-
All content is in person only.
-
Unless otherwise specified, all other times of the content are:
- Friday August 12, 2022: 10:00 - 18:00 PST
- Saturday August 13, 2022: 10:00 - 18:00 PST
- Sunday August 14, 2022: 10:00 - 14:00 PST
Content |
Partner |
Time |
|||
---|---|---|---|---|---|
Hackable Book Signing |
Ted Harrington |
3:30 - 4:00pm PT Saturday, August 13th | |||
Location: IoT Village Alliance Ballroom Get a free signed copy of the #1bestseller Hackable and meet the author! |
|||||
Hands on Hacking Labs: |
Loudmouth Security |
All Day | |||
IoT Hacking 101 is a set of quick, hands-on labs developed to teach the tools techniques for discovering and exploiting some of the common weaknesses found in loT devices today. Whether you're a pentester that has never hacked loT devices or even someone that has never hacked anything (!), these self-guided labs will walk you through all the steps in order to successfully pwn loT. |
|||||
IoTV: Capture The Flag |
Loudmouth Security |
All Day | |||
The IoT Village CTF has over 30+ devices and challenges to find and exploit vulnerabilities in real IoT devices. Players, or teams up to 6 people, can register and compete against one another to win great prizes!. With an overall focus on real-life consequences, this year's CTF is the newest and best IoT Village CTF yet! The challenges will require creative thinking, knowledge in networking, and competency in exploit development to claim the top prize. Prizes will be awarded to the top 3 teams/players at the end of the event. |
|||||
Hack the Box CTF Challenge |
Hack the Box |
All Day | |||
Dive into hacking challenges with HTB at the IoT Village DEFCON 30 CTF. “House Edge” is a themed CTF challenge that aims to have the players travel through a mission inside a space casino with the final goal of accessing a safe box to retrieve its contents. Each challenge is a standalone and does not require to have solved any other challenges. That said, the content is structured in a specific order that helps facilitate the scenario, which at a high level can be broken down into the following side-tasks of the mission:
|
|||||
Sixgen Challenge |
Sixgen |
All Day | |||
A handcrafted IoT challenge that will put your skills to the test. Be prepared to hack devices over bluetooth low energy, break into Wi-Fi networks, and exploit binaries. If you avoid the deadly sharks and laser beams you may be able to access smart locks, conduct electronic warfare, and fly drones. |
|||||
Hacking Product Security Interviews |
Zoox |
11:00am and 11:30am PT Friday, August 12th | |||
Cybersecurity is a complex, multi-faceted field and pursuing a career in it requires the acquisition of a number of different skill sets. Product Security interviews can be particularly challenging due to the expectation that candidates possess both hacking AND software engineering intuition and skills. Zoox will take a software engineering perspective and unpack this topic in an interactive talk. They focus on big-picture as well as tactical insights that will help you invest your time when preparing for your dream Product Security job. Join Zoox at 11:00am and 11:30am PT Friday, August 12th! |
|||||
BURP Suite, Forensics Tools & 0-day Exploit Development |
Ken Pyle |
10:00am - 2:00pm PT Saturday, August 13th | |||
These exercises from Cybir's Ken Pyle will show how simple security flaws and exposures become critical, world wide exposures in systems like the Emergency Alert System and network infrastructure from Cisco & Dell. Recreate some of the most impactful kill chains ever, learn new IOT / appsec skills, enumerate a supply chain network with a text editor, and "live off the land" with a few simple free tools like BURP SUITE. Join Ken from 10:00am - 2:00pm PT on Saturday, August 13th! |
|||||
Hands on Hardware Hacking – eMMC to Root |
Rapid7 |
All Day | |||
Hardware hacking with Rapid7! Rapid7 guided exercises will lead you through the hands-on hardware hacking process to gain root level access to embedded IoT technology. This series of exercises will cover multiple steps including embedded multimedia controller (eMMC) interaction, making binary images copies of flash, interaction with read only squash files systems to unpack and repack systems, and altering startup files systems within the devices’ file system to allow you to eventually gain root level access over SSH. |
|||||
Revolutionary Lab Experience |
INE |
All Day | |||
Dive into our browser-based lab platform and experience 2,000+ real-world engineered labs covering everything from the basics to expert-level skills. Explore INE’s newest learning path, Penetration Testing Student v2, with all new dynamic labs in a sandbox-style playground for risk-free practice.. When cyber threats emerge, learn to combat them as they’re unfolding in INE’s Cyber Vulnerabilities Training Library, a rapidly deployed hands-on lab environment featuring some of the industry’s biggest challenges like Log4j, Spring4Shell, WannaCry Ransomeware, and more! Crush your training goals and get ready to nail your next project — all you need to do is press play! |