• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • HITB2022SIN
  • HITB2021SIN
  • HITB2019GSec
  • HITB2018GSec
  • HITB2017GSec
  • HITB2016GSec
Edition logo

Hack In The Box - GSec HITB2016GSec

2016-08-25 - 2016-08-26
  • Thumbnail for the video - click to play

    ►

    I Fight For The Users! The Prequel
    - Erin Jacobs
  • Thumbnail for the video - click to play

    ►

    Stumping The Mobile Chipset: Taxonomy Of New 0-Day Exploits For Android
    - Adam Donenfeld
  • Video will not be published
    Understanding Your Opponent: Attack Profiling
    - Moonbeom Park and Yongjun Park
  • Thumbnail for the video - click to play

    ►

    Attacking Nvidia's Tegra Platform: Hacking Your Smart Phones, Tablets And Cars
    - Peter Pi
  • Thumbnail for the video - click to play

    ►

    Data Driven Software Security
    - Sweety Chauhan
  • Thumbnail for the video - click to play

    ►

    Attacking Software Tokens
    - Bernhard Mueller
  • Thumbnail for the video - click to play

    ►

    Halycon – An IDE For Faster Nmap Scripting Engine Development
    - Sanoop Thomas
  • Thumbnail for the video - click to play

    ►

    The Apple Sandbox: Deeper Into The Quagmire
    - Jonathan Levin
  • Thumbnail for the video - click to play

    ►

    Reverse Engineering Swift Applications
    - Michael Gianarakis
  • Video will not be published
    Fuzzer Development For Mere Mortals
    - Mohammed A. Imran
  • Thumbnail for the video - click to play

    ►

    Keystone: A Next Generation Assembler Framework
    - Nguyen Anh Quynh
  • Thumbnail for the video - click to play

    ►

    Trust No One ATMs And Their Dirty Little Secrets
    - Olga Kochetova and Alexey Osipov
  • Thumbnail for the video - click to play

    ►

    Hacking The Pentagon: Bounty Creation Lessons From The Bug Bounty Bene Gesserit Reverend Mother
    - Katie Moussouris
  • Thumbnail for the video - click to play

    ►

    Fuzzing The Windows Kernel
    - Koh Yong Chuan
  • Thumbnail for the video - click to play

    ►

    (Ab)Using Smart Cities: The Dark Age Of Modern Mobility
    - Matteo Beccaro and Matteo Collura
  • Thumbnail for the video - click to play

    ►

    Copy-Paste Vulnerabilities
    - Vanessa Henderson
  • Thumbnail for the video - click to play

    ►

    Cofi Break: Breaking Exploits With Practical Control Flow Integrity
    - Shlomi Oberman Ron Shina
  • Thumbnail for the video - click to play

    ►

    Forensic Analysis And Assessment Of Android Banking Apps
    - Rajchada Chanajitt
  • Thumbnail for the video - click to play

    ►

    Fake President Fraud Defrauded
    - Florian Lukavsky
  • Thumbnail for the video - click to play

    ►

    iOS 10 Kernel Heap Revisited
    - Stefan Esser
  • Thumbnail for the video - click to play

    ►

    Vulnerabilities And Ethics: A Code Of Ethics For The Private Sector
    - Alfonso De Gregorio
  • Thumbnail for the video - click to play

    ►

    IoT Honeypots
    - Tan Kean Siong
  • Thumbnail for the video - click to play

    ►

    Look Mom! I Don't Use Shellcode: A Browser Exploitation Case Study For Internet Explorer 11
    - Moritz Jodeit
  • Thumbnail for the video - click to play

    ►

    Local Privilege Escalation In 2016
    - Paul Craig
  • Thumbnail for the video - click to play

    ►

    Hacking In Song: Cautionary Musical Stories From The Command Line
    - Fabienne Serriere
  • Video will not be published
    CTF Prize Giving / Closing Note
    - HitB Crew