Three Days of Security!

- April 2016, Madison

Join us for three full days of talks and trainings from the finest peeps in the security world! Come enjoy the benefits of a small conference where you won't get lost in the crowd and you get time to interact directly with the speakers and your security peers. Attending the talks on Friday is FREE, so you have no excuse!

Bring your friends and co-workers for an epic weekend of security fun at Dakota State University!

The Vision

Come listen to the visions and ideas of some of the best and brightest minds in the security community.


After the talks, network with your peers and the security pros.


Learn from the best with a two day hands-on training. These trainings are of a DefCon caliber, right here in Madison!

Training Seats Still Available Today!

Register Now


Learn From These Great Folks


Track I

Track I will be held in the theater at the Dakota Prairie Playhouse on the campus of Dakota State University. No need to register, just come on out for the talks!

Dave Kennedy Make or break: How you can make it in the INFOSEC industry.

Eric Smith Roman Profiles: The 6 Mistakes of Man Consulting

Mubix Attacker Ghost Stories

Senator Mike Rounds Legislating Cybersecurity: An Overview from Capitol Hill

Michael Iedema The Intersection of Security and Usability

John Strand If I Wake EVIL!!!

Track II

Track II will be held in the conference room at the Dakota Prairie Playhouse on the campus of Dakota State University. No need to register, just come on out for the talks!

John Ode How I found two 0-Day exploits. One the hard way and the other the easy way.

Ian Malloy Your Computer is Leaking

Corey Steele Never Trust a Uniform

Ben Ten Red is the new Blue - Defensive Tips & Tricks from a Defender turned Pentester


The trainings will run the final two days of the conference, April 2 - April 3. The trainings are held in East Hall on the campus of Dakota State University. Be sure to register for the trainings!



Come learn from the best folks in the industry! Register today!
Trainings will be held in East Hall on the campus of Dakota State University, beginning at 1:00PM on April 2, and continue at 8:30AM on April 3.

  • Metasploit

    Mubix and Egypt


    Register Today!

    Egypt and Mubix have combined their knowledge of the innards of the Metasploit Framework and Adversarial Red Teaming practices to introduce on attacking your networks. Covering everything from getting Metasploit up and running and exploiting your first targets to gaining persistence and owning a whole networking without breaking a sweat.


    Day 1

    Concepts and Tools
    Attacker Decision Making
    Getting Metasploit Installed and Setup
    Internals of Metasploit
    Enumeration of Targets
    Exploiting the LAN

    Day 2

    Exploiting Windows Hosts
    Exploiting Linux Hosts
    Exploiting Web Servers
    Post Exploitation

  • OpenBTS Cellular Networks Workshop

    Michael Iedema

    Register Today!


    Overview of cellular network services and deployment scenarios
    Overview of required software components
    Cellular concepts and core network architecture
    Deep dive on GSM air interface from physical waveforms to logical channels
    Mapping the classic air interface to modern internet telephony
    Air interface security
    Deep dive on radio frequency theory and practical coverage implications
    Handset signal timing and radio power control
    Expanding to multi-node networks
    Mobility vs handover vs roaming
    Connecting services to the rest of the world

  • Red vs. Blue Techniques with Hunt Teaming

    Dave Kennedy

    Register Today!

    The attacks continue to change and most organizations still don't have the capabilities to detect the basic attacks. Adversarial simulation relies on attacks that are designed to maintain persistence and gain access to the data needed. This course focuses on the latest attack techniques giving penetration testers the ability to learn the new techniques but also focuses on teaching how to best defend against the attacks. The term hunt team focuses on taking a proactive approach in assuming an environment is already compromised. This course will cover both red and blue team efforts and provide methods for understanding how to best detect threats in an enterprise.

    This course is completely hands on!

    At the end of day 1 - you will be attacking a fully simulated network and performing offensive capabilities against our trainers who have to defend! At the end of day 2 - you will be defending while our trainers go on the offense while you try to stop and detect the attacks.

    This course applies real-world offense and defense capabilities to truly paint the full picture of understanding how attacks happen today and how to best prevent them.

    The course is completely fresh and contains all of the latest pentester methods as well as unreleased methods as well as the ways that actually stop us.

    Day 1 Outline

    Introduction to Attacker Techniques
    Common Methods for Exploitation
    Methods for Persistence and Evasion
    Lateral Movement and Pivoting
    Circumventing Security Defenses
    Understanding Attacker Mindsets
    Performing an adversarial simulation
    Simulated Attack Scenario on Live Network (TRAINERS DEFENSE, STUDENTS OFFENSE)

    Day 2 Outline

    Developing a Common Defense
    Introduction to Hunt Teaming
    Performing a hunt team exercise
    Tools, tricks, and free scripts!
    Identifying threats on the network
    Identifying threats on the endpoint
    Using existing technology in the network
    Special goodies
    Defending the Network - Live Network Defense (STUDENTS DEFENSE, TRAINERS OFFENSE)


    Penetration Testers
    Blue Team Members
    Hunt Teams


    Students can be from all different types of backgrounds and knowledge. Regardless if you are a penetration tester, or someone that focuses on defense - this course is for you. We heavily recommend at the minimum having basic systems administration experience - this will help you with hands on.


    Laptop with VMWare/Fusion or similar (VirtualBox is heavily not recommended).
    Kali Linux in a virtual machine (or primary OS)
    OR Ubuntu (LTS) with PenTesters Framework already loaded and up-to-date (github.com/trustedsec/ptf).
    Windows system (Windows 7+)


    Electronic copies of all of the course material.
    Custom scripts and techniques for both offense and defense

North Central CCDC

CCDC is a two day Network Security event. This is the first competition that specifically focuses on the operational aspect of managing, securing, and defending a "commercial" network infrastructure. Students get a chance to test their knowledge by building, protecting, and maintaining a realistic network and operations environment. Participating teams will be required to demonstrate their ability to withstand and defend against real-time network security attacks.

The winning team recieves an all expense paid trip to the national competition in San Antonio, Texas!

CCDC provides a unique opportunity for students to gain realistic defensive network security skills that closely simulate the operational challenges they will face as they enter the job market.

Teams are encouraged (but not required) to bring a Team Advisor. Advisors are not allowed to participate in the competition.

Information about Teams

  • Teams are accepted on a first-come-first serve basis
  • Each team can consist of up to eight students
  • ONLY 2 of the 8 members can be graduate students
  • $0 Entry Fee Per Team

What to Bring?

  • Friday Supper will be provided, Saturday breakfast will be provided
  • Teams are asked to bring their own laptops/desktop computers and monitors
  • You MUST have Administrator rights to the machine
  • Windows 7/8 are the "official" supported operating systems (but MacOS/Linux typically work too)
  • If your team is unable to bring your own machines, we will supply the needed hardware for you
  • You MUST inform us of this by February 20th!

Dates: April 1 - April 2
CCDC will begin at 4:00PM on April 1, and continue the morning of April 2, finishing before the trainings begin.

DakotaCon Attendees: feel free to stop by Friday or Saturday and check out CCDC. You're also welcome to attend the reception following CCDC on Saturday at Nicky's in Madison!

High Schoolers: See what life at DSU is like! Check out DakotaCon, stop by and see the CCDC teams from around the region compete on Saturday. Stop by Nicky's on Saturday night and hang out with DakotaCon speakers, CCDC teams, and other great peeps!

Contact Info: For further details, to register a team, or request any other information contact the project lead:
Kyle Cronin

NC CCDC Live Stream


The 2016 DakotaCon CTF will be a traditional "jeopardy style" CTF, held online over the duration of the conference. The CTF will be available at http://ctf.dakotacon.org/ from Friday, April 1st at 8:00 AM through Sunday, April 3rd at 11:59 PM. Topics will include programming, RF, binary and web exploitation, reverse engineering, and a few miscellaneous others. Most challenges will be solvable over the web, while a few may include real world components only available at DakotaCon.

Anyone is welcome to compete, but only those physically present at DakotaCon will be eligible for prizes. Participants may compete as individuals or as a group; however, prizes will not necessarily be available to each member of a group. There is no entry fee.

Some things that participants may find useful during the competition:
  • A disassembly tool such as IDA Pro, Hopper, radare2, or even just objdump.
  • A Linux environment with a network connection and administrative privileges.
  • A software defined radio, or basic amateur radio.
  • H4ck1ng skillz :)

The only specifically prohibited activities which will result in disqualification are:
  • Denial of service of any kind. Any activity that results in other participants not being able to complete any challenge is not allowed.
  • Attacks against the scoring engine or CTF webpage itself. All challenges are hosted on a separate IP address. Do not attack anything you are not authorized to.
  • Attacks against other players. Just don't.
Other than that, go wild! We encourage innovative problem solving and will likely allow any solution that does not violate the rules above. The CTF administrators will be the final arbiters of any decision in the event of a dispute.

For questions and issues regarding the CTF website or your account, please contact alex.gartner@dsu.edu.
For questions and issues regarding the challenges themselves, please contact andrew.kramer@dsu.edu.


Conference Will Be Held At

Dakota State University

Dakota Prairie Playhouse

Getting Here

Air Travel

The nearest airport is Sioux Falls, SD (FSD). Then a 45 mile drive to Madison.

By Car

From points East or West, take SD-34. North or south, take US-81. If in doubt, GPS!


1205 N. Washington
Madison, SD 57042

Hotels Nearby


504 10th St. SE, Madison, SD 57042
Phone: (605) 256-3076


Sponsorship plays a major role in the success of our event.

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Tweets by @DakotaCon

Tweets by @NC_CCDC