Wireless Penetration Testing from n00b to l33t, and the Wireless Capture the Flag Competition
01-31-2014 08:37 AM - edited 03-07-2014 07:46 AM
Rick Mellendick - Chief Security Officer - Signals Defense
Rick has been the Senior Security Architect for multiple federal agencies and corporations. He runs the Wireless Capture the Flag contest for conferences all over the US. Rick is a builder and breaker of all things RF and been involved with wireless competitions as a competitor and visionary since 2003. Rick has over 17 years of IT and security experience. His background includes designing secure networks in a multi-platform/multi-classification environment, DoD Computer Network Operations, wireless engineering and application testing while spearheading the design and implementation of non-traditional network strategies using offensive techniques to better defend networks.
Mike Guthrie - Red Team Lead - Chickasaw Nation Industries
Mike spends his time performing penetration tests, and accreditations for the public and private sector, with over 11 years experience in cyber security. He was the Network Security Architect at Bonneville Power Administration in the northwest. At Mentor Graphics he spent time as a network engineer providing enterprise networking, firewall and VPN support for a global network comprising of 72 connected sites worldwide. Mike's background is specifically related to control systems in the bulk power generation, transmission areas and all things RF. During this time he developed unique perspectives on the areas of compliance and regulation in the power industry.
Description of session:
The Airheads Wireless Capture the Flag (WCTF) is constructed in two stages:
Stage One is a series of training labs designed for participants to sharpen their skills. Participants will be taught how to evaluate and navigate through the RF spectrum and handle situations where the only point of entry to a target is through RF. Stage Two is the WCTF, where participants will be pitted against each other in a no holds barred contest of RF domination. Participants will use both offensive and defensive tactics to win. Prior to the start of the WCTF, an onsite primer will be offered to discuss a wide-range of tools that are helpful to use when competing in WCTFs.
Each competitor should come prepared with knowledge of how to crack encryption keys, read PCAPs, find and connect to networks of all types, and decrypt RF signals. To win, participants MUST bring their A (or B, G, N, AC) game and all the tools in their attack/defense bag.
There will be multiple systems with multiple attack vectors. Behind each of the wireless networks encountered, there will be a flag or two that must be submitted in order to gain points as well as clues. Flags will range from a passphrase/password used to gain access to wireless access points to files located on servers. Each flag has its own unique number of points.
Also Check out the Wireless CTF Game!
On February 15, 2014, everything a participant will need to know in order to compete will be located on the website shown below:
How does this sound to you guys? I am looking forward to it.
Smart Spaces TME
Re: Wireless Penetration Testing from n00b to l33t, and the Wireless Capture the Flag Competition
01-31-2014 08:45 AM
In Vegas this year???
ACDX #420 | ACCA
[If you found my post helpful, please give kudos!]