• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • HITB2022SIN
  • HITB2021SIN
  • HITB2019GSec
  • HITB2018GSec
  • HITB2017GSec
  • HITB2016GSec
Edition logo

Hack In The Box - GSec HITB2018GSec

2018-08-30 - 2018-08-31
  • Thumbnail for the video - click to play

    ►

    (In)Security Is Eating The World
    - Michael Coates
  • Thumbnail for the video - click to play

    ►

    A Year Of Purple
    - Ryan Shepherd
  • Thumbnail for the video - click to play

    ►

    Welcome Address
    - Andrea Zapparoli Manzoni
  • Thumbnail for the video - click to play

    ►

    KLara: Your New Friend
    - Dan Demeter
  • Thumbnail for the video - click to play

    ►

    From Assembly To Javascript And Back: Turning Memory Errors Into Code Execution With Client-Side Compilers
    - Robert Gawlik
  • Thumbnail for the video - click to play

    ►

    Demystifying The Definitions Of The Surface, Deep And Dark Web
    - Fadli Bin Sidek
  • Thumbnail for the video - click to play

    ►

    Brain Surgery: Breaking Full Disk Encryption
    - Nicolas Collery and Vitaly Kamluk
  • Thumbnail for the video - click to play

    ►

    God Mode Unlocked: Hardware Backdoors In X86 Cpus
    - Christopher Domas
  • Thumbnail for the video - click to play

    ►

    RedPhishing: Wi-Fi, Phishing And Red Teaming
    - Matteo Beccaro
  • Thumbnail for the video - click to play

    ►

    Generic And Static Detection Of Mobile Malware Using Machine Learning
    - Minh Tran
  • Thumbnail for the video - click to play

    ►

    Ghost In The Locks: Owning Electronic Locks Without Leaving A Trace
    - Tomi Tuominen and Timo Hirvonen
  • Thumbnail for the video - click to play

    ►

    Securing ICS/SCADA: Defense In Depth
    - Mike Rebultan
  • Thumbnail for the video - click to play

    ►

    The Trails Of WINDSHIFT APT
    - Taha Karim
  • Thumbnail for the video - click to play

    ►

    File Structures: Another Binary Exploitation Technique
    - An-Jie Yang (Angelboy)
  • Thumbnail for the video - click to play

    ►

    SayaKenaHack: Breach Notification In Malaysia
    - Keith Rozario
  • Thumbnail for the video - click to play

    ►

    Exploiting Automation In LTE Mobile Networks
    - Ravishankar Borgaonkar and Altaf Shaik
  • Thumbnail for the video - click to play

    ►

    Surprise Rant 2.0
    - Joernchen
  • Thumbnail for the video - click to play

    ►

    Is The Pen Mightier Than The Sword? A First Look Into The Security Of The Apple Pencil And The Apple Smartkeyboard
    - Stefan Esser
  • Thumbnail for the video - click to play

    ►

    Zero Seconds To Midnight: The 0-day Market
    - Matteo Beccaro,Cristofaro Mune,Nicolas Collery,Andrea Zapparoli Manzoni and Sam Goh
  • Thumbnail for the video - click to play

    ►

    Lucky Draw
    - Cherry
  • Thumbnail for the video - click to play

    ►

    OK Computer: Machine Learning In Cybersecurity
    - Alexander Polyakov
  • Thumbnail for the video - click to play

    ►

    Deep Hooks: Monitoring Native Execution In WoW64 Applications
    - Yarden Shafir and Assaf Carlsbad
  • Thumbnail for the video - click to play

    ►

    Bicycle Day: Hacking BLE Bicycle Locks For Fun And (A Small) Profit
    - Vincent Tan
  • Thumbnail for the video - click to play

    ►

    Data-Centric Cyber Threat Impact Analyser For IoT And Manufacturing
    - Simon Eng and Lim Eng Woei
  • Thumbnail for the video - click to play

    ►

    Viewer Discretion Advised: (De)Coding An iOS Vulnerability
    - Adam Donenfeld
  • Thumbnail for the video - click to play

    ►

    Cognitive Automation With Machine Learning In Cybersecurity
    - Rishi Kant
  • Thumbnail for the video - click to play

    ►

    Internet Of Things: Battle Of The Bots
    - Rommel D. Joven
  • Thumbnail for the video - click to play

    ►

    The Road To iOS Sandbox Escape
    - Rani Idan
  • Thumbnail for the video - click to play

    ►

    Using Machine Learning To Identify Security Issues In Open-Source Libraries
    - Asankhaya Sharma
  • Thumbnail for the video - click to play

    ►

    Learning How To Smurf With Honeypots
    - Emil Tan
  • Thumbnail for the video - click to play

    ►

    NFC Payments: The Art Of Relay And Replay Attacks
    - Salvador Mendoza
  • Thumbnail for the video - click to play

    ►

    Software Security Era: Past, Present, And Back To The Future
    - Nafiez and Jaan Yeh
  • Thumbnail for the video - click to play

    ►

    Blockchain And Smart Contract Attack Vectors
    - Jordan Seet
  • Thumbnail for the video - click to play

    ►

    Traversing The Kill-Chain: The New Shiny In 2018
    - Vincent Yiu
  • Thumbnail for the video - click to play

    ►

    Hacking Mobile Games: Closing The Gap Between "Ikan Bilis" And "Whales"
    - Nicholas Lim
  • Thumbnail for the video - click to play

    ►

    Closing Remarks
    - Andrea Zapparoli Manzoni
  • Thumbnail for the video - click to play

    ►

    Rethinking The Cyber Kill Chain
    - Alexis Lavi
  • Thumbnail for the video - click to play

    ►

    Lock Note
    - Philippe Viola
  • Thumbnail for the video - click to play

    ►

    Closing Note
    - HITB Crew