• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • HITB2024BKK
Edition logo

Hack In The Box - Bangkok HITB2024BKK

2024-08-29 - 2024-08-30
  • Thumbnail for the video - click to play

    ►

    The Modern CISO: Hacking Management While Defending The Fort
    - Pepijn Kok
  • Thumbnail for the video - click to play

    ►

    Dragon Slaying Guide: Bug Hunting In VMware Device Virtualization
    - JiaQing Huang,Yue Liu,Hao Zheng and Zibo Li
  • Thumbnail for the video - click to play

    ►

    Who’s The Author? How Automated Malware Attribution Engines Work
    - Anton Belousov
  • Thumbnail for the video - click to play

    ►

    Flash Loans: The Blessing Or Curse Of DeFi
    - Kritsada Dechawattana
  • Thumbnail for the video - click to play

    ►

    Silencing Spies: Revealing Microphone Nonlinear Behavior And Building An Ultrasonic Jammer
    - Hetian Shi & Qing Wang
  • Thumbnail for the video - click to play

    ►

    CoralRaider Targets Victims Data And Social Media Accounts
    - Joey Chen & Chetan Raghuprasad
  • Thumbnail for the video - click to play

    ►

    Leaking Kakao: How A Combination Of Bugs In KakaoTalk Compromises User Privacy
    - Dawin Schmidt
  • Thumbnail for the video - click to play

    ►

    Secret Scanning In Open Source At Scale (In-Depth)
    - Danish Tariq & Hassan Khan Yusufzai
  • Thumbnail for the video - click to play

    ►

    Design And Development Of A Multi-Tenant SIEM Using Security Onion
    - Wararit Hongkamnerd,Withawat Tangtrongpairoj,Pirawat Watanapongse and Surasak Sanguanpong
  • Thumbnail for the video - click to play

    ►

    Hunting Trojans With AST Transformers And Machine Learning
    - Stanislav Rakovsky
  • Thumbnail for the video - click to play

    ►

    My First And Last Shellcode Loader
    - Dobin Rutishauser
  • Thumbnail for the video - click to play

    ►

    Leveraging Request Smuggling For Authentication Bypass And Remote Code Execution
    - Adam Crosser
  • Thumbnail for the video - click to play

    ►

    Breaking Fake Voice Detection With Speaker-Irrelative Features
    - Xuan Hai,Xin Liu,Yuan Tan and Song Li
  • Thumbnail for the video - click to play

    ►

    Exploiting The In-Vehicle Browser: A Novel Attack Vector In Autonomous Vehicles
    - Ravi Rajput
  • Thumbnail for the video - click to play

    ►

    Detecting Botnets Via DNS Traffic Analysis Using Machine Learning
    - Withawat Tangtrongpairoj,Pirawat Watanapongse and Surasak Sanguanpong & Korrawit Chaikangwan
  • Thumbnail for the video - click to play

    ►

    Words Have Meaning! Leveraging LLMs To Enhance Insider Threat Investigation Capabilities
    - Keggy The Keg
  • Thumbnail for the video - click to play

    ►

    Discovering And Investigating Propagated Vulnerabilities From Ethereum To Its Layer-2 Blockchains
    - Daoyuan Wu & Ning Liu
  • Thumbnail for the video - click to play

    ►

    TPMs And The Linux Kernel: A Better Path To Hardware Security
    - Ignat Korchagin
  • Thumbnail for the video - click to play

    ►

    One SMS To Root Them All: Exposing Critical Threats In Millions Of Connected Devices
    - Sergey Anufrienko & Alexander Kozlov
  • Thumbnail for the video - click to play

    ►

    Exploring Vulnerabilities In Flutter Mobile Apps Through Reverse Engineering
    - Sabina Llewellyn
  • Thumbnail for the video - click to play

    ►

    BadUSB Attacks On MacOS: Beyond Using The Terminal And Shell Commands
    - Nicolas Buzy Debat
  • Video will not be published
    The Modern Hacker – From Insight To Impact
    - Karsten Nohl
  • Video will not be published
    CTF Prize Giving / Lucky Draw
    - HITB Crew