HITCON 2020
  • 議程
  • 活動
  • 教育訓練
  • 贊助
  • 會場地圖
  • 地點
  • 須知
  • 行為準則
  • 工作人員
  • 購票

9/11

直播連結:
R0 R0(口譯) R1 R1(口譯) R2 R2(口譯) R3 R3(口譯)
08:00 - 09:10
09:10 - 09:20
09:20 - 10:00
10:00 - 10:50
10:50 - 11:00
11:00 - 11:50
11:50 - 13:00
13:00 - 13:50
13:50 - 14:00
14:00 - 14:50
14:50 - 15:30
15:30 - 16:20
16:20 - 16:30
16:30 - 17:20
17:20 - 17:30
Track 01
國際會議廳 R0
Track 02
第一會議廳 R1
Track 03
第二會議廳 R2
Track 04
遠距會議室 R3
Track 05
交誼廳 R4
報到時間

報到時間

嘉賓致詞

嘉賓致詞

總召致詞 & Opening

總召致詞 & Opening

Industrial Cybersecurity Landscape in 2020: Trends, Challenges, and Opportunities

Industrial Cybersecurity Landscape in 2020: Trends, Challenges, and Opportunities

劉榮太

Break

Break

[ HITCON 論壇 ] 金融業如何迎擊數位戰場的第一道烽火
Panel

[ HITCON 論壇 ] 金融業如何迎擊數位戰場的第一道烽火

翁浩正 蔡福隆 處長 郭建中 董事長 蘇清偉 資安長 劉培文 執行副總經理

通訊網路安全研究,從 GSM 到 5G NR
企業Communication Security

通訊網路安全研究,從 GSM 到 5G NR

劉作仁 楊承穎

練蠱大賽

練蠱大賽

陳立中

A Million Boluses: Discovery and Disclosure of Vulnerabilities in an Insulin Pump
Critical Infra

A Million Boluses: Discovery and Disclosure of Vulnerabilities in an Insulin Pump

Julian Suleder

IoT Hacking 101

IoT Hacking 101

Jimmy Liu

Lunch

Lunch

[ HITCON 論壇 ] 主動式資安防禦策略,解決 OT 資安相依性風險
Panel

[ HITCON 論壇 ] 主動式資安防禦策略,解決 OT 資安相依性風險

毛敬豪 所長 劉榮太 執行長 鄭嘉信 執行長 楊瑞祥 技術長 王仁甫 總監

APT Chimera - Operation targets Semiconductor Vendors
企業APTBlackHat

APT Chimera - Operation targets Semiconductor Vendors

陳仲寬 Inndy Lin JohnThunder

人力徵才

人力徵才

Bug Bounty Competition

Bug Bounty Competition

IoT Hacking 101

IoT Hacking 101

Jimmy Liu

Break

Break

[ HITCON 論壇 ] 如何兼顧疫情控制與隱私保護
Panel

[ HITCON 論壇 ] 如何兼顧疫情控制與隱私保護

李柏鋒 OCF 簡宏偉 處長 龐一鳴 處長 劉宇倫 醫師 Sherry Chung MyData Taiwan

Discover vulnerabilities with CodeQL

Discover vulnerabilities with CodeQL

Boik Su

網軍內網滲透之奇技淫巧 (Operation: I am Tom)
企業APTOn-site Only

網軍內網滲透之奇技淫巧 (Operation: I am Tom)

zha0 Tom Aragorn

Bug Bounty Competition

Bug Bounty Competition

TDOH Village

TDOH Village

Coffee Break

Coffee Break

[ HITCON 論壇 ] 疫情後資安人才培育的挑戰與契機
Panel

[ HITCON 論壇 ] 疫情後資安人才培育的挑戰與契機

Alan Lee 黃俊穎 博士 Tzong-Chen Wu Seungjoo Kim Kana Shinoda Yan Shoshitaishvili

Reversing In Wonderland: Neural Network Based Malware Detection Techniques
Malware

Reversing In Wonderland: Neural Network Based Malware Detection Techniques

Sheng-Hao Ma Shin-Ming Cheng

Tropic Trooper’s Back: USBferry Attack Targets Air-gapped Environments
企業APTOn-site Only

Tropic Trooper’s Back: USBferry Attack Targets Air-gapped Environments

Joey Chen

Last orders at the House of Force
CTFExploit

Last orders at the House of Force

Kevin Backhouse

5G Village Session

5G Village Session

Break

Break

[ HITCON 論壇 ] 人工智慧能否為人類指引網路攻防的基石?
Panel

[ HITCON 論壇 ] 人工智慧能否為人類指引網路攻防的基石?

陳仲寬 邱銘彰 陳品諭 博士 張嘉哲 技術發展總監

A CTF-Style Escape Journey on VMware Workstation
CTFExploit

A CTF-Style Escape Journey on VMware Workstation

Yanyu Zhang

5G Village Session

5G Village Session

Closing

Closing

9/12

直播連結:
R0 R0(口譯) R1 R1(口譯) R2 R2(口譯) R3 R3(口譯)
08:30 - 09:00
09:00 - 09:10
09:10 - 09:20
09:20 - 10:10
10:10 - 10:20
10:20 - 11:10
11:10 - 11:20
11:20 - 12:10
12:10 - 13:10
13:10 - 13:40
13:40 - 13:50
13:50 - 14:40
14:40 - 14:50
14:50 - 15:40
15:40 - 16:20
16:20 - 17:10
17:10 - 18:10
Track 01
國際會議廳 R0
Track 02
第一會議廳 R1
Track 03
第二會議廳 R2
Track 04
遠距會議室 R3
Track 05
交誼廳 R4
報到時間

報到時間

Opening

Opening

Break

Break

Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot
BlackHatExploit

Breaking Samsung's Root of Trust: Exploiting Samsung S10 Secure Boot

Cheng-Yu Chao

從近期 DDoS 巨量攻擊解析 IoT/DVR 侵駭手法與因應之道
企業On-site Only

從近期 DDoS 巨量攻擊解析 IoT/DVR 侵駭手法與因應之道

邱品仁 蔡振華 李樸

晶片卡 Agent 逆向工程與重製:以健保卡為例
On-site Only

晶片卡 Agent 逆向工程與重製:以健保卡為例

Inndy Lin

Bug hunting from zero to 0(day) to ($)0

Bug hunting from zero to 0(day) to ($)0

Anthony Lai Byron Wai Ken Wong

CTI Village

CTI Village

Break

Break

From LNK to RCE: Finding bugs in Windows Shell Link Parser
微軟百大資安研究員

From LNK to RCE: Finding bugs in Windows Shell Link Parser

Lays

Head First CVE
企業

Head First CVE

Ken Lee

Potential Security and Privacy Issues in Novel Taiwanese National eID system

Potential Security and Privacy Issues in Novel Taiwanese National eID system

何明洋

First step in the quest for manufacturing cyber-resilient IoT devices
企業

First step in the quest for manufacturing cyber-resilient IoT devices

Jun Sato 張智翔

CTI Village

CTI Village

Break

Break

RE: 從零開始的 OOO DEF CON CTF & DEFCON 28 準備與競賽分享

RE: 從零開始的 OOO DEF CON CTF & DEFCON 28 準備與競賽分享

ddaa yuawn

你的資安策略夠明確嗎?透過框架優先緩解真實威脅
企業

你的資安策略夠明確嗎?透過框架優先緩解真實威脅

翁浩正 鍾澤華

LEAYA: Last Exploitation 絢 - An Embedded System Detection and Response
APTExploit

LEAYA: Last Exploitation 絢 - An Embedded System Detection and Response

cp zet freetsubasa

Exploit (Almost) All Xiaomi Routers Using Logical Bugs
Exploit

Exploit (Almost) All Xiaomi Routers Using Logical Bugs

Aobo Wang Jihong Zheng

CTI Village

CTI Village

Lunch

Lunch

協會時間

協會時間

Break

Break

Development of Signaling Spoofing Attacks Using Function Containerization of Rogue Base Stations
企業Communication Security

Development of Signaling Spoofing Attacks Using Function Containerization of Rogue Base Stations

Shin-Ming Cheng Bing-Kai Hong

My journey on SMBGhost
On-site Only

My journey on SMBGhost

Angelboy

Guarding the Factory Floor: Catching Insecure Industrial Robot Programs
Critical Infra

Guarding the Factory Floor: Catching Insecure Industrial Robot Programs

Federico Maggi Davide Quarta Marcello Pogliani Stefano Zanero Marco Balduzzi

CTI Village

CTI Village

Break

Break

How I Hacked Facebook Again!
🍊"><svg/onload=alert(1)>

How I Hacked Facebook Again!

Orange Tsai

-

-

Bug Bounty X Router X IP Cam X 電子支付

Bug Bounty X Router X IP Cam X 電子支付

The Great Hotel Hack: Adventures in attacking hospitality industry

The Great Hotel Hack: Adventures in attacking hospitality industry

Etizaz Mohsin

CTI Village

CTI Village

Coffee Break

Coffee Break

Post-Quantum Cryptography

Post-Quantum Cryptography

Daniel J. Bernstein Tanja Lange

Lightning Talk / 閉幕 / 花絮與展望 HITCON 2021

Lightning Talk / 閉幕 / 花絮與展望 HITCON 2021

My journey on SMBGhost
On-site Only
Download Slide
議程摘要 Abstract

Server Message Block(SMB) 是 Windows 中常見共享檔案的協定,基本上只要安裝完 Windows 就會在 445 port 開啟這樣的協定,在 2017 時,被報出 Eternal Blue 的漏洞,NSA 也曾經開發過該漏洞的 Exploit,該漏洞爆發後,更造成當年 WannaCry 迅速傳播,轟動一時, 而在三年之後的今天,繼 Eternal Blue 後, Windows SMB 再度被爆出 Pre-auth 的 Remote Code Execution 的漏洞 SMBGhost,只要你剛裝完 Windows 一連上網,攻擊者就有機會拿到你電腦的控制權,本議程將分析並介紹 CVE-2020-0796 SMBGhost 的漏洞成因,及其當時從分析漏洞到寫出漏洞利用並達成 Remote Code Execution 的過程,並帶給大家不同的漏洞利用思路

Slido
Angelboy

Angelboy is a member of chroot, DEVCORE and HITCON CTF team. He is researching about binary exploitation, especially in heap related exploitation. He participated in a lot of CTF, such as HITB、DEFCON、Boston key party, won 2nd in DEFCON CTF 25,27 and won 1st in Boston key party 2016, 2017 with HTICON CTF Team. He is also a speaker at conferences such as HITCON, VXCON, AVTokyo, HITB GSEC.