Tool Shed Demo: CTF 101 – How to Play and Win
Python-written tool providing a one-liner command for accelerating the collection, processing, analysis and outputting of digital forensic artifacts.
Python-written tool providing a one-liner command for accelerating the collection, processing, analysis and outputting of digital forensic artifacts.
Agents, we have a case for you. Sightings of multiple infosec cryptids have been reported at Wild West Hackin’ Fest 2023. As
At WWHF, we want to make sure you don’t faint from lack of vittles while you are busy hacking and learning and having other kinds of fun. Come on down to the Deadwood Mountain Grand and break bread with us!
Join Garret Foster as he teaches about pre-2k! Pre-2k is an Active Directory auditing tool that identifies the existence of computer accounts configured with pre-Windows 2000 compatibility (default password) or without a password entirely.
Ed Miro will be facilitating an open lockpicking area including practice locks and picks that will be available for you to play with.
Ed Miro will be facilitating an open lockpicking area including practice locks and picks that will be available for you to play with.
On-Site Registration for Training. Please show up early if you are attending classes.
We all know that delivering the final pentest report isn’t the end of the road. It’s really just the beginning — and it should be. Annual pentests are becoming a thing of the past in favor of strategies that involve shorter iterative cycles of testing, remediation, and validation. So where does pentesting fit into a continuous validation paradigm? This talk will overlay the pentesting and continuous validation life cycles to show how pentesters can deliver more value post engagement and set the stage for their organizations or clients to conduct more frequent, more productive pentests.
Join us while we discuss notable Infosec, and Infosec-adjacent news from the main stage at Wild West Hackin’ Fest!
Join BHIS’s Corey Ham as he teaches about Aleph! Aleph is a tool that can be utilized for ingesting and analyzing unstructured data from ransomware, leaks, or even internal file shares. Corey will demonstrate how to ingest and extract useful data and information using Aleph.