• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • HITB2022SIN
  • HITB2021SIN
  • HITB2019GSec
  • HITB2018GSec
  • HITB2017GSec
  • HITB2016GSec
Edition logo

Hack In The Box - GSec HITB2017GSec

2017-08-24 - 2017-08-25
  • Thumbnail for the video - click to play

    ►

    IoT - A Security Hole Without A Patch
    - Earl Carter
  • Thumbnail for the video - click to play

    ►

    Finding Vulnerabilities And Malware In Open-Source Code At Scale
    - Mark Curphey
  • Video will not be published
    A Deep Dive Into The Digital Weapons Of The North Korean Cyber Army
    - Ashley Shen and Moonbeom Park
  • Thumbnail for the video - click to play

    ►

    Hadoop Safari: Hunting For Vulnerabilities
    - Thomas Debize and Mahdi Braik
  • Thumbnail for the video - click to play

    ►

    Spy Vs. Spy: A Modern Study Of Microphone Bugs
    - Veronica Valeros and Sebastian Garcia
  • Thumbnail for the video - click to play

    ►

    Insecurity In 2017: 0-Days Are The Least Of Our Problems
    - Nick Biasini
  • Thumbnail for the video - click to play

    ►

    A Year In The Red
    - Dominic Chell and Vincent Yiu
  • Thumbnail for the video - click to play

    ►

    Autosec: Automotive Security Assessment Techniques And Tools From A Pentester's Perspective
    - Keisuke Hirata
  • Thumbnail for the video - click to play

    ►

    Pwnrensics: How To Execute Code On A Forensic Workstation
    - Florian Lukavsky and Wolfgang Ettlinger
  • Thumbnail for the video - click to play

    ►

    Get To The Money: Hacking PoS And PoP Systems
    - Dmitry Chastuhin and Vladimir Egorov
  • Thumbnail for the video - click to play

    ►

    Hacking Robots Before Skynet
    - Lucas Apa and Cesar Cerrudo
  • Thumbnail for the video - click to play

    ►

    Mythbusters: CVE-2017-5689 How We Broke Intel Amt
    - Alexander Ermolov,Dmitriy Evdokimov and Maksim Malyutin
  • Thumbnail for the video - click to play

    ►

    Threat Hunting 101: Become The Hunter
    - Hamza Beghal
  • Thumbnail for the video - click to play

    ►

    A New Era Of SSRF - Exploiting Url Parsers In Trending Programming Languages
    - Orange Tsai
  • Thumbnail for the video - click to play

    ►

    The Original Elevat0r History Of A Private Jailbreak
    - Stefan Esser
  • Thumbnail for the video - click to play

    ►

    Smart City / Smart Nation Panel Discussion
    - Mark Curphey,Cesar Cerrudo,Eddie Schwartz and Matteo Beccaro
  • Thumbnail for the video - click to play

    ►

    The State Of Cyber: How Stealthier Attacks Are Blurring The Lines Between Cybercrime And Statecraft
    - George Kurtz
  • Thumbnail for the video - click to play

    ►

    Searching For A Needle In A Remote Haystack
    - Vitaly Kamluk and Wayne Lee
  • Thumbnail for the video - click to play

    ►

    XFLTReaT: A New Dimension In Tunnelling
    - Balazs Bucsay
  • Thumbnail for the video - click to play

    ►

    It's Friday Evening Professor Moriarty
    - Nicolas Collery
  • Thumbnail for the video - click to play

    ►

    Applying Intelligence And Counterintelligence Techniques To Cyber Network Operations
    - Joseph Hesse and Kamal Ranjan
  • Thumbnail for the video - click to play

    ►

    Ro(o)tten Apples: Vulnerability Heaven In The iOS Sandbox
    - Adam Donenfeld
  • Thumbnail for the video - click to play

    ►

    Facebook: The Deep & Dark Web For Threat Actors In Asia
    - Fadli B. Sidek
  • Thumbnail for the video - click to play

    ►

    Neuralfuzz: Neural Networks For Fuzzing Web Apps
    - Ivan Novikov
  • Thumbnail for the video - click to play

    ►

    2FAssassin: Bypass 2FA, Stealing Private Keys, And More
    - Maxwell Koh
  • Thumbnail for the video - click to play

    ►

    Stealing PLC Intellectual Property: A Red Teaming Story
    - Matteo Beccaro
  • Thumbnail for the video - click to play

    ►

    QEMU Attack Surface And Security Internals
    - Qiang Li and ZhiBin Hu
  • Thumbnail for the video - click to play

    ►

    Unstructured Data Is The New Gold: ML + NLP Is The New Shiz!
    - Jim Geovedi
  • Thumbnail for the video - click to play

    ►

    Security Crowdsourcing: Growing Network Security Specialists For The Enterprise
    - Xinhua Cai
  • Thumbnail for the video - click to play

    ►

    Radio Exploitation 101: Characterizing, Contextualizing, And Applying Wireless Attack Methods
    - Matt Knight and Marc Newlin
  • Thumbnail for the video - click to play

    ►

    A Case Study Of 200+ Vulnerabilities In Android Phones
    - Bai Guangdong and Zhang Qing
  • Thumbnail for the video - click to play

    ►

    A Spin Around The Block: 13 Years Of Infosec Challenges
    - Kelly Lum