Slide 1

Slide 1 text

No content

Slide 2

Slide 2 text

AGENDA WHOAMI Simple Rules of the CON(DC29) Cultural Considerations Defensive Considerations

Slide 3

Slide 3 text

WHOAMI • Father of 2 amazing children • BIC Director of Red Team Operations • Owner and Developer of Socks CTF • CEO Soldiers and Saints • Tech enthusiast • 18 years experience in IT / INFOSEC • Cyber Protection Team member in US ARMY National Guard • DEFCON Attendee and participant since DEFCON 10

Slide 4

Slide 4 text

Simple Rules of the CON • The 312 rule 3 – at least Hours of Sleep 1 – Shower 2- Meals • Be a Human • Listen to the GOONS !! • GOONS could be susceptible to bribes • Everyone could possibly help with the CTF that you are participating

Slide 5

Slide 5 text

Cultural Considerations

Slide 6

Slide 6 text

Cultural Considerations The typical attendee is in the range of new and curious to experienced and competent , to hey this might be cool. The important thing to know is how to navigate this amazing experience without being caught lacking … more to come on this in the next slides Most ppl at DC29 will be there to have a good time , and there are groups and villages that cater to your interests so please explore the villages

Slide 7

Slide 7 text

Defensive Considerations

Slide 8

Slide 8 text

Defensive Considerations • The latest releases of hacks/compromise are going to be tried at the conference , with the introduction of hybrid villages there will no doubtley be the presence of nefarious wifi access points and or plugs , to include but not limited to; QR Codes, Bluetooth Redirection and social engineering. • This said I will attempt to give a non exhaustive list of useful tips .

Slide 9

Slide 9 text

Defensive Considerations - PHONES • Remember that 3g still works in the U.S. and so does all your apps. Use a burner phone if you can or Shut Off your Bluetooth and wifi on your phone. • IPHONE most recent wifi compromise below --- DONOT Connect to SSIDs that you don’t know .

Slide 10

Slide 10 text

Defensive Considerations - PHONES • Don’t use other peoples charging cable • If you must use someone else charging cable then use a usb condom

Slide 11

Slide 11 text

Defensive Considerations - Computers • Don’t use other peoples USB’s • Use a spare machine when possible • Connect to the appropriate SSID’s • Run Programs in a virtual environment

Slide 12

Slide 12 text

USEFUL Links USB Condoms • https://www.amazon.com/Ansumg-Protect-Jacking%EF%BC%8CHack- Guaranteed-Charging/dp/B0859GHLCS • DEFCON NOOB Questions https://www.reddit.com/r/Defcon/comments/2c5f2b/defcon_noob_ question_regarding_cell/ • Virtualization https://www.virtualbox.org/