Agenda
09:00
Attendant Registration Time
10:00
Welcome Speech
10:10
English
Red
Exploit Development
Fuzzing
Advancements in JavaScript Engine Fuzzing
Carl Smith
11:00
Break
11:20
Mandarin
🍊
Red
Exploit Development
A 3-Year Tale of Hacking a Pwn2Own Target: The Attacks, Vendor Evolution, and Lesson Learned
Orange Tsai
English
Red
Communication
How to hijack a VoLTE network
Pavel Novikov
Mandarin
Blue
Crypto
打造公平的遊戲轉蛋:在不洩漏原始碼的前提下驗證虛擬轉蛋的機率
Jing Jie Wang, 李安傑
12:00
Lunch
13:00
English
Red
Exploit Development
Ghosts of the Past: Classic PHP RCE Bugs in Trend Micro Enterprise Offerings.
Poh Jia Hao
Mandarin
Red
Communication
Reverse Engineering
Decrypting the Secrets of Network Connectivity Devices through Hardware Attacks
Ta-Lun Yen
Mandarin
Red
Exploit Development
BYOVD
Uncovering Kernel Exploits: Exploring Vulnerabilities in AMD's Windows Kernel Drivers
Zeze
13:40
Break
14:00
Mandarin
Red
Exploit Development
Endpoint Security or End of Security? Exploiting Trend Micro Apex One
Lays, Lynn
English
Red
Electron
ELECTRONizing macOS privacy - a new weapon in your red teaming armory
Wojciech Reguła
Mandarin
Red
Exploit Development
Fuzzing
搭配模糊測試對Linux核心遠端檔案系統進行漏洞挖掘
Pumpkin
Elk on Sesame Street - Cybersecurity Analysis in Action with ELK and BERT
Sheng-Shan Chen, Yuki Hung
14:40
Tea Time
15:10
Mandarin
Red
BYOVD
LPE
現代內核漏洞戰爭 - 越過所有核心防線的系統/晶片虛實混合戰法
馬聖豪
English
Red
Exploit Development
Electron
Virtual
What You See IS NOT What You Get: Pwning Electron-based Markdown Note-taking Apps
Li Jiantao
協會時間
Allen Own, CK
15:50
Break
16:00
Lightning Talk
freetsubasa & Hazel, NoBody
16:30
Closing
17:20
收場
Elk on Sesame Street - Cybersecurity Analysis in Action with ELK and BERT
R3
Site
14:00 ~ 16:00
Sat, Aug 19
Hacking 101
Type

Cyber Threat Intelligence (CTI) encompasses relevant data regarding various cybersecurity incidents on the internet, used to understand threat actors' behavior patterns, attack techniques, tools, etc., to identify potential future threats and safeguard organizational assets proactively. However, the surge of massive intelligence data has led to challenges analyzing cybersecurity incidents. To address this, we will utilize Elastic Stack (ELK) to simulate real-world data collection, analysis, and visualization environments. Furthermore, participants will be guided to develop their own intelligence integration programs to connect with open-source threat intelligence platforms.

Additionally, with the explosive growth of AI, machine learning, and deep learning methods, they are widely used in various information analyses. In this course, we will employ BERT to analyze this intelligence data, enabling rapid comprehension of intelligence contents and formulation of corresponding defense strategies.

The course consists of 6 practical experiments, making it suitable for AI beginners and students interested in accumulating knowledge in cybersecurity topics. Starting from scratch, we will cover the entire research process, including organizing data in ELK, collecting open-source threat intelligence, building a threat intelligence platform, and training deep learning models. Participants must bring their laptops and embark on an exciting journey into AI Security.

Prerequisite

  1. Basic Python
  2. chatGPT。Familiarity with chatGPT
  3. Participants are required to bring their laptops and install VMware Workstation Player or VMware Workstation Pro. It is recommended to have at least 20 GB of available disk space
  4. A Google account is necessary as AI model training will occur on Colab. If participants have a graphics card on their laptops, they can train on their machines

Notice:

  1. For the quality of teaching, Hacking 101 will limit 36 attendees. Please wait in line.
  2. This agenda will not provide simultaneous interpreting.

Agenda language: Mandarin Chinese

Sheng-Shan Chen

Sean S. Chen is a Ph.D. student in the Department of Computer Science and Information Engineering at the National Taipei University of Technology. He also serves as a cybersecurity researcher intern at Cycraft. His primary research focus is on using AI for threat intelligence analysis. Sean has previously achieved a silver medal in the National Skills Competition for Network Security and has received the Best Project Award for two consecutive editions of AIS3.

Yuki Hung

After graduating from university, Yuki worked as a Cybersecurity consultant. Currently, Yuki is pursuing a Master's degree in Information Security at National Tsing Hua University, with a primary research focus on data leaks on the internet. Yuki participated in AIS3 and received the Best Project Award. He also completed an internship involving the study of news manipulation. Motivated by his love for detective novels, Yuki entered the field of cybersecurity, aiming to leverage computer technology to improve the societal environment.

© 2023 HITCON, All Rights Reserved.