• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • HITB2023AMS
  • HITB2021AMS
  • HITB2019AMS
  • HITB2018AMS
  • HITB2017AMS
  • HITB2016AMS
Edition logo

Hack In The Box - Amsterdam HITB2021AMS

2021-05-27 - 2021-05-28
  • Thumbnail for the video - click to play

    ►

    Surveillance Is Not The Answer; What Is The Question?
    - Jon Callas
  • Thumbnail for the video - click to play

    ►

    HITB Studio - Jon Callas
    - Dhillon,Sreeman and Jon Callas
  • Thumbnail for the video - click to play

    ►

    JOP ROCKET: Bypassing DEP With Jump-Oriented Programming
    - Bramwell Brizendine and Austin Babcock
  • Thumbnail for the video - click to play

    ►

    Exploiting QSEE, The Raelize Way!
    - Cristofaro Mune and Niek Timmers
  • Thumbnail for the video - click to play

    ►

    HITB Studio - Cristofaro Mune and Niek Timmers
    - Dhillon,Sreeman,Cristofaro Mune and Niek Timmers
  • Thumbnail for the video - click to play

    ►

    HITB Studio - Bramwell Brizendine and Austin Babcock
    - Dhillon,Sreeman,Bramwell Brizendine and Austin Babcock
  • Thumbnail for the video - click to play

    ►

    Client-Side Attacks On Live-Streaming Services Using Grid Computing
    - Seungmin Yoon,Suhwan Myeong,Sunhong Hwang,TaiSic Yun and Taiho Kim
  • Thumbnail for the video - click to play

    ►

    X-In-The-Middle: Attacking Fast Charging Electric Vehicles
    - Wu HuiYu and YuXiang Li
  • Thumbnail for the video - click to play

    ►

    POSWorld. Should You Be Afraid Of Hands-On Payment Devices?
    - Timur Yunusov and Aleksei Stennikov
  • Thumbnail for the video - click to play

    ►

    WoW Hell: Rebuilding Heavens Gate
    - ShengHao Ma
  • Thumbnail for the video - click to play

    ►

    HITB Studio - Crowdfense: Andrea Zapparoli Manzoni
    - Dhillon,Sreeman and Andrea Zapparoli Manzoni
  • Thumbnail for the video - click to play

    ►

    MacOS Local Security: Escaping The Sandbox And Bypassing TCC
    - Thijs Alkemade and Daan Keuper
  • Thumbnail for the video - click to play

    ►

    When Qiling Framework Meets Symbolic Execution
    - Kaijern Lau,Kong ZiQiao and Wu ChenXu
  • Thumbnail for the video - click to play

    ►

    HITB Studio - Edwin van Andel
    - Dhillon,Sreeman and Edwin van Andel
  • Thumbnail for the video - click to play

    ►

    HITB Studio - XWings
    - Dhillon,Sreeman and XWings
  • Thumbnail for the video - click to play

    ►

    Utilizing Lol-Drivers In Post Exploitation Tradecraft
    - Bariş Akkaya
  • Thumbnail for the video - click to play

    ►

    A Journey Into Synology NAS
    - Q C
  • Thumbnail for the video - click to play

    ►

    HITB Studio - itrainsec: Eco Carrera and Sergey Lozhkin
    - Dhillon,Sreeman,Eco Carrera and Sergey Lozhkin
  • Thumbnail for the video - click to play

    ►

    Shaping The Future Of The 0Day Market
    - Andrea Zapparoli Manzoni
  • Thumbnail for the video - click to play

    ►

    The History Of Adversarial AI
    - Alex Polyakov and Eugene Neelou
  • Thumbnail for the video - click to play

    ►

    Model Robustness Will Hurt Data Privacy?
    - Jiqiang Gao and Mengyun Tang
  • Thumbnail for the video - click to play

    ►

    Red Team Exercises For IoT Security
    - Mars Cheng
  • Thumbnail for the video - click to play

    ►

    One Stop Anomaly Shop
    - Andrei Cotaie and Tiberiu Boros
  • Thumbnail for the video - click to play

    ►

    Exploitation With Shell Reverse And Infection With PowerShell
    - Filipi Pires
  • Thumbnail for the video - click to play

    ►

    The State Of Mobile Security
    - Zuk Avraham
  • Thumbnail for the video - click to play

    ►

    Mind The Bridge: A New Attack Model For Hybird Mobile Applications
    - Ce Qin
  • Thumbnail for the video - click to play

    ►

    Hack Out Of The Box: Discovering 10+ Vulnerabilities In VirtualBox
    - Chen Nan
  • Thumbnail for the video - click to play

    ►

    The Rise Of Potatoes: Privilege Escalation In Windows Services - Andrea Pierini and Antonio Cocomazzi
    -
  • Thumbnail for the video - click to play

    ►

    A QEMU Black Box Escape Via USB Device
    - Lingni Kong,Yanyu Zhang and Haipeng Qu
  • Thumbnail for the video - click to play

    ►

    Attacking Cloud Native Kubernetes With CDK
    - Zebin Zhou and Yue Xu
  • Thumbnail for the video - click to play

    ►

    HITB Studio - Panasonic: Sean Cheng and Cory Tseng
    - Dhillon,Sreeman,Sean Cheng and Cory Tseng
  • Thumbnail for the video - click to play

    ►

    HITB Studio - Yes We Hack: Kevin Gallerin
    - Dhillon,Sreeman and Kevin Gallerin
  • Thumbnail for the video - click to play

    ►

    The Phishermen: Dissecting Phishing Techniques Of CloudDragon APT
    - Linda Kuo and Zih-Cing Liao
  • Thumbnail for the video - click to play

    ►

    Lightbranch: Binary Fuzzing With Snapshot-Assisted-Driven Comparison Branches Analysis
    - Kijong Son
  • Thumbnail for the video - click to play

    ►

    How I Found 16 Microsoft Office Excel Vulnerabilities In 6 Months
    - Quan Jin
  • Thumbnail for the video - click to play

    ►

    Insecure Link: Security Analysis And Practical Attacks Of LPWAN
    - YuXiang Li and Wu HuiYu
  • Thumbnail for the video - click to play

    ►

    HITB Studio - Closing Note: Dhillon Kannabhiran
    - Dhillon Kannabhiran
  • Thumbnail for the video - click to play

    ►

    5G Networks And Interconnect Threats
    - Martin Kacer
  • Video will not be published
    Semi-Automatic Code Deobfuscation
    - Tim Blazytko
  • Thumbnail for the video - click to play

    ►

    Breaking Siemens SIMATIC S7 PLC Protection Mechanism
    - Gao Jian
  • Thumbnail for the video - click to play

    ►

    AWS GuardDuty: Post-DNS Era Covert Channel For C&C And Data Exfiltration
    - Sze Siong Teo
  • Thumbnail for the video - click to play

    ►

    JARM Randomizer: Evading JARM Fingerprinting
    - Dagmawi Mulugeta