• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • Lockdown Livestream 002
  • Lockdown Livestream 001
Edition logo

Hack In The Box - Lockdown Livestream Lockdown Livestream 002

2020-07-25 - 2020-07-26
  • Thumbnail for the video - click to play

    ►

    Hardware Security Is Hard: How Hardware Boundaries Define Platform Security
    - Alex Matrosov
  • Thumbnail for the video - click to play

    ►

    The Dojo Of Blue: How Adversary Emulator Can Enhance Blue Team Performance
    - SHANG-DE Jiang
  • Thumbnail for the video - click to play

    ►

    Breakout Script Of The Westworld
    - Tianwen Tang and Wei Xiao
  • Thumbnail for the video - click to play

    ►

    SIGNAL Processing With GNURadio And SDRs
    - Ateet Kumar
  • Thumbnail for the video - click to play

    ►

    The Secret Codes Tell The Secrets
    - Zhang Qing and Bai Guangdong
  • Thumbnail for the video - click to play

    ►

    Exploring And Exploiting The SQLite: How We Find More Bugs By Targeted Fuzzing
    - Wenxiang Qian
  • Thumbnail for the video - click to play

    ►

    Virtual Lab: Car Hacking Day 1
    - Alina,Edmund,Tan Pei Si and Chun Yong
  • Thumbnail for the video - click to play

    ►

    Qiling Framework: Learn How To Build A Fuzzer Based On A 1-Day Bug
    - Lau Kai Jern,Ding Tian Zhe,Yu Tong and Sun Bo Wen
  • Thumbnail for the video - click to play

    ►

    A Journey Into The Secret Flaws Of In-DRAM RowHammer Mitigations
    - Emanuele Vannacci and Pietro Frigo
  • Thumbnail for the video - click to play

    ►

    Kernel Hijacking Is Not An Option: MemoryRanger To The Rescue
    - Igor Korkin
  • Thumbnail for the video - click to play

    ►

    Zen: A Complex Campaign Of Harmful Android Apps
    - Ɓukasz Siewierski
  • Thumbnail for the video - click to play

    ►

    How To Hack Medical Imaging Applications Via DICOM
    - Maria Nedyak
  • Thumbnail for the video - click to play

    ►

    FIDLing With Decompilers
    - Carlos Garcia Prado and Ryan Warns
  • Thumbnail for the video - click to play

    ►

    Runtime Memory Analysis Tool For Mobile Applications
    - Igor Lyrchikov & Egor Saltykov
  • Thumbnail for the video - click to play

    ►

    Operation SemiChimera: APT Operation Targets Semiconductor Vendors
    - Bletchley Chen and Inndy Lin & SHANG-DE Jiang
  • Thumbnail for the video - click to play

    ►

    A DECEPTICON And AUTOBOT Walk Into A Bar: Python For Enhanced OPSEC
    - Joe Gray
  • Thumbnail for the video - click to play

    ►

    AWS Lambda Security: Attack & Defense
    - Pawel Rzepa
  • Thumbnail for the video - click to play

    ►

    From Authors Of COMPFun: HTTP Statuses As C2 Commands And Compromised TLS
    - Denis Legezo
  • Thumbnail for the video - click to play

    ►

    Are We Far-Enough To The Left Yet? DevSecOps, Chaos Security, And Not Being Left Behind
    - Eddie Schwartz
  • Thumbnail for the video - click to play

    ►

    Public And Private, Common Flaws In ICS Network Protocols
    - Mars Cheng and Selmon Yang
  • Thumbnail for the video - click to play

    ►

    Exploring Deficiencies In The State-Of-The-Art Automatic Software Vulnerability Mining Technologies
    - Wish Wu
  • Video will not be published
    Swapping Asprin Formulas With MDMA While Red Teaming A Billion Dollar Company
    - Himanshu Sharma and Aman Sachdev
  • Thumbnail for the video - click to play

    ►

    Virtual Lab: Car Hacking Day 2
    - Alina,Edmund,Tan Pei Si and Chun Yong
  • Thumbnail for the video - click to play

    ►

    Qiling Framework: Learn How To Build A Fuzzer Based On A 1-Day Bug
    - Lau Kai Jern,Ding Tian Zhe,Yu Tong and Sun Bo Wen
  • Thumbnail for the video - click to play

    ►

    Clandestine Hunter: Two Strategies For Supply Chain Attacks
    - Byeongjae Kim and Taewoo Lee
  • Thumbnail for the video - click to play

    ►

    A Review Of Modern Code Deobfuscation Techniques
    - Arnau Gamez Montolio
  • Thumbnail for the video - click to play

    ►

    SAP RCE : The Agent Who Spoke Too Much
    - Yvan Genuer
  • Thumbnail for the video - click to play

    ►

    Hacking The DevOps Butler: From Nothing To Admin
    - Nimrod Stoler
  • Thumbnail for the video - click to play

    ►

    The Weakest Element Of Acquiring Bank Infrastructure
    - Ilia Bulatov and Gleb Cherbov
  • Thumbnail for the video - click to play

    ►

    PayDay: Jackpotting Fortune-500 Treasuries
    - Martin Doyhenard and Gaston Traberg
  • Thumbnail for the video - click to play

    ►

    The Fragile Art Of Edge Computing: Walk Through Access Control Systems
    - Philippe Lin and Roel Reyes
  • Thumbnail for the video - click to play

    ►

    Quark Engine - An Obfuscation-Neglect Android Malware Scoring System
    - JunWei Song,KunYu Chen,IokJin Sih,AnWei Kung and Chung Hsin Chen
  • Thumbnail for the video - click to play

    ►

    PEsidious - Create Mutated Evasive Malware Using Artificial Intelligence
    - Chandni Vaya and Bedang Sen
  • Video will not be published
    Closing Note
    - Dhillon 'L33tdawg' Kannabhiran