{"id":10515,"date":"2014-05-27T11:01:53","date_gmt":"2014-05-27T09:01:53","guid":{"rendered":"https:\/\/www.corelan.be\/?p=10515"},"modified":"2014-05-27T11:01:53","modified_gmt":"2014-05-27T09:01:53","slug":"hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2014\/05\/27\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\/","title":{"rendered":"HITB2014AMS - Hack In The Box \/ Haxpo 2014 Amsterdam"},"content":{"rendered":"<p>Dear friends,<\/p>\n<p>I'm getting ready for a short trip to Amsterdam, to attend the 5th Hack In The Box conference tomorrow ... and\u00a0I'm \"hashtag\" excited about it. HITB Haxpo and HITB2014AMS feature and amazing schedule of talks, an impressive selection of speakers and offers numerous side-events and I really can't think of a better place to to attend my first conference of 2014. (Yeah I know, it's not the first infosec conference of 2014, but you know... work, life, busy busy busy...).<\/p>\n<p>Hack In The Box offers 2 days of training and 2 days of conference. \u00a0You can download the full agenda here:\u00a0http:\/\/conference.hitb.org\/hitb2014ams-agenda.pdf<\/p>\n<p>The all-new Haxpo, is a 3 day <strong>FREE<\/strong> Technology and Security Expo for Hackers, Makers, Builders and Breakers. \u00a0Did I mention that it's <strong>free<\/strong>? Both events are taking place at De Beurs van Berlage. \u00a0If you plan on attending the HITB conference, you can still register on-site. \u00a0If you're tight on budget, but still into 30 minute talks, you can still visit HITB Haxpo (which runs alongside the actual conference), but don't forget to\u00a0register first at <a href=\"https:\/\/web.archive.org\/web\/20141003024721\/http:\/\/haxpo.nl:80\/sideline-events\/\">http:\/\/haxpo.nl\/sideline-events\/<\/a>. If you feel like roling up your sleeves and getting your hands dirty, you can also <a href=\"https:\/\/web.archive.org\/web\/20141003024721\/http:\/\/haxpo.nl:80\/sideline-events\/\">register<\/a> for the free on-site CTF. \u00a0 You can find more info about the these and other side-events at http:\/\/haxpo.nl<\/p>\n<p>Anyways, as with previous editions of HITB, I plan on sharing some of the HITB conference keynotes\/talks and post write-ups on this blog, during the conference. \u00a0It'll feel like as if you are in the front row, but without the smell of sweat and hung-over people \ud83d\ude42 \u00a0 To the speakers: yes, I'll be the guy in the front row, frantically typing away in an attempt to melt my laptop.<\/p>\n<p>If you're unable to make it to Amsterdam, keep an eye on <a href=\"https:\/\/twitter.com\/corelanc0d3r\">my twitter account<\/a> or this website, starting Thursday morning.<\/p>\n<p>I am looking forward to meeting friends, perhaps making a few new ones. \u00a0<\/p>\n<p>See you soon !<\/p>\n<p>Peter<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>Dear friends, I'm getting ready for a short trip to Amsterdam, to attend the 5th Hack In The Box conference tomorrow ... and\u00a0I'm \"hashtag\" excited about it. HITB Haxpo and HITB2014AMS feature and amazing schedule of talks, an impressive selection of speakers and offers numerous side-events and I really can't think of a better place &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2014\/05\/27\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"HITB2014AMS - Hack In The Box \/ Haxpo 2014 Amsterdam\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2250],"tags":[2775,261],"class_list":["post-10515","post","type-post","status-publish","format-standard","hentry","category-cons-seminars","tag-hitb","tag-corelan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>HITB2014AMS - Hack In The Box \/ Haxpo 2014 Amsterdam - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2014\/05\/27\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HITB2014AMS - Hack In The Box \/ Haxpo 2014 Amsterdam - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Dear friends, I&#039;m getting ready for a short trip to Amsterdam, to attend the 5th Hack In The Box conference tomorrow ... and\u00a0I&#039;m &quot;hashtag&quot; excited about it. HITB Haxpo and HITB2014AMS feature and amazing schedule of talks, an impressive selection of speakers and offers numerous side-events and I really can&#039;t think of a better place &hellip; Continue reading &quot;HITB2014AMS - Hack In The Box \/ Haxpo 2014 Amsterdam&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2014\/05\/27\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-27T09:01:53+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/27\\\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/27\\\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"HITB2014AMS - Hack In The Box \\\/ Haxpo 2014 Amsterdam\",\"datePublished\":\"2014-05-27T09:01:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/27\\\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\\\/\"},\"wordCount\":339,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"hitb\",\"corelan\"],\"articleSection\":[\"Cons and Seminars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/27\\\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/27\\\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\\\/\",\"name\":\"HITB2014AMS - Hack In The Box \\\/ Haxpo 2014 Amsterdam - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2014-05-27T09:01:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/27\\\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/27\\\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/27\\\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HITB2014AMS &#8211; Hack In The Box \\\/ Haxpo 2014 Amsterdam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HITB2014AMS - Hack In The Box \/ Haxpo 2014 Amsterdam - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2014\/05\/27\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\/","og_locale":"en_US","og_type":"article","og_title":"HITB2014AMS - Hack In The Box \/ Haxpo 2014 Amsterdam - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Dear friends, I'm getting ready for a short trip to Amsterdam, to attend the 5th Hack In The Box conference tomorrow ... and\u00a0I'm \"hashtag\" excited about it. HITB Haxpo and HITB2014AMS feature and amazing schedule of talks, an impressive selection of speakers and offers numerous side-events and I really can't think of a better place &hellip; Continue reading \"HITB2014AMS - Hack In The Box \/ Haxpo 2014 Amsterdam\"","og_url":"https:\/\/www.corelan.be\/index.php\/2014\/05\/27\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2014-05-27T09:01:53+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/27\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/27\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"HITB2014AMS - Hack In The Box \/ Haxpo 2014 Amsterdam","datePublished":"2014-05-27T09:01:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/27\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\/"},"wordCount":339,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["hitb","corelan"],"articleSection":["Cons and Seminars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/27\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\/","url":"https:\/\/www.corelan.be\/index.php\/2014\/05\/27\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\/","name":"HITB2014AMS - Hack In The Box \/ Haxpo 2014 Amsterdam - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2014-05-27T09:01:53+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/27\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2014\/05\/27\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/27\/hitb2014ams-hack-in-the-box-haxpo-2014-amsterdam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"HITB2014AMS &#8211; Hack In The Box \/ Haxpo 2014 Amsterdam"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":1909,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/10515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=10515"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/10515\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=10515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=10515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=10515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}