wasabi
Educator, hands-on hacker, and Blue Team strategist exploring the frontiers of embedded systems, AI, academic research, and competitive challenges. Previously spoken a number of conferences including DefCon, SCALE, BSides LA, and ShellCon to name a few.
Sessions
Don't plug in devices you don't trust - It's an often repeated mantra everywhere from the workplace to the movies. But, have you ever wondered how it works in real life, and what the risks truly are?
This training covers the basics of Hak5's DuckyScript-Language (Version 3) and how to utilize O.MG Devices to develop HID based attacks.
Learn the basics of Hak5's DuckyScript, how to script human input, how to GeoFence, Remote Control, and much more. This workshop covers exploiting the "human factor" of security and will go over Physical Red Team Assessments, Attacks, and normalizing strategies to improve reliability and performance of your scripts.
This talk explores the design and creation of two cybersecurity competitions: WRCCDC (Western Regional Collegiate Cyber Defense Competition) and CIRCUS (Collegiate Incident Response Competition for Undergraduate Students). This brief talk will go over challenges, best ways to gain interest, grow competitions. In addition we will discuss how to build interest in different cyber-security based fields using competitions. Drawing on proven examples, we’ll offer actionable guidance for competition organizers, coaches, and academic programs aiming to bridge the cybersecurity skills gap.