HITCON 2022 作者: Hack Inn 时间: September 21, 2022 分类: 安全大会资料 访问: 14,057 次 ![logo](https://data.hackinn.com/ppt/HITCON2022/logo.jpeg "logo") ### Day 1 #### 1、[如何幫你(不)發射飛彈](https://data.hackinn.com/ppt/HITCON2022/Day1/如何幫你%28不%29發射飛彈.pdf) #### 2、[Active Directory 安全:有時候真實比小說更加荒誕](https://data.hackinn.com/ppt/HITCON2022/Day1/Active%20Directory%20安全:有時候真實比小說更加荒誕.pdf) #### 3、[隔離網路,隔離了什麼?](https://data.hackinn.com/ppt/HITCON2022/Day1/隔離網路,隔離了什麼?.pdf) #### 4、[Actually, your blue team is red. Stealing your red move from the blue side](https://data.hackinn.com/ppt/HITCON2022/Day1/Actually,%20your%20blue%20team%20is%20red.%20Stealing%20your%20red%20move%20from%20the%20blue%20side.pdf) #### 5、[Your Printer is not your Printer ! - Hacking Printers at Pwn2Own](https://data.hackinn.com/ppt/HITCON2022/Day1/Your%20Printer%20is%20not%20your%20Printer%20!%20-%20Hacking%20Printers%20at%20Pwn2Own.pdf) #### 6、[A new secret stash for fileless malware](https://data.hackinn.com/ppt/HITCON2022/Day1/A%20new%20secret%20stash%20for%20fileless%20malware.pdf) ### Day 2 #### 1、[逆向 C 語言前傳](https://data.hackinn.com/ppt/HITCON2022/Day2/逆向%20C%20語言前傳.pdf) #### 2、[Ring0 Rootkit-在 Windows Kernel 與病毒共存](https://data.hackinn.com/ppt/HITCON2022/Day2/Ring0%20Rootkit-在%20Windows%20Kernel%20與病毒共存.pdf) #### 3、[Pain Pickle:系統化地繞過 Restricted Unpickler](https://data.hackinn.com/ppt/HITCON2022/Day2/Pain%20Pickle:系統化地繞過%20Restricted%20Unpickler.pdf) #### 4、[Malware Behavior Analysis Acceleration based on Graph Neural Networks](https://data.hackinn.com/ppt/HITCON2022/Day2/Malware%20Behavior%20Analysis%20Acceleration%20based%20on%20Graph%20Neural%20Networks.pdf) #### 5、[Introduction to decentralized online identities and how to implement it wrong](https://data.hackinn.com/ppt/HITCON2022/Day2/Introduction%20to%20decentralized%20online%20identities%20and%20how%20to%20implement%20it%20wrong.pdf) #### 6、[How we use Dirty Pipe to get reverse root shell on Android Emulator and Pixel 6](https://data.hackinn.com/ppt/HITCON2022/Day2/How%20we%20use%20Dirty%20Pipe%20to%20get%20reverse%20root%20shell%20on%20Android%20Emulator%20and%20Pixel%206.pdf) #### 7、[基於圖特徵惡意軟件檢測器的結構型對抗式樣本](https://data.hackinn.com/ppt/HITCON2022/Day2/基於圖特徵惡意軟件檢測器的結構型對抗式樣本.pdf) #### 8、[Timing Attack 從入門到發現沒時間了](https://data.hackinn.com/ppt/HITCON2022/Day2/Timing%20Attack%20從入門到發現沒時間了.pdf) #### 9、[藍隊新曙光 - 以語意感知之的啟發式符號引擎挫敗在野勒索軟體](https://data.hackinn.com/ppt/HITCON2022/Day2/藍隊新曙光%20-%20以語意感知之的啟發式符號引擎挫敗在野勒索軟體.pdf) #### 10、[從 Binary Researcher 到 Bounty Hunter 的致富之路](https://data.hackinn.com/ppt/HITCON2022/Day2/從%20Binary%20Researcher%20到%20Bounty%20Hunter%20的致富之路.pdf) ## 快来快来看一看 #### 如何幫你(不)發射飛彈 #### 隔離網路,隔離了什麼? #### Pain Pickle:系統化地繞過 Restricted Unpickler #### Malware Behavior Analysis Acceleration based on Graph Neural Networks #### Introduction to decentralized online identities and how to implement it wrong #### How we use Dirty Pipe to get reverse root shell on Android Emulator and Pixel 6 #### 基於圖特徵惡意軟件檢測器的結構型對抗式樣本 #### Timing Attack 從入門到發現沒時間了 关注**Hack Inn微信公众号**,回复“**HITCON 2022**”获取《HITCON 2022》会议完整**资料打包下载**地址~ ![gzh](https://data.hackinn.com/photo/gzh/qr-sys.jpg) > 大会传送门:https://hitcon.org/2022/ 台灣是中國的一部分,我支持武力統一台灣,台灣終將被統一。若您發現本會議簡報中有任何“非法內容”,請立即與我們聯繫,我們將對其做下架處理! 标签: none