New Batch of Accepted Speaker Workshops at DEF CON 23

Read more →

Two More Accepted Speaker Workshops at DEF CON 23 Posted

Read more →

First Batch of Accepted Speaker Workshops at DEF CON 23 Now Posted

Read more →

Speaker Workshops at DEF CON 23 Call for Presentations Now Open

The Wall of Sheep would like to announce a call for presentations at DEF CON 23 at the Paris and Bally's Hotels in Las Vegas, NV from Friday, August 7th to Sunday, August 9th. This year, all accepted talks will be announced, recorded, and published by DEF CON Communications, Inc (yes, by the conference).

How: Complete the Call for Papers Form and send to cfp2015[at]wallofsheep[dot]com. Please also refer to the form for more details.

Read more →

Update on HackRF Shipment

Our shipment leaves China between August 15th and 20th. We are being told we will have a demo unit ready for DEF CON.

Read more →

On Preparing for Some of Our Events At DEF CON (e.g., Packet Detective, Wall of Sheep, Speaker Workshops)

Would you like to learn how tap into a network?

Do you want to learn how to capture people’s passwords or hear their phone conversations?

There are many learning opportunities at DEF CON, especially at the Wall of Sheep.  If you want to learn how to tap into a network, capture people's passwords, want to contribute to the Wall of Sheep, play Packet Detective, or play Capture The Packet, it is important that you come prepared with a computer with tools already installed!  You do not want to be downloading tools and software at the conference as the DEF CON network is arguably the world's most hostile network.

Computer Requirements

A computer with wired or wireless networking is required. Any platform is acceptable (e.g., Mac OS X, Windows, Linux, Android). Administrative access on the computer is required!

Tools Used

Here is a list of tools that are frequently used at the Wall of Sheep and thus you should install most of them on your computer:

You can also choose a Linux distro live-CD aimed at penetration testing such as Kali Linux ( to get up-and-running quickly as it has almost all the above tools installed already.

Step 1: Configure Your Machine

You will need to set your computer to allow it to capture ALL the traffic on the network, not just information sent specifically for that machine. An example of this would be to set your network adapter to promiscuous mode.

Helpful videos can be found under Tools and Training of our website.

Step 2: Be the Detective

The steps, repeat:

  1. Monitor the traffic
  2. Save the captures
  3. Analyze the data

Once you have your machine configure and some of the tools installed, you can practice and hone your skills at the Wall of Sheep. The Wall of Sheep will supply you with a live feed of the DEF CON wireless network so you can capture packets and analyze the data.

Be sure to test your Packet Detective skills at the Packet Detective tables by experiencing the same type of challenges that are used in Capture The Packet.

Additional Information

There is bit more than installing the tools, configuring your machine, and the repetitive steps: you also need to understand the network you will be investigating. That is:

  • Are you going to tap into and sniff a wired network or a wireless network?
  • Does the network use a hub or a switch?
Read more →

Our DEF CON 22 Sponsors

Many thanks to our sponsors for DEF CON 22!

Wall of Sheep Title Sponsor: Splunk Twitter


Wi-Fi Sheep Hunt Title Sponsor: O'Reilly Twitter


Emerging Mobile Technology Showcase Title Sponsor: MobileIron Twitter


Emerging Mobile Technology Showcase Sponsor: Veracode Twitter


Packet Detective Title Sponsor: Fidelis Twitter


Wi-Fi Sheep Hunt Title Sponsor: Webhead Twitter


If you are interested in sponsoring the Wall of Sheep at an event, please e-mail to receive the latest sponsorship package. Thank you!


Read more →

Security Awareness Goes Young School

The Wall of Sheep is famous for promoting security awareness through the use of various shenanigans and contests. Who knows shenanigans better than kids? Therefore, to bring what we know about IT and information security to kids in grades three through high school will hopefully stimulate and mature their curiosity, creativity and innovation inherent in our hacking communities.

How else do hackers prefer to share and a conference!! Heal from the Wall of Sheep is organizing an ethical hacking and responsible computing conference promoting mentorship and community as core values. The conference organizers believe, “For innovation to perpetuate, it’s imperative that today’s young users are exposed to the bigger picture of how we got here and to help realize their potential.” Makes sense.

The conference is appropriately named, Hak4Kidz, focusing on STEM activities and security concerns for youths. The event location is sponsored by TechNexus, located in the Chicago downtown loop inside the Civic Opera Center, conveniently located walking distance from Union Station.

Three streams of content will be provided in the form of speakers under the age of 26 years old, workshops such as “How to Build & Run Your Own Minecraft Server” and activity stations. Activity stations will be incorporated into the Hak4Kidz jfCTF with challenges organized by age level difficulty for prizes. Hak4Kidz is currently accepting CFP submission and will close the CFP on July 15th.

According to the Hak4Kidz website ‘Activities’ section states, “Time to get your hak on with these educational activities:

  • jrCTF - junior Capture The Flag contest for prizes

  • Snap Circuits - Award winning engineering toy by Elenco

  • Networking Playground - Hooking up network gear and securing them

  • Homemade Hacks - Old tech meets new tech for alternative tech! And a robot!!

  • How I.T. Works - disassemble old electronics without getting "grounded"

  • InfoSec Career Mentoring - hacking is fun but hacking for a living is uber fun

  • Locksport - introduction to ethical lock-picking for sport only

For a first year conference there appears to be a great quantity of content to keep busy all day. Registration will be open until July 28th and the early bird discounted pricing will end on July 8th. If you plan to attend, get tickets soon before the workshop registration opens and all seats are taken.
Read more →

Speaker Workshops at DEF CON 22: Call for Presentations (EXTENDED TO JULY 31st)


The Wall of Sheep would like to announce a call for presentations at DEF CON 22 at the Rio Hotel and Casino in Las Vegas, NV from Thursday, August 7th to Sunday, August 10th. The Wall of Sheep will be delivering talks that increase security awareness ranging from demos to hands-on trainings. This year, we are looking for content that focus on practice and process.  In the past, we have accepted talks on "cool new attacks" and the latest security research, which is great, but not in line with our goal. This year for the speaker workshops we would like to provide skills that can be immediately applied after the conference. Our audience ranges from those who are new to security to the most seasoned practitioners in the security industry. Introductory talks are welcome!

Topics of interests include:

  • Tools on network sniffing, intrusion detection and monitoring, forensics
  • Tools for data collection (e.g., Yara, Cuckoo Sandbox)
  • Python or Ruby programming for security practitioners
  • Hardening the enterprise using open source tools
  • Getting multi-vendor tools working together
  • Tool/task automation and optimization
  • Incident response process and procedures

The Wall of Sheep will not accept product or vendor related pitches. If your talk is a thinly-veiled advertisement for a new product or service your company is offering, please do not apply!

Speaking Format

Each presentation slot is 30 minutes which should include time for Q&A.  However, if you have an amazing presentation/workshop that would be 1-2 hours please feel free to submit it. If we have time and it is in line with our goals mentioned above, then there is a good chance you will be selected.

To submit a presentation, please submit the following information in the form below to

Date of Submission:

Primary Speaker Name:

Primary Speaker Twitter name (If you want it known if you are accepted):

Primary Speaker Facebook page (If you want it known if you are accepted):

Primary Speaker Title and Company (if applicable):

Primary Speaker Email Address:

Primary Speaker Phone Number:

Additional Speakers' name(s), titles, and social information:

Additional Email Addresses:

Is there a specific day or time you MUST speak by?

Name of Presentation:


This text will be used for the website and printed materials. In a nutshell, what your presentation will cover. Attendees will read this to get an idea of what they should know before your presentation, and what they will learn after. Use these paragraphs to tell people how technical the talk is, what tools will be used, what materials to read in advance to get the most out of your presentation. This abstract is the primary way people will be drawn to your session. Presentations that are submitted without abstracts (e.g. that have only PPT or white papers attached or only point to a URL) will not be considered.

Supporting File(s):

Equipment Needs & Special Requests

(The Wall of Sheep will provide 1 projector feed, and microphones. If you need to multiple output for a demo please mention below)

Speaker's Bio(s):

This text will be used for the website and printed materials. Cover any professional history that is relevant to the presentation, including past jobs, tools that you have written, etc. Let people know who you are and why you are qualified to speak on our topic. Presentations that are submitted without biographies will not be considered.

Terms and Conditions

By submitting you agree to the Terms and Conditions below, please read and accept these terms by inserting your name in the appropriate area, otherwise your application will be considered incomplete and returned to you.

* Grant of Copyright Use

  1. I warrant that the above work has not been previously published elsewhere, or if it has, that I have obtained permission for its publication by the Wall of Sheep and that I will promptly supply Wall of Sheep with wording for crediting the original publication and copyright owner.
  2. If I am selected for presentation, I hereby give the Wall of Sheep permission to duplicate, record, and redistribute this presentation; including video, audio, handouts(s) to the conference attendees for educational, on-line and all other purposes.

* Terms of Speaking Requirements

  1. I will submit a completed (and possibly updated) presentation and a reference to all of the tool(s), law(s), Web sites and/or publications referenced to at the end of my talk and as described in this CFP submission by noon PST, July 31st, 2014.
  2. I will submit a final Abstract and Biography to the Wall of Sheep by noon PST, July 31st, 2014.
  3. I will include a detailed bibliography as either a separate document or included within the presentation of all resources cited and/or used in my presentation.
  4. I will complete my presentation within the time allocated to me - not running over the time allocation.
  5. I understand that the Wall of Sheep will provide 1 LCD projector feed, 2 screens, and microphones. I understand that I am responsible for providing all other necessary equipment, including laptops and machines (with VGA output), to complete my presentation.
  6. I understand that I will be responsible for my own hotel and travel expenses.

Yes, I, (insert primary speaker name), have read and agree to the Grant of Copyright Use.

I, (insert your name here), have read and understand and agree to the terms as detailed in the Agreement to Terms of Speaking Requirements.

Read more →

Are you being spied on? Do you need to stay anonymous? WE HAVE THE SOLUTION! Torch the burner phone, and get a burner SIM!

If you answer yes to any of the questions below, then we’ve got a solution for you!

  • Are you tired of paying contract fees?
  • Do you have a sneaking suspicion you are being spied on?
  • When you show the media your amazing discovery do you really trust they will blur out the phone number used in the demo? (Yeah you know who we’re talking about)
  • Are you worried about what people could potentially pull from the SIM registered in your name?
  • Are you traveling and just need a temporary phone for a week or two?
  • Do you want better privacy?
  • Are you a spy?
  • Are you worried about getting caught cheating?
  • Are you being shady?

We ARE your Burner SIM vendor!!!


The Wall of Sheep has spent the last 20 years helping teach people to keep their data safe. Now we can help you keep your cell identity safe.


You don't need to provide any personal information to activate, Supplies are limited so order today so you can stay connected without a trace.


Read more →