6:00pm - 8:00pm
CAPTURE THE FLAG
Bring your tools, team, and laptops. There will be no attacks against your systems, only access to our targets.
Bring your team or join a team... but, be there for the event that allows you to be King of the Mountain.
There are rules to play and we need you to play by the rules...
For those yet to see live hacking, you will leave with new respect for those that came and claimed the flags and became King of the Mountain.
For those that came and tried your best, there is only one King of the Mountain, will it be you and your team?
Compromise each target system and gather the text file that is located in the root directory. There will be a total of seven (7) text files. The one or group who obtains the most text files will win the prize! Partial hints will be provided in each file. If additional assistance is needed members of Security University Team will be there to help.
In partnership with Black Hat Security Conference, come Hack for a Night and walk away with more awareness about security techniques and system vulnerabilities. This will be a fun-filled evening, geared towards the novice and expert alike!
Also - WITI members receive a discount for registering for the Black Hat Briefings by July 26. Insert the code BH06USAASSOC into the box marked "Coupon Codes" on the web registration page and you'll receive a $100 discount off the prevailing rate for the Briefings, reflected on your final invoice. You can check out these high-powered security sessions and register by visiting https://commerce.blackhat.com/usa-reg.
See you there!
About Our Speaker(s)
Sondra Schneider is CEO and Founder of Security University a Connecticut based Computer Security and Information Assurance Training Company. For the past 11 years Sondra has been traveling around the world training network professionals to be network and security professionals. In 2004 she was awarded Entrepreneur of the year for the First Annual Woman of Innovation Award from the Connecticut Technology Council. She sits on the advisory board for 3 computer security (start-up) technology companies and is a frequent speaker at computer security and wireless industry events. She is a founding member of the NYC HTCIA and IETF, and works closely with ISC2, ISSA & ISACA chapters and the vendor community to provide computer security training and feedback.
Event Date and Venue
This event will be held from 6:00pm - 8:00pm on Tuesday, August 1, 2006 at:
Caesars Palace, Augustus 1 on the 4th floor of the Palace Tower
3570 Las Vegas Boulevard
Las Vegas, Nevada 89109
Pre-registration for this event is closed and on-site registrations will not be accepted.
About Our Sponsor(s)
Anyone attending the WITI event will be eligible for a 7-day, 8-IP version of CORE IMPACT, the first automated, comprehensive penetration testing product for assessing specific information security threats to an organization. By safely exploiting vulnerabilities in your network infrastructure, the product identifies real, tangible risks to information assets while testing the effectiveness of your existing security investments.
Stay a step ahead of growing threats
CORE IMPACT enables you stay on top of vulnerabilities, even as your infrastructure expands and changes. You can run penetration tests as often as necessary, whether you need to:
test existing or new network infrastructure;
ensure the integrity of security patches;
evaluate the impact of system upgrades or modifications; or
generate periodic reports for compliance purposes.
With CORE IMPACT, you gain the information you need to mitigate security risks. CORE IMPACT helps you:
preserve your organizations reputation;
maintain network stability and employee productivity; and
ensure compliance with industry and government regulations.
Intelligently identify and address vulnerabilities
With CORE IMPACT, you methodically execute real-world networks attacks to gain information about actual, exploitable security threats. By distinguishing critical vulnerabilities from false positives, the product enables you to intelligently plan, prioritize and execute remediation efforts. In addition, its consistent, repeatable testing process helps you evaluate and configure new security applications for optimal network security.
About Our Partner(s)
This meeting is conducted in partnership with Black Hat Security conference. Black Hat is the world's premier technical event for IT security experts. Please visit http://Blackhat.com to learn more about this organization, and the upcoming conference.
For more info regarding registration or event details, please contact Laura Fucci ([email protected]).
For more details about pre-registration, contact Tech Support.