HITB Singapore 2022 Aug. 22, 2022 to Aug. 26, 2022, Singapore, Singapore

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
WELCOME COFFEE N/a N/A
KEYNOTE 1: A RANDOM WALK THROUGH A FEW MILLION THINGS Chris Rouland At Phosphorus Cybersecurity, we have examined millions of IoT and OT devices in the Enterprise. ...
ATTACKING WPA3: NEW VULNERABILITIES AND EXPLOIT FRAMEWORK Mathy Vanhoef In this presentation, we perform an audit of WPA3’s new features. We focus on Management ...
E’RYBODY GETTIN’ TIPC: DEMYSTIFYING REMOTE LINUX KERNEL EXPLOITATION Sam Page 2022 has been one hell of a year for Linux exploitation, with several high profile ...
LUNCH N/a N/A
SETTLERS OF NETLINK: EXPLOITING A LIMITED UAF ON UBUNTU 22.04 TO ACHIEVE LPE Aaron Adams Recently my team discovered a Linux kernel vulnerability affecting the netlink subsystem. The bug can ...
EDR EVASION PRIMER FOR RED TEAMERS Jorge Nohl EDRs are everywhere, but relatively little is known about how the tools work and how ...
COFFEE BREAK N/a N/A
ONE-CLICK TO COMPLETELY TAKEOVER A MACOS DEVICE Mickey Jin Since Apple released its own powerful M-series chips, Mac products have become more and more ...
BREAKING WEB3: EXPLOITATION TECHNIQUES FOR CRYPTOCURRENCY HACKING David Pethes In my previous presentations I have spoken about bridge vulnerabilities and how to exploit them ...
KEYNOTE 2: ADVENTURES IN SECURITY RESEARCH Runa a. Sandvik A personal talk about my 12-year relationship with defensive security work and other random stories. ...
UNLOCKING KEELOQ: A REVERSE ENGINEERING STORY Rogan Dawes KeeLoq Remote Keyless Entry systems make use of radio frequency transmissions to operate and have ...
SCRIPTS-BEHAVIORAL ML CLASSIFICATION USING WINDOWS 10 AMSI-INSTRUMENTATION Ankit Garg As browser and operating system security have been improving, there has been a decline in ...
SUBORNER: WINDOWS BRIBERY FOR INVISIBLE PERSISTENCE Sebastián Castro Whenever an attacker is trying to persist the access on a compromised machine, the first ...
BROWSER HACKING WITH ANGLE Jeonghoon Shin This presentation gives the basic knowledge of the ANGLE project and examines how to use ...
THE RANSOMWARE PROTECTION FULL OF HOLES Soya Aoyama In the fall of 2017, in response to the WannaCry outbreak, Microsoft implemented Ransomware Protection ...
IMPORT LIBRARY, IMPORT LIABILITY: ANALYZING INFORMATION COLLECTION OF THIRD-PARTY SDKS Dr Kailong Wang 17:30 Track Main Track User data protection regulations in most countries and regions have clear ...
CLOSING NOTE & CTF PRIZE GIVING N/a N/A
HITB POST CONFERENCE DRINKS N/a N/A