Thanks for joining VXCON 2019!
Thanks for joining VXCON 2019, we could not make it without your support.
It will be VXCON 10th Anniversary next year, please stay tuned and get prepared for it! :)
VXCON 2019
Main Conference: 27-April-2019 (Saturday)
CPE
Participants of the VXCON main conference are eligible to earn 6 hours of CPE
Workshop and Village (Tentative)
25-26 April: Workshop
28 April: Village
Get Your Tickets!
Get your tix!
Zetta-CTF
PHP: Horrific Puzzle is a series of CTF challenges that no one plays for some unknown reasons.
This time, the challenges feature the seven sins of CTF
Effective from now (29 April 2019) and apply to all previous posts/offences by any entities have made in VXCON 2019. Please fix/clarify them all.
#VXCON #VXRL #面斥不雅 #以儆效尤
VXCON, we are glad to invite a few prominent speakers and researchers all over the world. They are frequent speakers of Blackhat, DEF CON, HITCON and in various global hacker and security conference. Meanwhile, some are very good at Malware Analysis, CTF and Exploitation and Hardware. We focus on offensive security, threat and exploitation. Please enjoy and join us.
Main Conference: 27-Apr 2019 09:00-18:00 (Venue: The Wave) | |
---|---|
09:30 - 09:35 | Opening |
09:40 - 09:55 | Keynote by Edvance - How to use green radar to protect you from being the next victim on email phishing |
10:00 - 10:45 | KJ and Dlive - JiuWei - Cross Platform/Architecture Shellcode Executor |
10:45 - 11:00 | Break |
11:00 - 11:45 | Clarence Chio - Grey-box fuzzing with multi-armed bandit machine learning |
11:45 - 12:30 | Moonbeom Park - Let's steal and dive into the secret computer they stole. |
12:30 - 14:00 | Lunch Break |
14:00 - 14:45 | So-Yeon Lee - Leaking accurate kernel pointer with 1 day analysis / CTF and Pwnable with codegate challenges |
14:45 - 15:30 | Satoshi Tanda - AMD-V for Hackers |
15:30 - 15:40 | Break |
15:40 - 16:00 | Anthony LAI/Ken Wong: Malware Analysis and Machine Learning |
16:00 - 16:30 | Dennis Kim: Blockchain Mythbusters |
16:30 - 16:45 | Drone Security - Kelvin Liu (TDOH) |
16:45 - 17:15 | VX Research :) |
17:15 - 17:45 | Panel Discussion - Hack for Future
Japan: Toshihiko Taniguchi, Takayuki Terashima
Korea: Ryan Lee, Nikolay Akatyev Taiwan: Dr. CK Chen, TDOH - HrJ Malaysia: KJ Singapore: Emil Tan Hong Kong: Albert Hui Moderator: Anthony Lai |
Schedule for Village
Village: 28-Apr 2019 10:30-17:00 (Venue: WeWork CityPlaza 20/F) | |||
---|---|---|---|
10:00 - 10:30 | Entry - Crew members will help to register in Lobby | ||
10:30 - 11:15 | Zetta-CTF / Student session - CTF Fundamental | ||
11:15 - 12:00 | Student session - CTF Fundamental | ||
12:00 - 13:30 | Lunch | ||
13:30 - 14:15 | Smart Home Hacking | ||
14:15 - 15:30 | Smart Home / Morse Code / Zetta-CTF / Other Research |
||
15:30 - 17:30 | Lockpicking Via 3D printing |
Topic : Binary Exploitation - 2 days (25-26 April) |
---|
Linux Heap exploitation |
Glibc memory allocator |
Use after free |
Unsafe unlink |
House of force |
Advanced Linux heap exploitation |
Fastbin attack |
Unsorted bin attack |
Unsorted bin corruption |
Large bin attack |
File structure exploitation |
FSOP |
File Structure internel |
Protection |
Make file structure great again |
Windows exploitation |
From Linux to Windows |
Shellcode |
Bypass some Protection |
Date: 28 April (1030-1530) Topic: Hypervisor Development Hands On for Security Researchers on Windows |
---|
Introduction https://tandasat.github.io/VXCON/ |
Why Learning VT-x Sharing Goals of the Workshop |
Agenda |
Exercise 0: Run Our Hypervisor and Observe Behavior |
Basics of Intel VT-x |
Processor Modes: VMX root operation and VMX non-root operation Mode Transition: VMX instructions, VM-exit and VM-entry VMCS: A Context Structure for a Guest Source Code Work-through Exercise 1: Implement the CPUID Handler |
Customizing Hypervisor |
More on VMCS Opting-in More VM-exit Exercise 2: Implement a Context Switch Tracer (CR3 monitor) |
Wrapping Up |
Typical Vulnerabilities You Would Make Further Features and Learning Resources |