1、#BHAS BlackHatEvents#BHAS BlackHatEvents2#BHAS BlackHatEvents3#BHAS BlackHatEvents火車(Kasha)4#BHAS BlackHatEvents2020-20212019-2021-20225#BHAS BlackHatEvents6#BHAS BlackHatEventsScnCfg32.Exevsodscpl.d。
2、#BHAS BlackHatEventsRemote Exploitation of Nissan Leaf:Remote Exploitation of Nissan Leaf:Controlling Critical Body ElementsControlling Critical Body Elementsfrom the Internetfrom the InternetMikhail。
3、#BHAS BlackHatEventsWATCH YOUR PHONENovel USBNovel USB-Based File Access Attacks Against Mobile DevicesBased File Access Attacks Against Mobile DevicesFlorian Draschbacher&Lukas Maar#BHAS BlackHa。
4、#BHAS BlackHatEventsThe Oversights under The FlowDiscovering and Demystifying the Vulnerable Tooling Suites from Azure MLOpsPeng Zhou()Shanghai University#BHAS BlackHatEventsPeng Zhou(zpbrent)Associa。
5、Unveiling the Mysteries of Hexagon QDSP6 JTAGA Journey into Advanced Theoretical Reverse EngineeringAlisa Esage Zero Day Engineering Research&TrainingBlack Hat Asia 2025,SingaporeAbout meAlisa Es。
6、#BHAS BlackHatEventsInbox Invasion:Exploiting MIME Ambiguities to Evade Email Attachment DetectorsSpeaker:Jiahe ZhangContributors:Jianjun Chen,Qi Wang,Hangyu Zhang,Shengqiang Li,Chuhan Wang,Jianwei Z。
7、#BHAS BlackHatEventsBridging the Gap:Bridging the Gap:Type Confusion and Boundary Vulnerabilities Type Confusion and Boundary Vulnerabilities Between WebAssembly and JavaScript in V8Between WebAssemb。
8、#BHAS BlackHatEventsInvisible InkPrivacy Risks of CSS on the Web and in EmailsLeon Trampert,Daniel WeberInvisible Ink#BHAS BlackHatEventsMotivation2!Invisible Ink#BHAS BlackHatEventsEmail Forward Det。
9、#BHAS BlackHatEventsThe Illusion of Isolation:How Isolation Failures in CI/CD Servers Lead to RCE and Privacy RisksSpeakers:Tian Zhou,YiWen Wang#BHAS BlackHatEventsAbout UsCTFer NeSEWeb Security Rese。
10、Security Analysis of WeChats MMTLS Encryption ProtocolPellaeon Lin,Mona WangThursday,April 3 2025AgendaSecurity Analysis of WeChats MMTLS Encryption ProtocolIntroduction,motivation,methodologiesWeCha。
11、#BHAS BlackHatEventsAI-Powered Image-Based Command and Control(C2)Framework:Utilizing AI Models to Conceal and Extract Commands in C2 ImagesQian Feng,Chris NavarretePalo Alto Networks#BHAS BlackHatEv。
12、#BHAS BlackHatEvents Lidong Li&Kun Dong&Xiao Wang SourceGuard#BHAS BlackHatEvents About Us Lidong LiLidong Li:Source GuardChief Security Officer.Specializing in protocol vulnerability mining 。
13、#BHAS BlackHatEventsEnhancing Modern Threat IntelligenceThe Pivotal Role of Large Language Models in Extracting Actionable TTP Attack ChainsJack Tang,Lorin Wu,Porot Mo#BHAS BlackHatEventsAbout Us Jac。
14、#BHAS BlackHatEventsThe Drone Supply Chains Grand Siege:From Initial Breaches to Long-Term Espionage on High-Value TargetsSpeakers:Philip Chen,Vickie SuContributor:Pierre Lee(Trend Micro)#BHAS BlackH。
15、#BHAS BlackHatEventsvCenter LostHow the DCERPC Vulnerabilities Changed the Fate of ESXiHao Zheng Zibo Li Yue LiuTianGong Team of QI-ANXIN Group#BHAS BlackHatEventsHao Zhengzhz_6951Who we areZibo Lizb。
16、#BHAS BlackHatEventsWeaponized Deception:Lessons from Indonesias Muslim Cyber ArmyTim Pappa#BHAS BlackHatEventsFrom Islamic boarding schoolsto the FBIs Criminal MindsI lived in Islamic boarding schoo。
17、#BHAS BlackHatEventsForeign Information Manipulation and Interference(Disinformation 2.0)FRANKY SAEGERMAN Based on Learnings from 30 Years at NATO#BHAS BlackHatEventsfrankylitics.bsky.socialFranky Sa。
18、#BHAS BlackHatEventsOperation BlackEcho:Voice Phishing using Fake Financial and Vaccine AppsSpeakers:Hyeji Heo,Sungchan JangContributors:Kuyju Kim,Jinyong Byun,Byungwoo Hwang#BHAS BlackHatEventsSpeak。
19、#BHAS BlackHatEventsThe Problems of Embedded Python in Excel(How to excel in pwning pandas)#BHAS BlackHatEventsWho are we?Shalom CarmelCIO GlobalDOfir CarmelCS Student#BHAS BlackHatEventsTL;DRThe fac。
20、#BHAS BlackHatEventsSweeping the BlockchainSweeping the Blockchain:Unmasking Illicit Accounts in Web3 ScamsUnmasking Illicit Accounts in Web3 ScamsSpeaker:Wenkai LiHainan University,ChinaCollaborator。
21、#BHAS BlackHatEventsIMPOSTOR SYNDROME HACKING APPLE MDMS USING ROGUE DEVICE ENROLMENTSMARCELL MOLNAR#BHAS BlackHatEvents#BHAS BlackHatEventsApple DCompanys MDM serverApple DCompanys MDM serverNSEncod。
22、LeakingKernelHeap Pointers by ExploitingSoftware-InducedSide-ChannelLeakage of Kernel Hash TablesKernelSnitchLukas MaarJonas JuffingerApril 3-4,2025BRIEFINGSisec.tugraz.atAboutNovel OSsidechannelKern。
23、#BHAS BlackHatEventsJDD:In-depth Mining of Java Deserialization Gadget Chain via Bottom-up Gadget Search and Dataflow aided Payload ConstructionSpeaker:Bofei Chen,Yinzhi CaoOther Contributors:Lei Zha。
24、#BHAS BlackHatEventsCDN Cannon:Exploiting CDN Back-to-Origin Strategies for Amplification Attacks1#BHAS BlackHatEvents2What is a Content Delivery Network(CDN)?UserOrigin#BHAS BlackHatEvents3What is a。
25、#BHAS BlackHatEventsDouble Tap at the BlackboxHacking a Car Remotely Twice with MiTMYingjie Cao360 Vulnerability Research InstituteXinfeng ChenSIG Void Technology#BHAS BlackHatEvents#Yingjie Cao(YinJ。
26、Standing on the Shoulders of GiantsDe-Obfuscating WebAssembly Using LLVMVikas Gupta&Peter GarbaThales Cybersecurity&Digital Identity(CDI)Agenda2About UsVikas GuptaSenior Security Researcher a。
27、#BHAS BlackHatEventsDriveThru Car HackingFast Food,Faster Data BreachSpeakers:Alina Tan,George ChenContributors:Chee Peng Tan,Ri-Sheng Tan,Penelope Chua,Benjamin Cao#BHAS BlackHatEventsAlina TanCar P。
28、#BHAS BlackHatEventsDismantling the SEOS Protocolevildaemond&Iceman#BHAS BlackHatEventsWho is evildaemond?Day job as a Senior Penetration TesterAlmost 10 years in Physical SecuritySpecialises in 。
29、#BHAS BlackHatEventsMini-App But Great Impact:New Ways to Compromise Mobile AppsIES Red Team of ByteDance#BHAS BlackHatEventsAbout us Security researchers and developers at IES Red Team of ByteDance 。
30、#BHAS BlackHatEventsKernJC:Automated Vulnerable KernJC:Automated Vulnerable Environment Generation for Linux Environment Generation for Linux Kernel VulnerabilitiesKernel VulnerabilitiesSpeakers:Bona。
31、#BHAS BlackHatEventsA Closer Look at the Gaps in the Grid:New Vulnerabilities and Exploits Affecting Solar Power SystemsDaniel dos Santos,Francesco La Spina,Stanislav DashevskyiForescout Technologies。
32、I Have Got to Warn You,It Is a Learning Robot:Using DeepLearning Attribution Methods for Fault Injection AttacksKarim M.AbdellatifWhoamiHardware Wallet ManufacturerDonjonLedgers Security Research Tea。
33、#BHAS BlackHatEventsOne Bug to Rule Them All:Stably Exploiting a Preauth RCE Vulnerability on Windows Server 2025Speakers:Dr.Zhiniang Peng HUST&Cyber-KunlunZishan LinVer#BHAS BlackHatEventsWhoAmI。
34、#BHAS BlackHatEventsThe ByzRP SolutionA Global Operational Shield for RPKI ValidatorsJens Friess|Donika Mirdita|Haya Schulmann|Michael Waidner#BHAS BlackHatEventsBGPThe Achilles Heel of the Internet#。
35、Bypassing RFID ReadersBehind Closed DoorsJulia Zduczyk$whoamiJulia ZduczykIT Security Specialist at Penetration Tester Red Teamer Horse archer,diver,caver,rock climber,hiker,gymnast tl;dr I like adre。
36、#BHAS BlackHatEventsDetermining Exploitability of Vulnerabilities with SBOM and VEXAnusha PenumachaSrinija Kammari#BHAS BlackHatEventsCisco ConfidentialSoftware Composition AnalysisSoftware Bill Of M。
37、Sharing is caring about an RCE attack chain on Quick Share Security Research Team Lead at SafeBreach 7?years in Security Research Past research in Linux,embedded,Android 4 years Windows research 6?ye。
38、#BHAS BlackHatEvents(Mis)adventures with Copilot+:Attacking and Exploiting Windows NPU DriversNicola Stauffer&Grkan Gr Nicola Stauffer Graduate Student Member of the security research team Grkan 。