Upgrade to Pro — share decks privately, control downloads, hide ads and more …

BIC to DEFCON

BIC to DEFCON

The Intro to DEFCON for BIC

Avatar for Nico Smith

Nico Smith

June 21, 2021
Tweet

More Decks by Nico Smith

Other Decks in Technology

Transcript

  1. WHOAMI • Father of 2 amazing children • BIC Director

    of Red Team Operations • Owner and Developer of Socks CTF • CEO Soldiers and Saints • Tech enthusiast • 18 years experience in IT / INFOSEC • Cyber Protection Team member in US ARMY National Guard • DEFCON Attendee and participant since DEFCON 10
  2. Simple Rules of the CON • The 312 rule 3

    – at least Hours of Sleep 1 – Shower 2- Meals • Be a Human • Listen to the GOONS !! • GOONS could be susceptible to bribes • Everyone could possibly help with the CTF that you are participating
  3. Cultural Considerations The typical attendee is in the range of

    new and curious to experienced and competent , to hey this might be cool. The important thing to know is how to navigate this amazing experience without being caught lacking … more to come on this in the next slides Most ppl at DC29 will be there to have a good time , and there are groups and villages that cater to your interests so please explore the villages
  4. Defensive Considerations • The latest releases of hacks/compromise are going

    to be tried at the conference , with the introduction of hybrid villages there will no doubtley be the presence of nefarious wifi access points and or plugs , to include but not limited to; QR Codes, Bluetooth Redirection and social engineering. • This said I will attempt to give a non exhaustive list of useful tips .
  5. Defensive Considerations - PHONES • Remember that 3g still works

    in the U.S. and so does all your apps. Use a burner phone if you can or Shut Off your Bluetooth and wifi on your phone. • IPHONE most recent wifi compromise below --- DONOT Connect to SSIDs that you don’t know .
  6. Defensive Considerations - PHONES • Don’t use other peoples charging

    cable • If you must use someone else charging cable then use a usb condom
  7. Defensive Considerations - Computers • Don’t use other peoples USB’s

    • Use a spare machine when possible • Connect to the appropriate SSID’s • Run Programs in a virtual environment
  8. USEFUL Links USB Condoms • https://www.amazon.com/Ansumg-Protect-Jacking%EF%BC%8CHack- Guaranteed-Charging/dp/B0859GHLCS • DEFCON NOOB

    Questions https://www.reddit.com/r/Defcon/comments/2c5f2b/defcon_noob_ question_regarding_cell/ • Virtualization https://www.virtualbox.org/