• South Dakota's Premiere Security Event

    All in the Middle of a Cornfield

  • DakotaCon 8

    March 23–March 252018Madison, South Dakota

About

Three Days of Security!

March - March 2018, Madison

Join us for three full days of talks and trainings from the finest peeps in the security world! Come enjoy the benefits of a small conference where you won't get lost in the crowd and you get time to interact directly with the speakers and your security peers. Attending the talks on Friday is FREE, so you have no excuse!

Bring your friends and co-workers for an epic weekend of security fun at Dakota State University!

The Vision

Come listen to the visions and ideas of some of the best and brightest minds in the security community.

Socialize

After the talks, network with your peers and the security pros.

Trainings

Learn from the best with a two day hands-on training. These trainings are of a DefCon caliber, right here in Madison!

Speakers

Learn From These Great Folks

Schedule

Track I

Track I will be held in the theater at the Dakota Prairie Playhouse on the campus of Dakota State University. No need to register, just come on out for the talks!

Jared DeMott How to Conduct a Product Security Test

Eric Smith TBA

TrustedSec TBA

Bob Kalka How Cognitive and AI are Changing Cyber

John Strand TBA

Jason Lang Blue Star Rising - Why Red Teaming is Getting Harder and What Can Be Done

Eric Capuano 50 Shades of Graylog

Track II

Track II will be held in the conference room at the Dakota Prairie Playhouse on the campus of Dakota State University. No need to register, just come on out for the talks!

Suricata TBA

Michael Iedema A Hype-Free Look at Blockchain

Corey Steele Breaking 802.1x Over the Air and the Wire

Chuck Woodraska Over the Wire

Megan Roddie Strengthen Your SecOps Team by Leveraging NeuroDiversity




DakotaCon Video Archive

We will be live streaming this year's event, check back later for the stream.
In the meantime, check out last year's event or our full archives.
2016 - Track I
2016 - Track II

DakotaCon 2017 Live Stream

Track I
Direct Link
Track II
Direct Link

NC CCDC Video Archive

We will be live streaming this year's event, check back later for the stream.
In the meantime, check out our full archives.

2016 - NC CCDC

NC CCDC Live Stream



DakotaCon 2017 Video Archive

Missed DakotaCon last year? Well, we hope to see you this year, but you can catch the recordings right here!
Or check out our full archives.
2017 - Track I
2017 - Track II

NC CCDC Video Archive

Check out our full archives.


Trainings

Come learn from the best folks in the industry! Register Today!
Trainings will be held on the campus of Dakota State University, beginning in the afternoon of March 24, and continue on March 25.


  • SECURITY: FOR HACKERS AND DEVELOPERS

    NOW WITH 40% MORE HAXS

    Jared DeMott

    Register Today!

    Security: For Hackers and Developers, is designed for practitioners to learn about the tools and techniques used to find bugs in real world software. This class is great for anyone in software, testing, or hacking, but is probably at its very best for teams working with C/C++ (code or binaries).

    Day 1: Security Strategy, Code Auditing, and Fuzzing


    We begin the class with a brief strategy discussion like the one here on Pluralsight – Security for Hackers and Developers: Overview

    Understanding how and when to audit source code is key for both developers and hackers. Students learn to zero in on the important components. Automated tools are mentioned, but auditing source manually is the focus, since verifying results is a required skill even when using automated tools. Spotting and fixing bugs is the focus.

    Fuzzing is a runtime method for weeding out bugs in software. It is used by a growing number of product and security organizations. Techniques such as dumb file fuzzing, all the way up to distributed fuzzing, will be covered. Students will write and use various fuzzers.

    Day 2: Reverse Engineering and Exploitation


    Students focus on learning to reverse compiled software written in C and C++, though half-compiled code is mentioned as well. The IDA pro tool is taught and used throughout. Calling conventions, C to assembly, identifying and creating structures, RTTI reconstruction are covered. Students will also see IDA’s more advanced features such as flirt/flare, scripting, and plug-ins.

    Students will walk out of this class knowing how to find and exploit bugs in software. This is useful to both developers and hackers. The exploit component will teach common bug type such as: stack overflow, function pointer overwrite, heap overflow, off-by-one, integer error, uninitialized variable, use-after-free, double fetch, and more. For the exploits, return overwrites, heap spraying, ROP and gadget discovery, etc. Shellcode creation/pitfalls and other tips and tricks will all be rolled into the exciting, final component.


  • Red vs Blue

    Learn to defend against advanced adversaries

    Eric Capuano
    Jason Gaudard

    Register Today!

    Saturday (Day 1) - Red vs. Blue

    Jason and Eric will essentially go “head to head” teaching competing tactics on offensive and defensive techniques. The format will be as such: Jason will teach an advanced offensive tactic and Eric will teach methods to detect this activity as well as proactively defend against it (beyond simply “patch everything”). These volleys will get very interesting as Jason gets into more advanced attack techniques which require very sophisticated DFIR techniques. Each tactic discussed will be accompanied by a live demonstration and/or a hands-on lab. Best part about the tools is that we’ll be leveraging strictly open source solutions. On day two, we will operate our OpenSOC simulation for all who wish to participate.

    Sunday (Day 2) - Recon InfoSec - OpenSOC DFIR CTF


    Participants can be either teams or individuals and are encouraged to use a laptop running Kali, SIFT or any OS loaded with a DFIR toolset. There will be wired and wireless access to the environment. Upon logging into the environment, participants will act as “blue team” incident responders seeking to identify a network breach that is actively in progress. The range is a small, but realistic mock-up of an enterprise network complete with Active Directory, Exchange, firewalls, SIEM, workstations, etc. Participants will have access to a SIEM/log aggregation tool, and multiple security appliances to try and identify the malicious activities that are taking place on the network.

    This is not an active defense challenge, as those often require a significant amount of time. This is simply an “identification” challenge, which is honestly the best starting place for most incident response training functions. The challenge is simple: can you find the hostile activities and identify key components of the threat?

    There will be a scoreboard that will prompt the participant to answer Jeopardy-style questions to measure their progress through the challenge. A sample question might be, “What is the external IP address of the malicious activity detected by the perimeter firewall?” or “What protocol is the attacker using to exfiltrate data from within the network?” This will nudge the participant in the right direction for systematically tracing and identifying unauthorized activity on an enterprise network.


  • Red Team Tactics for Red and Blue

    Trusted Sec, LLC

    Register Today!

    Immerse yourself in a course for red team tactics that covers a number of methods for simulating an attack against an organization and how to best detect and respond. This course is for both red and blue teams and focuses on the techniques used by adversaries as well as how to detect abnormal patterns of behavior in an organization. During the course, each technique will be covered as well as ways on detecting the behavior exhibited from the attacks. In addition, the class will go over building your own infrastructure, tools, and capabilities used for real-world attacks. This course focuses on teaching the latest techniques in red team testing as well as how blue teamers can get the appropriate information to identify adversarial capabilities within a network.

    Day 1:

    Introduction to Red Teaming
    Covering Physical and Social Elements
    Building Infrastructure
    Domain Fronting and Redirectors
    Custom Payload Delivery
    Detecting Custom Payload Delivery

    Day 2:

    PowerShell Exploitation and Detection
    Application Control Attack Vectors and Detection
    Persistence Footholds and Detection
    Lateral Movement and Detection
    Custom Payload Delivery Systems

    Who Should Take the Course

    Seasoned and Novice Penetration Testers
    Blue Team Defenders
    Red Teamers
    Hunt Teams
    Incident Responder
    Penetration Testers


    What Students Will Need:

    A laptop loaded with VMWare and capable of running two virtual machines (provided in a VMWare format).


  • Suricata

    Jack Mott
    Jason Williams

    Register Today!

    In Signature Development for Suricata we will teach expert methods and techniques for writing network signatures to efficiently detect the greatest threats facing organizations today. Students will gain invaluable information and knowledge including the configuration, usage, architecture, traffic analysis fundamentals, signature writing, and testing of Suricata. Students will be given handouts to help them understand and develop their own network signatures. Lab exercises will train students how to analyze and interpret hostile network traffic into agile rules for detecting threats, including but not limited to: Exploit Kits, Ransomware, Phishing Attacks, Malicious Documents, Crimeware Backdoors, Targeted Threats, and more. Students will leave the class armed with the knowledge of how to write quality signatures for their environment, enhancing their organization’s ability to respond and detect threats. The labs stay updated with current malware, exercises, and pcaps as well as the latest Suricata engine functionality. The class is very hands-on with a robust workbook featuring exercise walkthroughs/explanations and a physical copy of the material presented. The class exercises feature paths for those that are brand new to writing signatures and signature experts who dream in pcre.

    Day 1:

    Network and Malware Analysis Fundamentals
    IDS Engine Fundamentals
    Rule Writing Fundamentals
    Writing Signatures for DNS
    Writing Signatures for HTTP


    Day 2:

    Advanced Rule Features
    Writing Signatures for SSL / TOR
    Detecting Phishing Communications
    Detecting Ransomware Communications
    Detecting Malicious Documents
    Detecting Exploit Kit Activity
    Detecting Targeted Threats

North Central CCDC

CCDC is a two day Network Security event. This is the first competition that specifically focuses on the operational aspect of managing, securing, and defending a "commercial" network infrastructure. Students get a chance to test their knowledge by building, protecting, and maintaining a realistic network and operations environment. Participating teams will be required to demonstrate their ability to withstand and defend against real-time network security attacks.

The winning team recieves an all expense paid trip to the national competition in San Antonio, Texas!

CCDC provides a unique opportunity for students to gain realistic defensive network security skills that closely simulate the operational challenges they will face as they enter the job market.

Teams are encouraged (but not required) to bring a Team Advisor. Advisors are not allowed to participate in the competition.

Information about Teams

  • Teams are accepted on a first-come-first serve basis
  • Each team can consist of up to eight students
  • ONLY 2 of the 8 members can be graduate students
  • $0 Entry Fee Per Team

What to Bring?

  • Friday Supper will be provided, Saturday breakfast will be provided
  • Teams are asked to bring their own laptops/desktop computers and monitors
  • You MUST have Administrator rights to the machine
  • Windows 7/8 are the "official" supported operating systems (but MacOS/Linux typically work too)
  • If your team is unable to bring your own machines, we will supply the needed hardware for you
  • You MUST inform us of this by February 20th!

Dates: March 23 - March 24
CCDC will begin in the afternoon of March 23, and continue the morning of March 24, finishing before the trainings begin.

DakotaCon Attendees: feel free to stop by Friday or Saturday and check out CCDC. You're also welcome to attend the reception following CCDC on Saturday at The Pub House in Madison!

High Schoolers: See what life at DSU is like! Check out DakotaCon, stop by and see the CCDC teams from around the region compete on Saturday. Stop by The Pub House's on Saturday night and hang out with DakotaCon speakers, CCDC teams, and other great peeps!

Contact Info: For further details, to register a team, or request any other information contact the project lead:
Kyle Cronin
dakotacon@dsu.edu

Venue

Conference Will Be Held At

Dakota State University

Dakota Prairie Playhouse

Getting Here

Air Travel

The nearest airport is Sioux Falls, SD (FSD). Then a 45 mile drive to Madison.

By Car

From points East or West, take SD-34. North or south, take US-81. If in doubt, GPS!

Location

1205 N. Washington
Madison, SD 57042

Hotels Nearby

AmericInn

504 10th St. SE, Madison, SD 57042
Phone: (605) 256-3076

Sponsors

Sponsorship plays a major role in the success of our event.

Gold Sponsors


Silver Sponsors


Bronze Sponsors


Tweets by @DakotaCon


Tweets by @NC_CCDC