{"id":11635,"date":"2023-02-27T07:44:10","date_gmt":"2023-02-27T07:44:10","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/"},"modified":"2023-03-27T05:49:24","modified_gmt":"2023-03-27T05:49:24","slug":"a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/","title":{"rendered":"A Practical Approach To Malware Analysis, Hunting And Memory Forensics (HKT)"},"content":{"rendered":"<div class=\"page\" title=\"Page 3\">\n<h4><strong><span style=\"color: #993300\">ATTEND IN-PERSON<\/span>: Onsite in Phuket<\/strong><\/h4>\n<h4><strong>DATE: 21-23 August 2023<\/strong><\/h4>\n<\/div>\n<h4><strong>TIME: 09:00 to 17:00 ICT\/GMT+7<\/strong><\/h4>\n<table style=\"height: 146px\" width=\"599\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>21 Aug<\/td>\n<td>Monday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>22 Aug<\/td>\n<td>Tuesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>23 Aug<\/td>\n<td>Wednesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<hr \/>\n<h5><\/h5>\n<h5>This hands-on training teaches concepts, techniques and tools to understand the behavior and characteristics of malware by combining two powerful techniques, malware analysis and memory forensics.<\/h5>\n<p>Malware analysis and memory forensics are powerful analysis and investigative techniques used in reverse engineering, digital forensics and incident response. Adversaries are becoming more sophisticated and carrying out advanced malware attacks on critical infrastructures, Data Centers, private and public organizations. This makes detecting, responding and investigating such intrusions increasingly critical for information security professionals. Malware analysis and memory forensics have become a must-have skill for fighting advanced malwares, targeted attacks and security breaches.<\/p>\n<p>This course will introduce attendees to basics of malware analysis,reverse engineering, Windows internals and memory forensics. It will then gradually progress deeper into more advanced concepts of memory forensics.<\/p>\n<p>This course uses hands-on labs using real world malware samples and infected memory images (Crimewares, APT malwares, Rootkits etc) to help attendees gain better understanding of the subject. The training also shows how these techniques can be incorporated in a sandbox to automate malware analysis. After taking this course attendees will be equipped with skill to analyze, investigate and respond to malware related incidents.<\/p>\n<h5><strong>Students will be provided with:<\/strong><\/h5>\n<ul>\n<li>Course material<\/li>\n<li>Lab solution material<\/li>\n<li>Videos used in the course<\/li>\n<li>Malware samples used in the course\/labs<\/li>\n<li>Memory Images used in the course\/labs<\/li>\n<li>Custom Scripts<\/li>\n<li>Linux VM (to be opened with VMware Workstation\/Fusion) containing necessary tools and samples<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>Agenda <\/strong><\/h5>\n<h5><strong>Day 1<\/strong><\/h5>\n<hr \/>\n<p><strong>Introduction to Malware Analysis<\/strong><\/p>\n<ul>\n<li>What is Malware<\/li>\n<li>What they do<\/li>\n<li>Why malware analysis<\/li>\n<li>Types of malware analysis<\/li>\n<li>Setting up an isolated lab environment<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Static Analysis<\/strong><\/p>\n<ul>\n<li>Fingerprinting the malware<\/li>\n<li>Extracting strings<\/li>\n<li>Determining File obfuscation<\/li>\n<li>Pattern matching using YARA<\/li>\n<li>Fuzzing hashing &amp; comparison<\/li>\n<li>Understanding PE File characteristics<\/li>\n<li>Disassembly<\/li>\n<li>Hands-on lab exercise involves analyzing a real malware sample<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Dynamic Analysis\/Behavioural analysis<\/strong><\/p>\n<ul>\n<li>Dynamic Analysis Steps<\/li>\n<li>Understanding Dynamic Analysis tools<\/li>\n<li>Simulating services<\/li>\n<li>Performing Dynamic Analysis<\/li>\n<li>Monitoring process, filesystem, registry, and network activity<\/li>\n<li>Determining the Indicators of compromise (host and network indicators)<\/li>\n<li>Hands-on lab exercise involves analyzing a real malware sample<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>\u00a0Automating Malware Analysis(sandbox)<\/strong><\/p>\n<ul>\n<li>Custom Sandbox Overview<\/li>\n<li>Working of Sandbox<\/li>\n<li>Sandbox Features<\/li>\n<li>Demo &#8211; Analyzing malware in the custom sandbox<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Malware Persistence Methods<\/strong><\/p>\n<ul>\n<li>Run registry key<\/li>\n<li>Scheduled Tasks<\/li>\n<li>Startup Folder<\/li>\n<li>Service<\/li>\n<li>Winlogon registry entries<\/li>\n<li>Image File Execution Options (IFEO)<\/li>\n<li>Accessibility programs<\/li>\n<li>AppInit_DLLs<\/li>\n<li>DLL Search order hijacking<\/li>\n<li>COM Hijacking<\/li>\n<li>Hands-on lab exercise involves analyzing a real malware sample<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>Day 2<\/strong><\/h5>\n<hr \/>\n<p><strong>Code Analysis<\/strong><\/p>\n<ul>\n<li>Code Analysis Overview<\/li>\n<li>Disassembler &amp; Debuggers<\/li>\n<li>Code Analysis Tools<\/li>\n<li>Basics of IDA Pro<\/li>\n<li>Basics of Ollydbg\/x64dbg<\/li>\n<li>Understanding the API calls<\/li>\n<li>Reversing Malware functionalities(Downloader, dropper, keylogger, code injection, HTTP backdoor)<\/li>\n<li>\u00a0Hands-on lab exercise involves analyzing a real malware sample<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Introduction to Memory Forensics<\/strong><\/p>\n<ul>\n<li>What is Memory Forensics<\/li>\n<li>Why Memory Forensics<\/li>\n<li>Steps in Memory Forensics<\/li>\n<li>Memory acquisition and tools<\/li>\n<li>Acquiring memory From physical machine<\/li>\n<li>Acquiring memory from the virtual machine<\/li>\n<li>The hands-on exercise involves acquiring the memory<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Volatility Overview<\/strong><\/p>\n<ul>\n<li>Introduction to Volatility Advanced Memory Forensics Framework<\/li>\n<li>Volatility Installation<\/li>\n<li>Volatility basic commands<\/li>\n<li>Determining the profile<\/li>\n<li>Volatility help options<\/li>\n<li>Running the plugin<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Investigating Process<\/strong><\/p>\n<ul>\n<li>Understanding Process Internals<\/li>\n<li>Process(EPROCESS) Structure<\/li>\n<li>Process organization<\/li>\n<li>Process Enumeration by walking the double linked list<\/li>\n<li>Process relationship (parent-child relationship)<\/li>\n<li>Understanding DKOM attacks<\/li>\n<li>Process Enumeration using pool tag scanning<\/li>\n<li>Volatility plugins to enumerate processes<\/li>\n<li>Identifying malware process<\/li>\n<li>Hands-on lab exercise(scenario-based) involves investigating malware infected memory<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Investigating Process handles &amp; Registry<\/strong><\/p>\n<ul>\n<li>Objects and handles overview<\/li>\n<li>Enumerating process handles using Volatility<\/li>\n<li>Understanding Mutex<\/li>\n<li>Detecting malware presence using a mutex<\/li>\n<li>Understanding the Registry<\/li>\n<li>Investigating common registry keys using Volatility<\/li>\n<li>Detecting malware persistence<\/li>\n<li>Hands-on lab exercise(scenario-based) involves investigating malware infected memory<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Day 3<\/strong><\/p>\n<hr \/>\n<p><strong>Investigating Network Activities<\/strong><\/p>\n<ul>\n<li>Understanding malware network activities<\/li>\n<li>Volatility Network Plugins<\/li>\n<li>Investigating Network connections<\/li>\n<li>Investigating Sockets<\/li>\n<li>Hands-on lab exercise(scenario-based) involves investigating malware infected memory<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Investigation Process Memory<\/strong><\/p>\n<ul>\n<li>Process memory Internals<\/li>\n<li>Listing DLLs using Volatility<\/li>\n<li>Identifying hidden DLLs<\/li>\n<li>Dumping malicious executable from memory<\/li>\n<li>Dumping Dll&#8217;s from memory<\/li>\n<li>Scanning the memory for patterns(yarascan)<\/li>\n<li>Hands-on lab exercise(scenario-based) involves investigating malware infected memory<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Investigating User-Mode Rootkits &amp; Fileless Malwares<\/strong><\/p>\n<ul>\n<li>Code Injection<\/li>\n<li>Types of Code injection<\/li>\n<li>Remote DLL injection<\/li>\n<li>Remote Code injection<\/li>\n<li>Reflective DLL injection<\/li>\n<li>Hollow process injection<\/li>\n<li>Demo &#8211; Case Study<\/li>\n<li>Hands-on lab exercise(scenario-based) involves investigating malware infected memory<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Memory Forensics in Sandbox technology<\/strong><\/p>\n<ul>\n<li>Sandbox Overview<\/li>\n<li>Integrating Memory Forensics into a sandbox<\/li>\n<li>Demo &#8211; showing the use of memory forensics in a custom sandbox<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Investigating Kernel-Mode Rootkits<\/strong><\/p>\n<ul>\n<li>Understanding Rootkits<\/li>\n<li>Understanding Functional call traversal in Windows<\/li>\n<li>Level of Hooking\/Modification on Windows<\/li>\n<li>Kernel Volatility plugins<\/li>\n<li>Hands-on lab exercise(scenario-based) involves investigating malware infected memory<\/li>\n<li>Demo &#8211; Rootkit Investigation<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Memory Forensic Case Studies<\/strong><\/p>\n<ul>\n<li>Demo &#8211; Hunting an APT malware from Memory<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This hands-on training teaches concepts, techniques and tools to understand the behavior and characteristics of malware by combining two powerful techniques, malware analysis and memory forensics. This course will introduce attendees to basics of malware analysis,reverse engineering, Windows internals and memory forensics, it then gradually progresses deep into more advanced concepts of memory forensics.<\/p>\n","protected":false},"featured_media":11634,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false},"product_cat":[61,77,57],"product_tag":[66,67],"class_list":{"0":"post-11635","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-3-day-training","7":"product_cat-hitb2023hkt","8":"product_cat-in-person","9":"product_tag-malware-analysis","10":"product_tag-memory-forensics","12":"first","13":"instock","14":"featured","15":"virtual","16":"purchasable","17":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Practical Malware Analysis, Hunting &amp; Memory Forensics-May 2021<\/title>\n<meta name=\"description\" content=\"A hands-on training to understand the behavior and characteristics of malware by combining, malware analysis and memory forensics techniques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Practical Malware Analysis, Hunting &amp; Memory Forensics-May 2021\" \/>\n<meta property=\"og:description\" content=\"A hands-on training to understand the behavior and characteristics of malware by combining, malware analysis and memory forensics techniques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2023 - Phuket\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T05:49:24+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Practical Malware Analysis, Hunting &amp; Memory Forensics-May 2021\" \/>\n<meta name=\"twitter:description\" content=\"A hands-on training to understand the behavior and characteristics of malware by combining, malware analysis and memory forensics techniques.\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/\",\"name\":\"Practical Malware Analysis, Hunting & Memory Forensics-May 2021\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/02\/Monappa-Training.jpg\",\"datePublished\":\"2023-02-27T07:44:10+00:00\",\"dateModified\":\"2023-03-27T05:49:24+00:00\",\"description\":\"A hands-on training to understand the behavior and characteristics of malware by combining, malware analysis and memory forensics techniques.\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/02\/Monappa-Training.jpg\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/02\/Monappa-Training.jpg\",\"width\":1200,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A Practical Approach To Malware Analysis, Hunting And Memory Forensics (HKT)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/\",\"name\":\"HITBSecConf2023 - Phuket\",\"description\":\"August 22 - 26 @ InterContinental\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Practical Malware Analysis, Hunting & Memory Forensics-May 2021","description":"A hands-on training to understand the behavior and characteristics of malware by combining, malware analysis and memory forensics techniques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/","og_locale":"en_US","og_type":"article","og_title":"Practical Malware Analysis, Hunting & Memory Forensics-May 2021","og_description":"A hands-on training to understand the behavior and characteristics of malware by combining, malware analysis and memory forensics techniques.","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/","og_site_name":"HITBSecConf2023 - Phuket","article_modified_time":"2023-03-27T05:49:24+00:00","twitter_card":"summary_large_image","twitter_title":"Practical Malware Analysis, Hunting & Memory Forensics-May 2021","twitter_description":"A hands-on training to understand the behavior and characteristics of malware by combining, malware analysis and memory forensics techniques.","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/","name":"Practical Malware Analysis, Hunting & Memory Forensics-May 2021","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/02\/Monappa-Training.jpg","datePublished":"2023-02-27T07:44:10+00:00","dateModified":"2023-03-27T05:49:24+00:00","description":"A hands-on training to understand the behavior and characteristics of malware by combining, malware analysis and memory forensics techniques.","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/02\/Monappa-Training.jpg","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/02\/Monappa-Training.jpg","width":1200,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/a-practical-approach-to-malware-analysis-hunting-and-memory-forensics-hitb2023hkt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/shop\/"},{"@type":"ListItem","position":3,"name":"A Practical Approach To Malware Analysis, Hunting And Memory Forensics (HKT)"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/","name":"HITBSecConf2023 - Phuket","description":"August 22 - 26 @ InterContinental","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/product\/11635"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/comments?post=11635"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/media\/11634"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/media?parent=11635"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/product_cat?post=11635"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/product_tag?post=11635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}