• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • HITB2023PKT
Edition logo

Hack In The Box - Phuket HITB2023PKT

2023-08-24 - 2023-08-25
  • Thumbnail for the video - click to play

    ►

    Welcome to HITB Phuket
    - Ilyas Sung
  • Thumbnail for the video - click to play

    ►

    Welcome Address
    - AVM Amorn Chomchoey
  • Thumbnail for the video - click to play

    ►

    The Upside Of Falling Down: Embracing Failure To Be A Better Hacker (and Human)
    - Joe Grand
  • Thumbnail for the video - click to play

    ►

    Exploiting The Lexmark PostScript Stack
    - Aaron Adams
  • Thumbnail for the video - click to play

    ►

    gVisor: Modern Linux Sandboxing Technology
    - Li Qiang
  • Thumbnail for the video - click to play

    ►

    Bugs In Blocks
    - Karsten Nohl
  • Thumbnail for the video - click to play

    ►

    It Was Harder To Sniff Bluetooth Through My Mask During The Pandemic
    - Xeno Kovah
  • Thumbnail for the video - click to play

    ►

    How To Design Your Own Electronic Attack Device
    - Shupeng Gao
  • Thumbnail for the video - click to play

    ►

    Shining A Light On Solar System Cyber Security
    - Sick Codes
  • Thumbnail for the video - click to play

    ►

    ALPChecker: Detecting Spoofing And Blinding Attacks
    - Anastasiia Kropova & Igor Korkin
  • Thumbnail for the video - click to play

    ►

    FrankeNAND: Extracting Info From Automotive Internet Units
    - Alexey Kondikov & Yuriy Serdyuk
  • Thumbnail for the video - click to play

    ►

    Lazarus Group’s Undercover Operations: Large-Scale Infection Campaigns 2022–2023
    - Lee Taewoo and Seulgi Lee & Dongwook Kim
  • Thumbnail for the video - click to play

    ►

    Bring Your Own SOAR: Automated Incident Response
    - Valentine Mairet & Harjeet Sharma
  • Thumbnail for the video - click to play

    ►

    Cracking The Shield: Analyzing And Reverse Engineering Antivirus Signatures
    - Dobin Rutishauser
  • Thumbnail for the video - click to play

    ►

    Rogue CDB: Escaping From VMware Workstation Through The Disk Controller
    - Wenxu Yin
  • Thumbnail for the video - click to play

    ►

    Hakuin: Injecting Brains Into Blind SQL Injection
    - Jakub Pruzinec & Quynh Anh Nguyen
  • Thumbnail for the video - click to play

    ►

    How NTLM Relay Ruins Your Exchange Servers
    - Tianze Ding
  • Video will not be published
    Say What You Want: Building A Full-Speed Anti-Censorship Router
    - KaiJern @xwings Lau
  • Thumbnail for the video - click to play

    ►

    Hardware Backdooring An EScooter
    - Arun Mane
  • Thumbnail for the video - click to play

    ►

    An Ode To Rabbit Holes: Writing A New Decompiler Just For A Security Audit
    - Dominic Couture
  • Thumbnail for the video - click to play

    ►

    Timekiller: Leveraging Asynchronous Clock To Escape From QEMU/KVM
    - Yongkang Jia,Xiao Lei,Yiming Tao and Gaoning Pan & Chunming Wu
  • Thumbnail for the video - click to play

    ►

    Big Match: How I Learned To Stop Reversing And Love The Strings
    - Paolo Montesel
  • Thumbnail for the video - click to play

    ►

    KeyBleed: Attacking The OneKey Mini
    - Eric Michaud
  • Thumbnail for the video - click to play

    ►

    Breaking ML Services: Finding 0-days In Azure Machine Learning
    - Nitesh Surana
  • Thumbnail for the video - click to play

    ►

    The Tragedy Of Bluetooth Low Energy
    - Linfeng Xiao & Dalin Yang
  • Thumbnail for the video - click to play

    ►

    B(l)utter – Reversing Flutter Applications By Using Dart Runtime
    - Worawit Wangwarunyoo
  • Thumbnail for the video - click to play

    ►

    Locate Vulnerabilities Of Ethereum Smart Contracts With Semi-Automated Analysis
    - Boik Su
  • Thumbnail for the video - click to play

    ►

    TSSHOCK: Breaking MPC Wallets And Digital Custodians
    - Huu Giap Nguyen & Anh Khoa Nguyen
  • Thumbnail for the video - click to play

    ►

    A Practical Method Of Finding Vulnerabilities In Internet Of Things
    - IeckChae Euom
  • Thumbnail for the video - click to play

    ►

    Hacking Into IOS’s VOLTE Implementation
    - Rajanish Pathak & Hardik Mehta
  • Thumbnail for the video - click to play

    ►

    GPTHound: Your Active Directory Security Assistant
    - John Jiang
  • Thumbnail for the video - click to play

    ►

    Build Your Own Drone Attacking Device Drone Attacking Device
    - Kelvin Wong
  • Thumbnail for the video - click to play

    ►

    Scarlet OT: OT Adversary Emulation For Fun And Profit
    - Sol Yang & Vic Huang
  • Thumbnail for the video - click to play

    ►

    Take A Picture Of Your App Code: Android MRI Interpreter
    - SungHyoun Song
  • Thumbnail for the video - click to play

    ►

    Hunting For Amazon Cognito Security Misconfigurations
    - Yassine Aboukir
  • Thumbnail for the video - click to play

    ►

    NVMe: New Vulnerabilities Made Easy
    - Tal Lossos
  • Thumbnail for the video - click to play

    ►

    The Future Of Hacking: Unleashing The Power Of OpenAI’s GPT-4 Code Interpreter
    - Dexter Ng
  • Thumbnail for the video - click to play

    ►

    Windows Kernel Security: A Deep Dive Into Two Exploits Demonstrated At Pwn2Own
    - Thomas Imbert
  • Thumbnail for the video - click to play

    ►

    From Unknown Parameter To Root: A Story Of Unexpected Intrusion Testing Results
    - Yvan Genuer
  • Thumbnail for the video - click to play

    ►

    Tracing The Intrusion: Unveiling The Covert Trails Of Infostealer Malware Ecosystems
    - Pavan Karthick M
  • Video will not be published
    Aerospace Cybersecurity: Ask Me Anything
    - Hugo Teso
  • Thumbnail for the video - click to play

    ►

    Systems Alchemy: The Transmutation Of Hacking
    - The Grugq