• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • HITB2023AMS
  • HITB2021AMS
  • HITB2019AMS
  • HITB2018AMS
  • HITB2017AMS
  • HITB2016AMS
Edition logo

Hack In The Box - Amsterdam HITB2016AMS

2016-05-26 - 2016-05-27
  • Thumbnail for the video - click to play

    ►

    Welcome Address
    - Patricia M. Zorko
  • Thumbnail for the video - click to play

    ►

    Beyond FBI Vs Apple: What's Next For The Crypto Wars?
    - John Adams
  • Thumbnail for the video - click to play

    ►

    Virtualization System Vulnerability Discovery Framework
    - Tang Qinghao
  • Thumbnail for the video - click to play

    ►

    Hardsploit Project: An All-In-One Tool For Hardware Security Audits
    - Yann Allain and Julien Moinard
  • Thumbnail for the video - click to play

    ►

    Escape From The Docker-KVM-QEMU Machine
    - Shengping Wang and Xu Liu
  • Thumbnail for the video - click to play

    ►

    CSP Oddities
    - Michele Spagnuolo and Lukas Weichselbaum
  • Thumbnail for the video - click to play

    ►

    Don't Feed The Hippos
    - Martin Knobloch
  • Thumbnail for the video - click to play

    ►

    Exploiting GLIBC: Hacking Everything (CVE-2015-7547)
    - Gal De Leon and Nadav Markus
  • Thumbnail for the video - click to play

    ►

    TeLeScope: Peering Into The Depths Of TLS Traffic In Real-Time
    - Radu Caragea
  • Thumbnail for the video - click to play

    ►

    Kernel Exploit Hunting And Mitigation
    - Broderick Aquilino and Wayne Low
  • Thumbnail for the video - click to play

    ►

    Applying Regulatory Data To IoT/RF Reverse Engineering
    - Marc Newlin
  • Thumbnail for the video - click to play

    ►

    Using The Observer Effect & Cyber Feng Shui
    - Jacob Torrey
  • Thumbnail for the video - click to play

    ►

    Sandjacking: Profiting From iOS Malware
    - Chilik Tamir
  • Thumbnail for the video - click to play

    ►

    Unformation In The Era Of Hyper Connectivity
    - Elisabeth De Leeuw
  • Thumbnail for the video - click to play

    ►

    Exploit Kits: Hunting The Hunters
    - Nick Biasini
  • Thumbnail for the video - click to play

    ►

    Iron-HID: Create Your Own Bad USB Device
    - Seunghun Han
  • Thumbnail for the video - click to play

    ►

    Pentesting Chatops
    - Melanie Rieback
  • Thumbnail for the video - click to play

    ►

    Forcing A Targeted LTE Cellphone Into An Eavesdropping Network
    - Lin Huang
  • Thumbnail for the video - click to play

    ►

    Adaptive Android Kernel Live Patching
    - Tim Xia and Yulong Zhang
  • Thumbnail for the video - click to play

    ►

    The Future Has Arrived And It's Effin' Hilarious!
    - Adam Laurie
  • Thumbnail for the video - click to play

    ►

    Time Is On My Side: Forging A Wireless Time Signal To Attack NTP Servers
    - Yuwei Zheng and Haoqi Shan
  • Thumbnail for the video - click to play

    ►

    Go Speed Tracer: Guided Fuzzing
    - Richard Johnson
  • Thumbnail for the video - click to play

    ►

    Cache Side Channel Attacks: Cpu Design As A Security Problem
    - Anders Fogh
  • Thumbnail for the video - click to play

    ►

    New Methods For Exploiting ORM Injections In Java Applications
    - Mikhail Egorov and Sergey Soldatov
  • Thumbnail for the video - click to play

    ►

    A Series Of Unfortunate Events: Where Malware Meets Murphy
    - Mattijs van Ommeren
  • Thumbnail for the video - click to play

    ►

    Facebook Presents Capture The Flag: A Look At Our New Open-Source Platform
    - Paul Marinescu
  • Thumbnail for the video - click to play

    ►

    In Plain Sight: The Perfect Exfiltration
    - Itzik Kotler and Amit Klein
  • Thumbnail for the video - click to play

    ►

    Perf: From Profiling To Kernel Exploiting
    - Wish Wu
  • Thumbnail for the video - click to play

    ►

    Inspeckage - Android Package Inspector
    - Antonio Martins
  • Thumbnail for the video - click to play

    ►

    Park This - Yet Another Parking Meter Talk
    - Paul Moreno
  • Thumbnail for the video - click to play

    ►

    Attacking Next-Generation Firewalls: Breaking PAN-OS
    - Felix Wilhelm
  • Thumbnail for the video - click to play

    ►

    Advanced Exploitation: Xen Hypervisor VM Escape
    - Shangcong Luan
  • Thumbnail for the video - click to play

    ►

    Anatomy Of An APT Attack
    - Paul Mason
  • Thumbnail for the video - click to play

    ►

    HITC - Hack In The Class
    - Barry 'Fish' van Kampen
  • Thumbnail for the video - click to play

    ►

    Closing Comments
    - Martin Knobloch
  • Thumbnail for the video - click to play

    ►

    CANsee: An Automobile Intrusion Detection System
    - Jun Li
  • Thumbnail for the video - click to play

    ►

    In Stickers We Trust: Breaking Naive ESSID/WPA2 Key Generation Algorithms
    - Peter 'Blasty' Geissler
  • Thumbnail for the video - click to play

    ►

    The Bad Neighbor: Hardware Side Channels In Virtualized Environments
    - Sophia D'Antoine
  • Video will not be published
    Closing Ceremony
    -