Friday April 11th 2025 from 8am-6pm at the Shewmaker Center for Workforce Technologies in Bentonville, AR we are pleased to bring you
HackNWA Conference: Sock Puppet Tycoon - Disposable Machine, Network, Server, Client and Identity; Make frens and influence ppl
To maximize awesomeness, convenience and value, the event is once again the day before Sp4rkCon (Saturday April 12th 2025) - the venues are literally across the highway from each other.
This year we have an improved venue, Two tracks with an incredible guest speaker lineup, activities, panelists, exhibits, afterparty concert and more!
Lunch will be provided and we will have a QA Panel of PWN at that time where you can ask our panelist hackers the questions you have been seeking answers for.
Activities include Solder Village, Badge/Hardware Hacking, Exhibits and Challenges.
We are also having a Nerdcore concert at 7:30PM after the main conference event.GET YOUR TICKETS NOW:
REGISTER HERE!
Ticket Includes
Location
Shewmaker Center For Workforce Technologies, 1000 SE Eagle Way, Bentonville, AR 72712
SPEAKERS
We have an amazing lineup of speakers.
Tim MalcomVetter
Keynote
Co-Founder/CEO at ⚡️ @Wirespeed_ Prev: @NetSPI, @CYDERES, @FishtechGroup, @SCYTHE Advisor, @Walmart Red Team, @Sp4rkCon, @Optiv, @fishnetsecurity. Hacking everything from mainframes to apps to AI.
Chad Seaman
Principal Security Researcher & Team Lead @ Akamai SIRT. Fingerprinting tricky attacks, attributing botnets, acquiring thousands of underground samples of malicious software (c2's, bots, malware source, etc.) and reversing some of them. Discovered vulnerabilities in mDNS and IKEv2. He has produced many advisories, assisted international law enforcement in taking down botnets and baddies, as well as international speaker.
Andrew Case
Research Director @ Volexity, co-developed the NIJ-funded Registry Decoder forensics application and is a core developer of The Volatility Framework. He has published peer-reviewed papers and presented at conferences worldwide.
Moses Frost
Author, Instructor SANS SEC588, Currently Palo Alto Networks. Formerly Cisco, Neuvik and GRIMM Red Team Operations. Still a maker of finely made, handcrafted, artisanal, bespoke exploits. Consultant, Researcher.
int eighty
int eighty (he/him) is a computer crime enthusiast, and the rapper in Dual Core.
Occasional memes and hacking content on BlueSky/Mastodon/GitHub as @int0x80.
Photo @wafflesweekly
Marina Ciavatta
Marina is a friendly little girl from Brazil who breaks and enters for a living. A Social Engineer specialized in physical pentesting, she has stolen, spied and sabotaged some of the largest companies in her country - and global companies as well. All legal and ethical, of course, as a physical pentest should be. She has worked with the hacking and security communities for almost 10 years, as an events organizer, community manager and content creator, understanding how to better communicate and navigate the culture and needs of hackers, no matter what hat color they consider themselves to have. Marina is now CEO of her own company, Hekate Inc, providing cyber security awareness campaigns, and connecting tech and security companies with people from all backgrounds. You may have already met her in conferences around the globe as a speaker, attendee or enjoying a Dual Core from the backstage.
Andy Lewis
Despite his misguided childhood and checkered past, Andy Lewis has become a contributing member of society. A former US Marine, Andy led the cyber team at Dish & several other organizations before his journey to The Dark Side of pre-sales engineering. He founded the Denver and Boulder OWASP chapters and co-founded the SnowFROC regional Appsec conference and is currently a Solutions Architect and honeybee wrangler for ReversingLabs, working daily to reduce Software Supply Chain risks to his Customers.
Chris Williams
Chris is part of the HackNWA crew with a fascinating background. He grew up in New Jersery, he learned to code in assembler at 7yrs old and was writing and optimizing video games for his siblings. Later in life he held multiple director level roles such as Director of Network Operations at Interop Technologies, then CTO of Bernett Research before returning to more hands on keyboard roles before getting into the CTF circuit and writing his own shell code on the fly. Currently in the top 50 rankings on the National Cyber League, he has pwnd many a CTFs and is a top hacker
Jimi Allee
Jimi2x over 25 years in the Information Security industry, Jimi has successfully navigated through many roles within the Infosec landscape, including Network/System/Security Engineering, Threat Intel/Risk Analysis, Offensive Security, Red/Blue/Purple Teaming as well as Research & Development. A former member of the US National Video Game Team, Jimi's passionate curiosity brings a gamer mentality to the world of Threat Research, Detection and Elimination.
Jon Voss
Just a guy stumbling through the mysteries like Detective Columbo. BS in Biotechnology; professional software developer; amateur cryptographer and learner of languages.
Robert Hawes
Lead Security Researcher @ Versprite, Formerly Obscillum, Dataflow Sec, Exodus Intelligence. Vulnerability researcher with a few TrendMicro Zero Day Initiative published exploits (ZDI-18-468, ZDI-18-1063) and CVE-2019-13208 LPE. Fuzzing all the things, producing RCA's and advisories on Zero-Days or N-Days and the occasional blog post.
Mike Debreceni
1337 Hacker
Charles Fair
Info coming soon
Shannon Franklin
Shannon is part of the HackNWA crew and the creator of our ASMb1337 coding challenges. He was trained in the ways of the low level for his first career, coding OSD overlays and remote control systems in the Arkansas Delta when companies such as Sanyo and others were manufacturing TVs and electronics in state. He continues hardware hacking and the low level experience by coding video games, demo scenes and other interesting things for the 6502.
VILLAGES & EXHIBITS
In order to achieve our hands on keyboard objectives for this event we will be providing a variety of villages and exhibits for people to get in on the action.
ASMb1337
Assembly coding village with a focus on 6502
architecture. Participants will have access to
custom 6507 Atari game code, reference materials
and developer SD card cartridges for testing and
playing said games on Atari.
Some of the concepts that will be
conveyed:
Basic ASM coding concepts
Level data arrangement in 6507 ASM
Byte Manipulation techniques
Music synthesis in the Atari graphics chips
Porting your to C64 emulator to continue at
home
In addition, most people will not receive a full
assmbled PCB badge. Instead you will receive a
pack and can wear the unpopulated badge right
away but we are sure you will want to enable
power and activate blinky. Solder stations and
adeptus mechanicus to assist you will be
available to achieve this. We will also show off
some low level embedded hardware probing and
other exhibits.
CONFERENCE SCHEDULE