Lunch

At WWHF, we want to make sure you don’t faint from lack of vittles while you are busy hacking and learning and having other kinds of fun. Come on down to the Deadwood Mountain Grand and break bread with us!
At WWHF, we want to make sure you don’t faint from lack of vittles while you are busy hacking and learning and having other kinds of fun. Come on down to the Deadwood Mountain Grand and break bread with us!
On-Site Registration for Training. Please show up early if you are attending classes.
We all know that delivering the final pentest report isn’t the end of the road. It’s really just the beginning — and it should be. Annual pentests are becoming a thing of the past in favor of strategies that involve shorter iterative cycles of testing, remediation, and validation. So where does pentesting fit into a continuous validation paradigm? This talk will overlay the pentesting and continuous validation life cycles to show how pentesters can deliver more value post engagement and set the stage for their organizations or clients to conduct more frequent, more productive pentests.
Join us while we discuss notable Infosec, and Infosec-adjacent news from the main stage at Wild West Hackin’ Fest!
This presentation aims to walk through important One Drive artifacts, how to use OneDriveExplorer, and what value can be added from using OneDriveExplorer compared to conventionally used tools.
Badrats is an open-source Command and Control (C2) tool designed for initial access. Supporting 5 unique implants written in different languages, it allows operators to switch up their tradecraft on the fly depending on the defensive controls in place inside a client environment.
Come join the us for a rousing game of chess at the 1st WWHF Chess tournament!
There is a potential shift in Internet law with a lively debate surrounding it. Has Big Tech taken over free speech and political discourse? Are algorithms deciding our future? This year, the Supreme Court will be hearing the case Gonzalez v. Google LLC, in which the plaintiff asserts that Google’s algorithm allows ISIS recruitment videos to be presented to young, impressionable youths. The Gonzalez’s legal team asserts that Google as the publisher of the content is at least partially responsible for their daughter’s death in the Islamic State attack in Paris in 2015.
“Intro to Social Engineering” is a 2-hour course that will provide students an extensive crash course in the study, practice, and defense of social engineering. The course will include interactive elements/technology designed to make the session fun and engaging. In this course we will clearly define ‘social engineering’, cover the most common attack vectors utilized in this domain, and explore the history & development of social engineering.
Ever had a dream where you were in front of hundreds of people waiting for you to give a presentation only to realize you’ve never seen the slides, don’t know the subject, and everyone there expects you to be the expert? Yes? Well buckle up because that dream becomes an entertaining dumpster fire of infosec proportions when you join us at Wild West Hackin’ Fest for Slide Show Roulette!