• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • HITB2023AMS
  • HITB2021AMS
  • HITB2019AMS
  • HITB2018AMS
  • HITB2017AMS
  • HITB2016AMS
Edition logo

Hack In The Box - Amsterdam HITB2018AMS

2018-04-12 - 2018-04-13
  • Thumbnail for the video - click to play

    ►

    Welcome Address
    - Michel van Eeten
  • Thumbnail for the video - click to play

    ►

    The Future, The Past, And... Wait, Where The Hell Are We Now?
    - Marion Marschalek
  • Thumbnail for the video - click to play

    ►

    The Life & Death Of Kernel Object Abuse
    - Saif Elsherei and Ian Kronquist
  • Thumbnail for the video - click to play

    ►

    Sneaky Element: Real World Attacks Against Secure Elements
    - Don Bailey
  • Thumbnail for the video - click to play

    ►

    Smashing Ethereum Smart Contracts For Fun And Actual Profit
    - Bernhard Mueller
  • Thumbnail for the video - click to play

    ►

    Steganography Ante Portas
    - Steffen Wendzel
  • Thumbnail for the video - click to play

    ►

    Brida: When Burp Suite Meets Frida
    - Federico Dotta and Piergiovanni Cipolloni
  • Thumbnail for the video - click to play

    ►

    Attacking Microsoft's .NET Framework Through CLR
    - Yu Hong and Shikang Xing
  • Thumbnail for the video - click to play

    ►

    Privacy And Protection For Criminals: Behaviors And Patterns Of Rogue Hosting Providers
    - Sarah Brown and Dhia Mahjoub
  • Thumbnail for the video - click to play

    ►

    Creating An Isolated Data Center Security Policy Model Using SmartNICs
    - Ofir Arkin
  • Thumbnail for the video - click to play

    ►

    Ghost Tunnel: Covert Data Exfiltration Channel To Circumvent Air Gapping
    - Jun Li,Kunzhe Chai and Hongjian Cao
  • Thumbnail for the video - click to play

    ►

    Invoke-Dosfuscation: Techniques For %f In (-style) Do (S-Level CMD Obfuscation)
    - Daniel Bohannon
  • Thumbnail for the video - click to play

    ►

    Keynterceptor: Press Any Key To Continue
    - Niels van Dijkhuizen
  • Thumbnail for the video - click to play

    ►

    Ticket To Ride: Abusing The Travel And Hospitality Industry For Profit
    - V. Kropotov,F. Yarochkin,M. Fuentes and L. Gu
  • Thumbnail for the video - click to play

    ►

    Hacking Intelligent Buildings: Pwning KNX & Zigbee Networks
    - HuiYu Wu,YuXiang Li and Yong Yang
  • Thumbnail for the video - click to play

    ►

    Digging Deep: How To Find And Exploit Bugs In IoT Devices
    - Kelvin Wong
  • Thumbnail for the video - click to play

    ►

    Faster, Wider, Greater: Modern Pentest Tricks
    - Thomas Debize
  • Thumbnail for the video - click to play

    ►

    Eating The Core Of An Apple: How To Analyze And Find Bugs In MacOS And iOS Kernel Drivers
    - Xiaolong Bai and Min (Spark) Zheng
  • Thumbnail for the video - click to play

    ►

    Mirror Mirror: Rooting Android 8 With A Kernel Space Mirroring Attack
    - Yong Wang and Yang Song
  • Video will not be published
    Practical Quantum Computing For Hackers Without a PhD
    - Yann Allain
  • Thumbnail for the video - click to play

    ►

    Still Breaching Your Perimeter: A Deep Dive Into Malicious Documents
    - Josh Stroschein
  • Thumbnail for the video - click to play

    ►

    Fuzzing Javascript Engines For Fun And Pwnage
    - Areum Lee and Jeonghoon Shin
  • Thumbnail for the video - click to play

    ►

    The Odd One: Applying Machine Learning To User Behavior Anomaly Analysis
    - Eugene Neyolov
  • Thumbnail for the video - click to play

    ►

    The Sound Of A Targeted Attack: Attacking IoT Speakers
    - Stephen Hilt
  • Thumbnail for the video - click to play

    ►

    A Risk Assessment Of Logo Disclosures
    - Jennifer Leggio
  • Thumbnail for the video - click to play

    ►

    Reference This: Sandbox Evasion Using VBA Referencing
    - Aviv Grafi and Amit Dori
  • Thumbnail for the video - click to play

    ►

    Mallet: Towards A Generic Intercepting Proxy
    - Rogan Dawes
  • Thumbnail for the video - click to play

    ►

    Under Cover Of Darkness: Hiding Tasks Via Hardware Task Switching
    - Kyeong Joo Jung
  • Thumbnail for the video - click to play

    ►

    Mind The Gap: Uncovering The Android Patch Gap Through Binary-Only Patch Level Analysis
    - Karsten Nohl and Jakob Lell
  • Thumbnail for the video - click to play

    ►

    Over The Edge: Pwning The Windows Kernel
    - Rancho Han
  • Thumbnail for the video - click to play

    ►

    EasyROP: Automatic Generation Of ROP Chains Using A Turing-Complete Instruction Set
    - Ricardo J. Rodríguez and Daniel Uroz
  • Thumbnail for the video - click to play

    ►

    ProdSec: A Technical Approach
    - Jeremy Brown
  • Thumbnail for the video - click to play

    ►

    PyREBox: Making Dynamic Instrumentation Great Again
    - Xabier Ugarte-Pedrero
  • Thumbnail for the video - click to play

    ►

    In Through The Out Door: Backdooring And Remotely Controlling Cars With The Bicho
    - Sheila Ayelen Berta and Claudio Caracciolo
  • Thumbnail for the video - click to play

    ►

    From Quantitative Change To Qualitative Change: A New Fuzzing Method For Android
    - Zhang Qing and Bai Guangdong
  • Thumbnail for the video - click to play

    ►

    Someone Call A Doctor: Hacking A Hospital For Fun And Profit
    - Asaf Cohen and Ofir Kamil
  • Thumbnail for the video - click to play

    ►

    Call Me Maybe: Establishing Covert Channels By Abusing GSM AT Commands
    - Alfonso Munoz and Jorge Cuadrado Saez
  • Thumbnail for the video - click to play

    ►

    Seems Exploitable: Exposing Hidden Exploitable Behaviors Using Extended Differential Fuzzing
    - Fernando Arnaboldi
  • Thumbnail for the video - click to play

    ►

    Smart Contract (In)Security
    - Ben Schmidt
  • Video will not be published
    Closing Comments
    -
  • Thumbnail for the video - click to play

    ►

    Look Ma, No Win32_Process Needed: Expanding Your WMI Lateral Movement Arsenal
    - Philip Tsukerman
  • Thumbnail for the video - click to play

    ►

    Defense-In-Depth Techniques For Modern Web Applications And Google's Journey With CSP
    - Michele Spagnuolo and Lukas Weichselbaum
  • Thumbnail for the video - click to play

    ►

    Blockchain: Yes, You Can Just Use a Database - Until You Can't
    - Amber Baldet
  • Video will not be published
    Closing Ceremony
    - HitB Crew