• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • HITB2023AMS
  • HITB2021AMS
  • HITB2019AMS
  • HITB2018AMS
  • HITB2017AMS
  • HITB2016AMS
Edition logo

Hack In The Box - Amsterdam HITB2023AMS

2023-04-20 - 2023-04-21
  • Thumbnail for the video - click to play

    ►

    The Myths Of Software Security
    - Mark Curphey
  • Thumbnail for the video - click to play

    ►

    Welcome Note
    - Matteo Beccaro
  • Thumbnail for the video - click to play

    ►

    Poisoned Apples: Current State Of IOS Malware Detection
    - Matthias Frielingsdorf
  • Thumbnail for the video - click to play

    ►

    XRP Raid Protector: Killing A Critical Bug Worth 40 Billion Dollars
    - Haoyu Yang
  • Thumbnail for the video - click to play

    ►

    API Security In The Age Of Microservices
    - Ali Abdollahi
  • Thumbnail for the video - click to play

    ►

    Upgrading Rollback Agnostic Replay Attacks
    - Carlos Gomez
  • Thumbnail for the video - click to play

    ►

    Nakatomi Space: Lateral Movement As L1 Post-Exploitation In OT
    - Jos Wetzels
  • Thumbnail for the video - click to play

    ►

    Windows Syscalls In Shellcode: Advanced Techniques For Malicious Functionality
    - Bramwell Brizendine
  • Thumbnail for the video - click to play

    ►

    All You Always Wanted To Know About AntiViruses
    - Marcus Botacin
  • Thumbnail for the video - click to play

    ►

    Your Not So “Home” Office: SOHO Hacking At Pwn2Own
    - Alex Plaskett And McCaulay Hudson
  • Thumbnail for the video - click to play

    ►

    The Next Generation Of Virtualization-based Obfuscators
    - Tim Blazytko and Moritz Schloegel
  • Thumbnail for the video - click to play

    ►

    Exploring JARM – An Active TLS Fingerprinting Algorithm
    - Mohamad Mokbel
  • Thumbnail for the video - click to play

    ►

    The Lost World Of DirectComposition: Hunting Windows Desktop Window Manager Bugs
    - Zhang WangJunjie,YiSheng He and Wenyue Li
  • Thumbnail for the video - click to play

    ►

    3 Years In China: A Tale Of Building A REAL Full Speed Anti-Censorship Router
    - KaiJern 'xwings' Lau
  • Thumbnail for the video - click to play

    ►

    Nomadic Honeypots: How To Create Actionable CTI
    - Laurent Oudot
  • Thumbnail for the video - click to play

    ►

    Resurrecting Zombies – Leveraging Advanced Techniques Of DMA Reentrancy To Escape QEMU
    - Ao Wang and Quan Jin
  • Thumbnail for the video - click to play

    ►

    Bypassing Anti-Cheats And Hacking Competitive Games
    - Rohan Aggarwal
  • Thumbnail for the video - click to play

    ►

    PANEL: The Evolution Of Learning: What Cyber Security Training Looks Like In 2023
    - Matteo Beccaro
  • Thumbnail for the video - click to play

    ►

    PANEL DISCUSSION: IOS / OS X Security
    - Tarjei Mandt,Nikias Bassen,David Wang and Joshua Hill And Dhillon 'L33tdawg' Kannabhiran
  • Thumbnail for the video - click to play

    ►

    How MySQL Servers Can Attack YOU
    - Alexander Rubin and Martin Rakhmanov
  • Thumbnail for the video - click to play

    ►

    Automated Black-box Security Testing Of “Smart” Embedded Devices
    - Andrea Continella
  • Thumbnail for the video - click to play

    ►

    Red Wizard – A User-friendly Infrastructure For Red Teams
    - Ben Brucker
  • Thumbnail for the video - click to play

    ►

    ChatGPT: Please Write Me A Piece Of Polymorphic Malware
    - Eran Shimony and Omer Tsarfati
  • Thumbnail for the video - click to play

    ►

    Exploiting Inter-Process Communication With New Desynchronization Primitives
    - Martin Doyhenard
  • Thumbnail for the video - click to play

    ►

    Feeding Gophers To Ghidra
    - Max Kersten
  • Thumbnail for the video - click to play

    ►

    Smart Speaker Shenanigans: Making The SONOS One Sing Its Secrets
    - Peter Geissler
  • Thumbnail for the video - click to play

    ►

    Active Directory Abuse Primitives And Operation Security
    - Mars Cheng and Dexter Chen
  • Video will not be published
    LAB: Developing Malicious Kernel Drivers
    - Tijme Gommers and Jan-Jaap Korpershoek
  • Thumbnail for the video - click to play

    ►

    Compromising Garmin’s Sport Watches: A Deep Dive Into GarminOS And Its MonkeyC Virtual Machine
    - Tao Sauvage
  • Thumbnail for the video - click to play

    ►

    Privilege Escalation Using DOP In MacOS X86-64
    - Yoochan Lee,Jeongsu Choi,Junoh Lee and Sangjun Song
  • Thumbnail for the video - click to play

    ►

    A Security Analysis Of Computer Numerical Control Machines In Industry 4.0
    - Marco Balduzzi
  • Thumbnail for the video - click to play

    ►

    Investigating Web3 With OSINT
    - Dhia Mahjoub
  • Thumbnail for the video - click to play

    ►

    Kubernetes Security Detection Engineering: Mapping Back To MITRE ATT&CK Matrix
    - Madhu Akula
  • Thumbnail for the video - click to play

    ►

    The Return Of Stack Overflows In The Linux Kernel
    - Davide Ornaghi
  • Thumbnail for the video - click to play

    ►

    The Hand That Strikes, Also Blocks
    - Saumil Shah
  • Thumbnail for the video - click to play

    ►

    Closing Ceremony
    - Dhillon 'L33tdawg' Kannabhiran