Hands-On Labs
Check out what labs will be at Wild West Hackin’ Fest – Deadwood 2025!
AI Security Lab
Welcome to the AI Security Lab at WWHF, where you’ll step beyond the usual frontier models and experiment with systems you may never have used before. The lab unfolds in two parts: first, you’ll get hands-on time exploring alternative large language models—seeing how they respond, how they differ, and what new opportunities (or risks) they present. Then, you’ll enter the CTF arena, where AI sprites stand guard over hidden flags. Your mission: break through their defenses using prompt injection, bypass stubborn filters, trick watchful guards, exploit flawed tools, and even raid retrieval-augmented databases. Every challenge is a chance to sharpen your skills and glimpse the future of AI security. In the world ahead, no fortress is unbreakable—if you know how to attack it.
WifiForge : Emulated Wireless Hacking Environments
WifiForge is a Wi-Fi security training tool developed by Black Hills InfoSec that provides a safe and legal environment for learning Wi-Fi hacking techniques. Based on the open source mininet-wifi framework, WifiForge automatically sets up virtual networks needed to run Wi-Fi exploitation labs without physical hardware.
Electronic Access Control Lab
This lab introduces participants to some of the common pitfalls associated with electronic access control systems. In the lab, participants will gain familiarity with low and high-frequency RFID cards. Then step-by-step instructions are provided for performing replay, card cloning, and brute force attacks against the targeted system. In addition, participants will explore reader implant devices that exploit cleartext communication between the reader and controller. Finally, participants will explore operation of doors remotely with direct access to the controller.
Bluetooth Low Energy Lab
This lab provides an introduction to the Bluetooth Low Energy (BLE) protocol. Participants will gain familiarization with various software tools used to interact with devices supporting the BLE protocol. Those tools will be used to interact with services exposed through BLE to retrieve information from the target device.
Keystroke Injections Lab
This lab includes concepts of hijacking a wireless mouse or keyboard and performing keystroke injection attacks. Several wireless input devices are found to still be vulnerable to this type of attack. Attendees will be able to understand and demonstrate how this attack is performed.
Doorbell Replay Attack Lab
This lab includes an introduction to software defined radio (SDR) recording and playback for static code devices. Steps include identifying signal characteristics, waveform analysis, static code analysis/regeneration, and signal reply. Attendees will be able to perform a replay attack against a wireless doorbell.
