• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • HITB2023AMS
  • HITB2021AMS
  • HITB2019AMS
  • HITB2018AMS
  • HITB2017AMS
  • HITB2016AMS
Edition logo

Hack In The Box - Amsterdam HITB2019AMS

2019-05-09 - 2019-05-10
  • Thumbnail for the video - click to play

    ►

    The End Is The Beginning Is The End: Ten Years In The NL Box
    - Dhillon 'L33tdawg' Kannabhiran
  • Thumbnail for the video - click to play

    ►

    Make ARM Shellcode Great Again
    - Saumil Shah
  • Thumbnail for the video - click to play

    ►

    Hourglass Fuzz: A Quick Bug Hunting Method
    - Moony Li,Todd Han,Lance Jiang and Lilang Wu
  • Thumbnail for the video - click to play

    ►

    Wireless Hacking With HackCUBE-Special
    - Jie Fu and Kunzhe Chai
  • Thumbnail for the video - click to play

    ►

    Hacking The 0day Market
    - Andrea Zapparoli Manzoni
  • Thumbnail for the video - click to play

    ►

    Now You See It: TOCTOU Attacks Against Secure Boot And BootGuard
    - Trammell Hudson and Peter Bosch
  • Thumbnail for the video - click to play

    ►

    Hidden Agendas: Bypassing GSMA Recommendations On SS7 Networks
    - Kirill Puzankov
  • Thumbnail for the video - click to play

    ►

    WiCy: Monitoring 802.11AC Networks At Scale
    - Vivek Ramachandran
  • Thumbnail for the video - click to play

    ►

    This Is A Public Service Announcement: Hacking LTE Public Warning Systems
    - Weiguang Li
  • Thumbnail for the video - click to play

    ►

    i.MX Memory Madness: How To Dump, Parse, And Analyze i.MX Flash Memory Chips
    - Damien Cauquil
  • Thumbnail for the video - click to play

    ►

    Mbuf-oflow: Finding Vulnerabilities In iOS/MacOS Networking Code
    - Kevin Backhouse
  • Thumbnail for the video - click to play

    ►

    Fn_fuzzy: Fast Multiple Binary Diffing Triage With IDA
    - Takahiro Haruyama
  • Thumbnail for the video - click to play

    ►

    V1 Bounty: Building An International Coordinated Bug Disclosure Bridge For The European Union
    - Benjamin Kunz
  • Thumbnail for the video - click to play

    ►

    Social Networks: Can We Fix Them?
    - Joel Hernandez
  • Thumbnail for the video - click to play

    ►

    Overcoming Fear: Reversing With Radare2
    - Arnau Gamez Montolio
  • Thumbnail for the video - click to play

    ►

    The Birdman: Hacking Cospas-Sarsat Satellites
    - Hao Jingli
  • Thumbnail for the video - click to play

    ►

    GDALR: Duplicating Black Box Machine Learning Models
    - Rewanth Cool and Nikhil Joshi
  • Thumbnail for the video - click to play

    ►

    Ghost Tunnel 2.0: Blue Ghost
    - Yongtao Wang
  • Thumbnail for the video - click to play

    ►

    Hiding A Secret Distributed Chat System Inside 802.11 Management Frames
    - Yago Hansen
  • Thumbnail for the video - click to play

    ►

    Modern Techniques To Deobfuscate UEFI/BIOS Malware And Virtualized Packers
    - Alexandre Borges
  • Thumbnail for the video - click to play

    ►

    Fresh Apples: Researching New Attack Interfaces On iOS And OSX
    - Lilang Wu and Moony Li
  • Thumbnail for the video - click to play

    ►

    VoLTE Phreaking
    - Ralph Moonen
  • Thumbnail for the video - click to play

    ►

    Infrared: Old Threat Meets New Devices
    - Wang Kang
  • Thumbnail for the video - click to play

    ►

    Attacking GSM - Alarms, Smart Homes, Smart Watches And More
    - Alex Kolchanov
  • Thumbnail for the video - click to play

    ►

    Content Security Policy: A Successful Mess Between Hardening And Mitigation
    - Lukas Weichselbaum and Michele Spagnuolo
  • Thumbnail for the video - click to play

    ►

    For The Win: The Art Of The Windows Kernel Fuzzing
    - Guangming Liu
  • Thumbnail for the video - click to play

    ►

    A Decade Of Infosec Tools
    - Thomas Debize
  • Thumbnail for the video - click to play

    ►

    SeasCoASA: Exploiting A Small Leak In A Great Ship
    - Kaiyi Xu and Lily Tang
  • Thumbnail for the video - click to play

    ►

    H(ack)DMI: Pwning HDMI For Fun And Profit
    - Jeonghoon Shin and Changhyeon Moon
  • Thumbnail for the video - click to play

    ►

    Pwning Centrally-Controlled Smart Homes: It's A Gas
    - Sanghyun Park and Seongjoon Cho
  • Thumbnail for the video - click to play

    ►

    Automated Discovery Of Logical Privilege Escalation Bugs In Windows 10
    - Wenxu Wu and Shi Qin
  • Thumbnail for the video - click to play

    ►

    GSEC Lucky Draw: Win A Trip To Singapore
    - Cherry
  • Thumbnail for the video - click to play

    ►

    Securing Journalists
    - Runa Sandvik
  • Thumbnail for the video - click to play

    ►

    Hey Attacker! I Can See You!
    - Ross Bevington
  • Thumbnail for the video - click to play

    ►

    Compiler Bugs And Bug Compilers
    - Marion Marschalek
  • Thumbnail for the video - click to play

    ►

    Deep Confusables: Improving Unicode Encoding Attacks With Deep Learning
    - Alfonso Muñoz,Miguel H. Boza and José I. Escribano
  • Thumbnail for the video - click to play

    ►

    Rise Of The WarPi
    - Kevin McPeake
  • Thumbnail for the video - click to play

    ►

    Attacking Encrypted VOIP Protocols
    - Ivica Stipovic
  • Thumbnail for the video - click to play

    ►

    Muraena: The Unexpected Phish
    - Michele Orru and Giuseppe Trotta
  • Thumbnail for the video - click to play

    ►

    Reversing Cryptographic Primitives Using Quantum Computing
    - Renaud Lifchitz
  • Thumbnail for the video - click to play

    ►

    PatrOwl - The Red Flavour Of SOC Automation And Orchestration
    - Nicolas Mattiocco
  • Thumbnail for the video - click to play

    ►

    Implementation And Evaluation Of Secure And Scalable Anomaly-Based Network Intrusion Detection
    - Philipp Mieden
  • Thumbnail for the video - click to play

    ►

    Hacking Jenkins
    - Orange Tsai
  • Thumbnail for the video - click to play

    ►

    Binder: The Bridge To Root
    - Hongli Han and Mingjian Zhou
  • Thumbnail for the video - click to play

    ►

    RF Exploitation: Demystifying IoT/OT Hacks With SDR
    - Harshit Agrawal and Himanshu Mehta
  • Thumbnail for the video - click to play

    ►

    Reverse Engineering Custom ASICs By Exploiting Potential Supply-Chain Leaks
    - Thomas Weber
  • Thumbnail for the video - click to play

    ►

    Sneaking Past Device Guard
    - Philip Tsukerman
  • Thumbnail for the video - click to play

    ►

    ModJack: Hijacking The MacOS Kernel
    - Zhi Zhou
  • Thumbnail for the video - click to play

    ►

    I Own Your Building (Management System)
    - Gjoko Krstic
  • Thumbnail for the video - click to play

    ►

    Reversing Mobile Malware
    - Abdullah Joseph
  • Thumbnail for the video - click to play

    ►

    Hey Operator, Where's Your Crane? Attacking Industrial Remote Controllers
    - Marco Balduzzi and Federico Maggi
  • Thumbnail for the video - click to play

    ►

    Panic On The Streets Of Amsterdam: PanicXNU 3.0
    - Juwei Lin and Junzhi Lu
  • Thumbnail for the video - click to play

    ►

    Might As Well JUMP: Exploit Development For Java Serialization
    - Jameel Nabbo
  • Thumbnail for the video - click to play

    ►

    The Beginning Of The End? A Return To The Abyss For A Quick Look
    - Richard Thieme
  • Thumbnail for the video - click to play

    ►

    Closing Ceremony
    - HitB Crew
  • Thumbnail for the video - click to play

    ►

    Locknote
    - Dhillon 'L33tdawg' Kannabhiran