#HITCON 擺攤遇到蠻多上週有在 #COSCUP 參加匿名網路工作坊議程的會眾!目前覺得還是要勤跑擺攤,下次用「匿名網路社群」的名義申請攤位好了。
In the zine for our anonymous network, that introduces the open-source apps our team has self-hosted, maintaining the principle of anony usage. If you're at the #HITCON, visit our booth (VC02). We’d love to chat about your thoughts on "anonymous networks"! anoni.net
在匿名網路的推廣手冊中,有一頁介紹目前我們社群自架了那些開源服務,並維持著匿名使用的原則,目前這幾頁的介紹內容還沒有放到網站上,有興趣的、剛好也在 #HITCON 的會場,可以來攤位上(VC02)找我們。順便聊聊你對「匿名網路」的看法! anoni.net
HITCON CMT 2024 was amazing! It was great to reconnect with old friends, meet new ones, and catch some incredible research. A huge thanks to the HITCON team for the warm hospitality and truly honored to share my research. If you’re looking for a top-notch security conference in Taiwan, I highly recommend it! #HITCON #HITCONCMT

Slides from my keynote @hacksintaiwan #HITCON’s 20th anniversary.

“25 Years of Attacks and Defense”

Huge shoutout to the awesome HITCON crew for organising a flawless event!

https://www.linkedin.com/posts/saumilshah_hitcon-taiwan-keynote-25years-of-attacks-activity-7232968895186239488-IPq9?utm_source=share&utm_medium=member_desktop

Saumil Shah on LinkedIn: #HITCON Taiwan Keynote - 25years of Attacks and Defense

Slides from my keynote at Hacks In Taiwan Conference (HITCON)'s 20th Anniversary. 25 Years of Attacks and Defense. And massive props to #HITCON for organising…

My presentation from nearly a year ago about "Prompt injections in the Wild" is now up on YouTube via HITCON!

It's a great intro to prompt injection exploitation in real world LLM applications.

I'm also speaking some Chinese at ~17:10 to make a point about confusing the model by switching languages. 😀

#hitcon #llm #infosec #ai

https://www.youtube.com/watch?v=7jymOKqNrdU

Prompt Injections in the Wild - Exploiting Vulnerabilities in LLM Agents | HITCON CMT 2023

YouTube
A slide from my #HITCON presentation last week. Helping to clarify terms around #llm. Active area of research - but hope this is useful.
トレンドマイクロを軽蔑するものではありません
(同じような製品も同様の問題を抱えています)
#HITCON
お次は「Endpoint Security or End of Security? Exploiting Trend Micro Apex One」です
各コンピュータにインストールされたAgentとApex Oneの間の通信に使われるIPCをexploitしてみたというお話です
#HITCON
次は「A Comprehensive Review on the Less-Traveled Road: 9 Years of Overlooked MikroTik Pre-Auth RCE」を聴きます
攻撃可能領域とシステムの信頼性向上に関するお話です
#HITCON