Pages

2023/07/20

HITCON Community 2023 - 議程宣傳第一彈!

HITCON Community 2023 - 議程宣傳第一彈


「我們收到近五年數量最多、品質最高的稿件,並有相當多漏洞分析及揭露的研究!」

事不宜遲,趕快來看看第一波議程宣傳!如此精彩的技術分享,歡迎各位購票我們現場見🤩
購票連結 👉 https://hitcon.kktix.cc/events/hitcon-cmt-2023
官網連結 👉 https://hitcon.org/2023/CMT/



🚀#1「A 3-Year Tale of Hacking a Pwn2Own Target: The Attacks, Vendor Evolution, and Lesson Learned」
Pwn2Own 是全球白帽駭客相當重要的實務競賽,每年都吸引了全球頂尖的駭客參與,並挖掘實際產品漏洞。在這場議程,講者將分享參與 Pwn2Own 的心路歷程,以及與資安團隊的 cat-and-mouse game。
Smart Home 也為現今重要的資安議題,影響大家日常生活。這場議程也會分享,Smart Speakers 更是 Smart Home 中的核心。這場演講,將會分享講者如何從軟體、韌體及硬體的方向,分析產品底層機制如:DMA and FOTA,並串出攻擊漏洞。

🎙️講師資訊
Orange Tsai, is the principal security researcher of DEVCORE and the core member of CHROOT security group in Taiwan. He is also the champion and the "Master of Pwn" title holder in Pwn2Own 2021/2022. In addition, Orange has spoken at several top conferences such as Black Hat USA/ASIA, DEF CON, HITCON, HITB GSEC/AMS, CODE BLUE, POC, and WooYun!

Currently, Orange is a 0day researcher focusing on web/application security. His research got not only the Pwnie Awards for "Best Server-Side Bug" winner of 2019/2021 but also 1st place in "Top 10 Web Hacking Techniques" of 2017/2018. Orange also enjoys bug bounties in his free time. He is enthusiastic about the RCE bugs and uncovered RCEs in numerous vendors such as Twitter, Facebook, Uber, Apple, GitHub, Amazon, etc.




🚀#2「Playing with Fire: Exploring the Exploitable Side of ZyXEL VPN Firewall」
網路層的資安設備通常是保護企業的第一線,保護內部資產不直接暴露於網際網路。若是這些資安設備存在漏洞,將會造成嚴重的影響,這場演講將分享在 VPN Firewall 上的研究過程和數個嚴重漏洞。
這些漏洞 CVSS 不僅具有高度風險,影響甚至超過十五萬台機器。在發表後就被其他 Botnet 重現並利用,美國 CISA 更因此發布了相關的警告。

🎙️講師資訊
蘇宏麒 (HungChi Su, atdog) 是 TRAPA Security 的共同創辦人和資深研究員,擁有豐富的漏洞研究經驗,曾在 Black Hat USA 分享漏洞研究成果,並在 DEF CON CTF 22, 25 及 27 獲得亞軍與 Pwn2Own Tokyo 2020 季軍的成績。目前也是台灣資安社群 CHROOT 的成員。

Lays 目前是 TRAPA Security 的共同創辦人及資安研究員, 專注於逆向工程及漏洞研究 為 HITCON 及 217 CTF team 的成員, 在 DEF CON CTF 25 及 27 獲得亞軍 也曾獲選 2019 及 2020 微軟 MSRC 的最具價值研究員, 曾經向 Microsoft, Google, Samsung 等廠商回報過漏洞




🚀#3「Ghosts of the Past: Classic PHP RCE Bugs in Trend Micro Enterprise Offerings」
這場議程,講者也會分享他在資安產品上發現超過 10 個漏洞的過程及原理。說明資安產品自身的安全也是相當重要的。講者也會分享「如何將多個不可利用的漏洞轉換,將他們串連成具高度影響的漏洞。」

🎙️講師資訊
Poh Jia Hao is a Security Researcher at STAR Labs SG Pte. Ltd. for the past 2 years, whose focus is mainly on web application security. Jia Hao has multiple CVEs in various applications under his name over the past years. He is always interested in staying up to date about the latest hacking techniques used to challenge the assumptions. Besides performing vulnerability research, Jia Hao also has experience in penetration testing, as well as being Offensive Security-certified OSCP, OSWP and OSWE.


更多細節:https://hitcon.org/2023/CMT/en/agenda/

No comments:

Post a Comment