Hands-On Labs
Check out what labs will be at Wild West Hackin’ Fest – Deadwood 2025!
AI Security Lab
Step into our AI Security Lab at WWHF, where you get to play with alternatives to the usual frontier models. Test your skills with fun, hands-on challenges, try sneaking out secret system prompts through clever prompt injection, work around tricky input and output filters, and crack defenses like prompt guards. Plus, see if you can dig up the hidden flag stored inside a retrieval-augmented database. It’s a unique chance to explore AI security from all angles and level up your hacking game in a fresh, interactive way.
WifiForge : Emulated Wireless Hacking Environments
WifiForge is a Wi-Fi security training tool developed by Black Hills InfoSec that provides a safe and legal environment for learning Wi-Fi hacking techniques. Based on the open source mininet-wifi framework, WifiForge automatically sets up virtual networks needed to run Wi-Fi exploitation labs without physical hardware.
Electronic Access Control Lab
This lab introduces participants to some of the common pitfalls associated with electronic access control systems. In the lab, participants will gain familiarity with low and high-frequency RFID cards. Then step-by-step instructions are provided for performing replay, card cloning, and brute force attacks against the targeted system. In addition, participants will explore reader implant devices that exploit cleartext communication between the reader and controller. Finally, participants will explore operation of doors remotely with direct access to the controller.
Bluetooth Low Energy Lab
This lab provides an introduction to the Bluetooth Low Energy (BLE) protocol. Participants will gain familiarization with various software tools used to interact with devices supporting the BLE protocol. Those tools will be used to interact with services exposed through BLE to retrieve information from the target device.
Keystroke Injections Lab
This lab includes concepts of hijacking a wireless mouse or keyboard and performing keystroke injection attacks. Several wireless input devices are found to still be vulnerable to this type of attack. Attendees will be able to understand and demonstrate how this attack is performed.
Doorbell Replay Attack Lab
This lab includes an introduction to software defined radio (SDR) recording and playback for static code devices. Steps include identifying signal characteristics, waveform analysis, static code analysis/regeneration, and signal reply. Attendees will be able to perform a replay attack against a wireless doorbell.
