-
A Random Walk Through A Few Million Things
- Chris Rouland
-
Attacking WPA3:
New Vulnerabilities And Exploit Framework
- Mathy Vanhoef
-
API Security Through External
Attack Surface Management
- Phillip Wylie
-
Fuzzing The MCU Of Connected
Vehicles For Security And Safety
- Hao Chen
-
E'rybody Gettin' TIPC: Demystifying
Remote Linux Kernel Exploitation
- Sam Page
-
Faking At Level 1:
How Digital Twins Save Your PLCs
- Thomas Weber
-
Building An Army Of Bots By
Hijacking A Unicorn's Twitter Handle
- Rahul Sasi and Vishal Singh
-
Settlers Of Netlink: Exploiting A Limited
UAF On Ubuntu 22.04 To Achieve LPE
- Aaron Adams
-
Template Injection
On Hardened Targets
- Lucas ‘BitK’ Philippe
-
EDR Evasion Primer For Red Teamers
- Karsten Nohl and Jorge Gimenez
-
One-Click To Completely
Takeover A MacOS Device
- Mickey Jin
-
ICEFALL – Revisiting A Decade Of
OT Insecure-By-Design Practices
- Jos Wetzels
-
Breaking Web3: Exploitation Techniques
For Cryptocurrency Hacking
- David Pethes
-
MPT: Pentest In Action
- Jyoti Raval
-
Adventures In Security Research
- Runa Sandvik
-
Unlocking KeeLoq:
A Reverse Engineering Story
- Rogan Dawes
-
Web3 + Scams = It’s A Match!
- Zoltan Balazs
-
Best Practices For Simulating Execution
In Malicious Text Detection
- Shuo Wang and Yi Sun
-
Scripts-behavioral ML Classification
Using Windows 10 AMSI-instrumentation
- Ankit Garg
-
Cracking Kyocera Printers
- Yue Liu and Juyang Gao And Minghang Shen
-
Biometrics System Hacking
In The Age Of The Smart Vehicle
- Kevin Chen
-
Suborner: Windows Bribery
For Invisible Persistence
- Sebastian Castro
-
A Practical Approach To Advanced
Code Obfuscation With MBA Expressions
- Arnau Gàmez I Montolio
-
Browser Hacking With ANGLE
- Jeonghoon Shin
-
The Ransomware Protection
Full Of Holes
- Soya Aoyama
-
Can A Fuzzer Match A Human
- Bhargava Shastry
-
Getting Clear Text Passwords From An IdP & More:
Our Research Methodology
- Gal Diskin
-
Import Library, Import Liability: Analyzing
Information Collection Of Third-party SDKs
- Wang Zeyu,Bai Guangdong and Zhang Qing
-
Exploiting Race Condition Vulnerabilities
In Web Applications
- Javan Rasokat
-
Closing & Prize Giving
- HITB Crew