March TASK: Hacking Games & AI Threat Detection

Live and in person this month at TMU with thanks to Abnormal Security and the Cybersecure Catalyst for their sponsorship!

Date: Wednesday, March 27
Time: 6:00 PM
Location: Room 208, Daphne Cockwell Complex, 288 Church St
Register: Not required


Topic: Game Player to Game Changer: Advanced Binary Exploitation and Hacking for Fun
Speakers: Aaron Hnatiw


Embark on an engaging quest to uncover the secrets of game hacking, a playful yet profound doorway to mastering advanced binary exploitation. Our session starts by showing how beginners can leverage tools like Cheat Engine to modify game values, showcasing the power of hacking right at your fingertips. This foundation not only spices up your gaming experience but also serves as a stepping stone to the inner workings of software, where fun meets practical learning.

As we level up to intermediate skills, participants will decode the game's assembly language, revealing the tangible elements of reverse engineering and debugging. With tools such as x64dbg and Ghidra, we'll demonstrate how to dissect and manipulate game code, illustrating the transition from game player to game changer. Our exploration includes defeating anti-debug measures, a skill that proves game hacking is not just entertaining, but a serious and effective way to learn the art of hacking.

Advancing further, we delve into the realms where professional hackers are forged. We'll highlight how game hacking paves the way for overcoming sophisticated challenges like kernel mode anti-cheat systems and encrypted network traffic analysis. Game hacking isn't just gameplay; it's a training ground celebrated by the hacker community, where many of today's experts honed their skills. Attendees will leave equipped with a wealth of resources, eager to continue this journey where game hacking offers an enthralling path to elite binary exploitation skills.

Aaron Hnatiw has over a decade of experience in software engineering and cybersecurity, Aaron is a specialist in developing security software. He has developed open-source, internal, and commercial cybersecurity software, and teaches others to do so through the Hacker Dev Bootcamp and one-on-one training. Aaron has used those same skills to play the ultimate meta-game in his spare time: video game hacking. His exploits have been featured on the top game hacking website (Guided Hacking), and he continues to share his techniques with modern video games on his blog.

You can see more about Aaron's accomplishments and career at https://aaronhnatiw.com


Topic: Harnessing AI to Detect Stealthy Attacks in the Cloud
Speaker: Ezz Tahoun

AI is more common in SOCs than ever, however, efficacy concerns are plenty. Brace for a journey through the highs and lows of experimenting with AI models to address some of the most important SOC challenges: threat abstraction and threat correlation. You will enhance your ability to evaluate AI solutions, separate hype from reality, assess integration risks, and design your SOC to be AI ready.

Ezz Tahoun is a distinguished cyber data scientist, who won awards at Yale, Northwestern and Princeton universities as well as prizes from CCCS, CSE, Microsoft, Trustwave and PIA. During his PhD studies in University of Waterloo, he had authored 19 papers, 4 open source projects, and was a reviewer for top conferences. He led innovative security projects for Royal Bank of Canada, Orange, Canarie, Huawei, Forescout, various governments, and others. He holds the following certifications: GIAC Advisory Board, GCIH, GSEC, GFACT, CEH, CISM, CRISC, PMP, GCP Prof Cloud Architect, and was an Adjunct Professor of Cyber Security.
 

We look forward to see you all there!
The TASK Steering Committee

Previous
Previous

April TASK: Safeguarding Sensitive Data in the era of LLMs + The Vendor Dance

Next
Next

February TASK: Celebrating Security Community in Toronto