Hack In The Box Security Conference – HITB Lockdown 002

HITB-Lockdown002 - Hackers Interview

The HITBSecConf is conducted to shed light on security issues, technologies, and solutions. Security has become a real concern in this Internet era. For any organization, security is of prime importance. With the advancement in the use of the Internet, the need for cyber security has increased significantly. In HITBSecConf, hardcore technical talks are delivered by the experienced names of the computer security industry. This conference will compel you to think about ways to overcome security-related issues such as cyber-attacks, unethical hacks, etc. Are you interested in knowing the key concepts behind cyber security? Here is a golden opportunity for you!





HITB Lockdown 002
Event link : https://conference.hitb.org/hitb-lockdown002/
Visit the above-mentioned link to know about HITBSecConf. This is an annual must-attend event for all curious and interested researchers and professionals globally. Here, you will get an opportunity to get ideas on upcoming security challenges and solutions. This two-day conference is just a few days away, starting on the 25th of July at 10 AM sharp and will end on the 26th of July by 10 PM SGT (Singapore Time). Grab as much knowledge as you can. You will get to know about the next generation of computer security issues. HITBSecConf is a platform where ideas are exchanged between some of the greatest minds, held annually in Kuala Lumpur, Malaysia, and Amsterdam in The Netherlands.

Cutting edge technical training activities are organized in this 2-day conference. Have a look at the activities below!
● HITB Lockdown Livestream
● HITB Virtual Labs
● HITB Discord Channel
● Lockdown Live Stream Q and A
● Car Hacking Village
● Xenith Labs crypto Challenge
● HITB CMD+CTRL Challenge




Details Of What You Will Get To Know In This Conference
● 10 AM – 11 AM | Keynote 1: Hardware Security Is Hard: How Hardware Boundaries Define Platform Security

25 July | Track 1 | Alex Matrosov

● 11 AM – 12 PM | The Dojo Of Blue: How Adversary Emulator Can Enhance Blue Team Performance
25 July | Track 1 | Shang-De Jiang

● 12 PM – 1 PM | Breakout Script Of The Westworld
25 July | Track 1 | Tianwen Tang & Wei Xiao
Virtual Labs

● 2 PM – 6 PM | Virtual Lab – Signal Processing With GNURadio And SDRs
25 JULY | Virtual Lab | Ateet Kumar

● 12 PM – 2 PM | Virtual Lab – Hardware Hacking
25 July | Virtual Lab | The Blenster & The Hat

● 2 PM – 3 PM | Virtual Lab – Car Hacking
25 July | Virtual Lab | Alina, Edmund, Peisi, Chun Yong

Break

● 2 PM – 3 PM | The Secret Codes Tell the Secrets
25 July | Track 1 | Zhang Qing & Bai Guangdong

● 2 PM – 3 PM | Exploring And Exploiting The SQLite: Finding More Bugs By Targeted Fuzzing
25 July | Track 2 | Wenxiang Qian

● 3 PM – 4 PM | A Journey Into the Secret Flaws of In-DRAM RowHammer Mitigations
25 July | Track 1 | Emanuele Vannacci & Pietro Frigo

● 3 PM – 4 PM | Kernel Hijacking Is Not An Option: MemoryRanger Comes To The Rescue
Again
25 July | Track 2 | Igor Korkin

● 4 PM – 5 PM | Zen: A Complex Campaign Of Harmful Android Apps
25 July | Track 1 | Łukasz Siewierski

● 4 PM – 5 PM | How To Hack Medical Imaging Applications Via DICOM
25 July | Track 2 | Maria Nedyak

● 5 PM – 6 PM | FIDLing With Decompilers
25 July | Track 1 | Carlos Garcia Prado & Ryan Warns

● 5 PM – 6 PM | Runtime Memory Analysis Tool For Mobile Applications
25 July | Track 2 | Igor Lyrchikov & Egor Saltykov

Break

● 7 PM – 8 PM | Operation SemiChimera – APT Operation Targets Semiconductor Vendors
25 July | Track 2 | Bletchley Chen, Inndy Lin & SHANG-DE Jiang

● 8 PM – 9 PM | A DECEPTICON and AUTOBOT Walk Into A Bar: Python For An Enhanced OPSEC
25 July | Track 2 | Joe Gray

● 9 PM – 10 PM | Serverless Security: Attack & Defense
25 July | Track 2 | Pawel Rzepa

● 10 PM – 11 PM | From Authors of COMPFun: HTTP Statuses As C2 Commands And Compromised TLS
25 July | Track 2 | Denis Legezo

Day 1 Ends



● 10 AM – 11 AM | Keynote 2: Are We Far Enough To The Left Yet? DevSecOps, Chaos Security, And Not Being Left Behind
26 July | Track 1 | Eddie Schwartz

● 11 AM – 12 PM | Public And Private, Common Flaws In ICS Network Protocols

26 July | Track 1 | Mars Cheng & Selmon Yang

● 12 PM – 1 PM | When Clouds Attack – Red Teaming At Scale
26 July | Track 1 | Adam Russell



Virtual Labs


● 2 PM – 6 PM | Virtual Lab – Qiling Framework: Learn How To Build A Fuzzer Based On A 1-day Bug
26 July | Virtual Lab | Lau KaiJern, Sun Bo Wen, Yu Tong, Ding Tian Zhe

● 12 PM – 2 PM | Virtual Lab – Hardware Hacking
25 July | Virtual Lab | The Blenster & The Hat

● 2 PM – 3 PM | Virtual Lab – Car Hacking
25 July | Virtual Lab | Alina, Edmund, Peisi, Chun Yong

Break

● 2 PM – 3 PM | Exploring Deficiencies In The State-Of-The-Art Automatic Software Vulnerability Mining Technologies
26 July | Track 1 | Wish Wu

● 2 PM – 3 PM | Swapping Asprin Formulae With MDMA While Red Teaming A Billion-Dollar Company
26 July | Track 2 | Himanshu Sharma & Aman Sachdev

● 3 PM – 4 PM | The Weakest Element Of Acquiring Bank Infrastructure
26 July | Track 1 | Ilia Bulatov & Gleb Cherbov

● 3 PM – 4 PM | A Review Of The Modern Code De-Obfuscation Techniques
26 July | Track 2 | Arnau Gamez Montolio

● 4 PM – 5 PM | SAP RCE: The Agent Who Spoke Too Much
26 July | Track 1 | Yvan Genuer

● 4 PM – 5 PM | Hacking The DevOps Butler: From Nothing To Admin
26 July | Track 2 | Nimrod Stoler

● 5 PM – 6 PM | .NET Core: Threats and Reversing
26 July | Track 1 | Alexandre Borges

● 5 PM – 6 PM | PayDay: Jackpotting Fortune-500 treasuries
26 July | Track 2 | Martin Doyhenard & Gaston Traberg

Break

● 7 PM – 8 PM | The Fragile Art Of Edge Computing: Walk Through Access Control Systems
26 July | Track 2 | Philippe Lin, Roel Reyes, Joey Costoya, Vincenzo Ciancaglini & Morton Swimmer

● 8 PM – 9 PM | Quark Engine – An Obfuscation-Neglect Android Malware Scoring System
26 July | Track 2 | JunWei Song, KunYu Chen, IokJin Sih, AnWei Kung & Chung Hsin Chen

● 9 PM – 10 PM | PEsidious – Create Mutated Evasive Malware Using Artificial Intelligence
26 July | Track 2 | Chandni Vaya & Bedang Sen

● 10 PM – 10:10 PM | Closing Note
26 July | Track 2 | Dhillon ‘l33tdawg’ Kannabhiran

Day 2 Ends



The Speakers
Some of the globally-prominent computer science security specialists are keynote speakers of this conference. Security enthusiasts cannot miss out on this opportunity.

Alex Matrosov, Chief Offensive Security Researcher, NVIDIA, having more than two decades of experience in reverse engineering, advanced malware analysis, firmware security, and exploitation technique, will be the key speaker.

● Eddie Schwartz, Chief Security Officer, Block.One will be the key speaker of this conference. He has been in many chief positions such as Chief Operating Officer for WhiteOps, CTO of ManTech International, Global Leader of Cyber Security Solution at Verizon, and many more prominent positions.



Other Speakers
The other speakers of this grand conference are Maria Nedyak, KunYu Chen, Łukasz Siewierski, Roel Reyes, Carlos Garcia Prado, Pietro Frigo, Aman Sachdev, Wish Wu, Wenxiang Qian, Selmon Yang, Emanuele Vannacci, Chandni Vaya, Egor Saltykov, Igor Lyrchikov, Arnau Gamez Montolio, Igor Korkin, Nimrod Stoler, Bedang Sen, Olaf Hartong, SHANG-DE-Jiang, Inndy Lin, Chung Hsin Chen, Lokjin Sih, Yvan GENUER, Pawel Rzepa, AnWei Kung, Martin Doyhenard, Adam Russell, Joe Gray, Bai Guangdong, Mars Cheng, Philippe Lin, Himanshu Sharma, Gaston Traberg, Zhang Qing, JunWei Song, Bletchley Chen, Ryan Warns, Tianwen Tang, Denis Legezo, Wei Xiao, and Alexandre Borges.



What You Will Gain
The opportunity to get to listen to some of the greatest minds is in itself the biggest achievement. You can use the knowledge and acquaintances from the conference to develop new professional relationships. A cyber security enthusiast will get a chance to know the future requirements of the industry. The golden opportunity you are seeking lies here.

A limited number of seats are available, Register now!
Click on this link to register: https://conference.hitb.org/hitbsecconf2020sin/register/
Take time out to attend the HITBSecConf on 25th and 26th July 2020.



Author: Hackers Interview

Spreading the Voice of Hackers.

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe Us