Last month I had the opportunity to attend HITCON in Taiwan for the first time. It’s an annual event hosted by the Hackers in Taiwan organization and CMT stands for the community version.
There is a second event for enterprises later this year also - think of it like Blackhat vs Defcon in a way.
Conference, Location and Registration
HITCON CMT 2023 was a two day event hosted in the east side of Taipei at Academia Sinica.
Overall there were three general tracks, villages, and many side events, like a CTF, scavenger hunt, workshops and a lot more. The Evening before the conference there was a nice event to get to know the organizers, volunteers and speakers.
One thing that stood out to me from the get-go was how well organized and high quality the event was. At speaker registration, I was lucky and got this cool Taiwan badge from a couple of years ago:
Registration went very smoothly and I got a goodie bag, t-shirt and a bubble tea kit.
Talks and Translations
Majority of talks are given in Mandarin, but there is one track that always had an English speaker and the HITCON does community provided translation services for all talks (both English to Mandarin and vice versa).
The keynote was by Zion Basque who talked about reversing with the help of Generative AI, and showed a very cool LLM integration with IDA to aid reversing.
I met Orange Tsai, who discovered some cool VPN security issues in the past, and was able watch his talk “A 3-Year Tale of Hacking a Pwn2Own Target: The Attacks, Vendor Evolution, and Lesson Learned”. It was the talk that he would have given at DEF CON but he wasn’t granted the visa to enter the US and had to withdraw as speaker.
Yours truly was also on stage talking about Indirect Prompt Injections in the Wild.
There were lots of follow up questions and interest in the topic of LLMs and safe and secure useage.
Wojciech Reguła had a really insighful talk about his latest tool Electroniz3r, that allows code injection in Electron apps on macOS.
And to stay with Electron exploits, Li Jiantao talked about “What You See IS NOT What You Get: Pwning Electron-based Markdown Note-taking Apps”.
This talk made me think quite a bit about the applicability of some of these TTPs with Large Language Models integrated applications and how Indirect Prompt Injection could be a future attack angle for exploitation. Chatbots are often Electron apps.
A couple of other great and highly technical talks were about Windows Kernel Exploitation by Sheng Hao Ma (@aaaddress1) and another one by Zeze. I didn’t catch the latter personally, though.
There was also a merry dinner after the first day to mingle and exchange hacking stories. Made many new connections and friends.
Overall, HITCON is a great conference and I will definitely try to make it again next time.
A big Thanks and Kudos to the organizers and all the volunteers!
See you next time – 下次見
- HITCON CMT 2023
- Ghosts of the Past: Classic PHP RCE Bugs in Trend Micro Enterprise Offerings
- A 3-Year Tale of Hacking a Pwn2Own Target: The Attacks, Vendor Evolution, and Lesson Learned
- ELECTRONizing macOS privacy - a new weapon in your red teaming armory
- Attacking SSL VPN - DevCore
- Indirect Prompt Injections in the Wild
- Most Photos from HITCON Flickr Page