Upgrade to Pro — share decks privately, control downloads, hide ads and more …

BIC to DEFCON

BIC to DEFCON

The Intro to DEFCON for BIC

Nico Smith

June 21, 2021
Tweet

More Decks by Nico Smith

Other Decks in Technology

Transcript

  1. WHOAMI • Father of 2 amazing children • BIC Director

    of Red Team Operations • Owner and Developer of Socks CTF • CEO Soldiers and Saints • Tech enthusiast • 18 years experience in IT / INFOSEC • Cyber Protection Team member in US ARMY National Guard • DEFCON Attendee and participant since DEFCON 10
  2. Simple Rules of the CON • The 312 rule 3

    – at least Hours of Sleep 1 – Shower 2- Meals • Be a Human • Listen to the GOONS !! • GOONS could be susceptible to bribes • Everyone could possibly help with the CTF that you are participating
  3. Cultural Considerations The typical attendee is in the range of

    new and curious to experienced and competent , to hey this might be cool. The important thing to know is how to navigate this amazing experience without being caught lacking … more to come on this in the next slides Most ppl at DC29 will be there to have a good time , and there are groups and villages that cater to your interests so please explore the villages
  4. Defensive Considerations • The latest releases of hacks/compromise are going

    to be tried at the conference , with the introduction of hybrid villages there will no doubtley be the presence of nefarious wifi access points and or plugs , to include but not limited to; QR Codes, Bluetooth Redirection and social engineering. • This said I will attempt to give a non exhaustive list of useful tips .
  5. Defensive Considerations - PHONES • Remember that 3g still works

    in the U.S. and so does all your apps. Use a burner phone if you can or Shut Off your Bluetooth and wifi on your phone. • IPHONE most recent wifi compromise below --- DONOT Connect to SSIDs that you don’t know .
  6. Defensive Considerations - PHONES • Don’t use other peoples charging

    cable • If you must use someone else charging cable then use a usb condom
  7. Defensive Considerations - Computers • Don’t use other peoples USB’s

    • Use a spare machine when possible • Connect to the appropriate SSID’s • Run Programs in a virtual environment
  8. USEFUL Links USB Condoms • https://www.amazon.com/Ansumg-Protect-Jacking%EF%BC%8CHack- Guaranteed-Charging/dp/B0859GHLCS • DEFCON NOOB

    Questions https://www.reddit.com/r/Defcon/comments/2c5f2b/defcon_noob_ question_regarding_cell/ • Virtualization https://www.virtualbox.org/