimed at penetration testing such as Kali Linux (https://www.kali.org/) to get up-and-running quickly as it has almost all the above tools installed already.
Step 1: Configure Your Machine
You will need to set your computer to allow it to capture ALL the traffic on the network, not just information sent specifically for that machine. An example of this would be to set your network adapter to promiscuous mode.
Helpful videos can be found under Tools and Training of our website.
Step 2: Be the Detective
The steps, repeat:
- Monitor the traffic
- Save the captures
- Analyze the data
Once you have your machine configure and some of the tools installed, you can practice and hone your skills at the Wall of Sheep. The Wall of Sheep will supply you with a live feed of the DEF CON wireless network so you can capture packets and analyze the data.
Be sure to test your Packet Detective skills at the Packet Detective tables by experiencing the same type of challenges that are used in Capture The Packet.
Additional Information
There is bit more than installing the tools, configuring your machine, and the repetitive steps: you also need to understand the network you will be investigating. That is:
- Are you going to tap into and sniff a wired network or a wireless network?
- Does the network use a hub or a switch?
Our DEF CON 22 Sponsors
Many thanks to our sponsors for DEF CON 22!
Wall of Sheep Title Sponsor: Splunk ![Twitter](//cdn.shopify.com/s/files/1/0177/9886/files/twitter_1b0ed4fc-f099-435e-b79a-3faf734ed030_small.png?147)
Wi-Fi Sheep Hunt Title Sponsor: O'Reilly ![Twitter](//cdn.shopify.com/s/files/1/0177/9886/files/twitter_1b0ed4fc-f099-435e-b79a-3faf734ed030_small.png?147)
Emerging Mobile Technology Showcase Title Sponsor: MobileIron ![Twitter](//cdn.shopify.com/s/files/1/0177/9886/files/twitter_1b0ed4fc-f099-435e-b79a-3faf734ed030_small.png?147)
Emerging Mobile Technology Showcase Sponsor: Veracode ![Twitter](//cdn.shopify.com/s/files/1/0177/9886/files/twitter_1b0ed4fc-f099-435e-b79a-3faf734ed030_small.png?147)
Packet Detective Title Sponsor: Fidelis ![Twitter](//cdn.shopify.com/s/files/1/0177/9886/files/twitter_1b0ed4fc-f099-435e-b79a-3faf734ed030_small.png?147)
Wi-Fi Sheep Hunt Title Sponsor: Webhead ![Twitter](//cdn.shopify.com/s/files/1/0177/9886/files/twitter_1b0ed4fc-f099-435e-b79a-3faf734ed030_small.png?147)
If you are interested in sponsoring the Wall of Sheep at an event, please e-mail info@wallofsheep.com to receive the latest sponsorship package. Thank you!
Security Awareness Goes Young School
The Wall of Sheep is famous for promoting security awareness through the use of various shenanigans and contests. Who knows shenanigans better than kids? Therefore, to bring what we know about IT and information security to kids in grades three through high school will hopefully stimulate and mature their curiosity, creativity and innovation inherent in our hacking communities.
How else do hackers prefer to share and collaborate...at a conference!! Heal from the Wall of Sheep is organizing an ethical hacking and responsible computing conference promoting mentorship and community as core values. The conference organizers believe, “For innovation to perpetuate, it’s imperative that today’s young users are exposed to the bigger picture of how we got here and to help realize their potential.” Makes sense.
The conference is appropriately named, Hak4Kidz, focusing on STEM activities and security concerns for youths. The event location is sponsored by TechNexus, located in the Chicago downtown loop inside the Civic Opera Center, conveniently located walking distance from Union Station.
Three streams of content will be provided in the form of speakers under the age of 26 years old, workshops such as “How to Build & Run Your Own Minecraft Server” and activity stations. Activity stations will be incorporated into the Hak4Kidz jfCTF with challenges organized by age level difficulty for prizes. Hak4Kidz is currently accepting CFP submission and will close the CFP on July 15th.
According to the Hak4Kidz website ‘Activities’ section states, “Time to get your hak on with these educational activities:
-
jrCTF - junior Capture The Flag contest for prizes
-
Snap Circuits - Award winning engineering toy by Elenco
-
Networking Playground - Hooking up network gear and securing them
-
Homemade Hacks - Old tech meets new tech for alternative tech! And a robot!!
-
How I.T. Works - disassemble old electronics without getting "grounded"
-
InfoSec Career Mentoring - hacking is fun but hacking for a living is uber fun
-
Locksport - introduction to ethical lock-picking for sport only”