{"id":9156,"date":"2012-05-17T09:45:31","date_gmt":"2012-05-17T07:45:31","guid":{"rendered":"https:\/\/www.corelan.be\/?p=9156"},"modified":"2012-05-17T09:45:31","modified_gmt":"2012-05-17T07:45:31","slug":"hack-in-the-box-amsterdam-2012-preview","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/","title":{"rendered":"Hack In The Box Amsterdam 2012 - Preview"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"margin: 7px;\" src=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/wp-content\/themes\/hitbsec\/images\/logo.jpg\" alt=\"\" width=\"610\" height=\"157\" \/><\/p>\n<p>In less than a week from now, <a href=\"http:\/\/conference.hitb.org\/\">Hack In The Box<\/a> Amsterdam will open the doors of its 2012 edition.\u00a0 The <a href=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/\">conference<\/a> will take place in the Okura Hotel, and features 3 days of training, 2 days of quad-track talks, a CTF and <a href=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/pagelist2\/hackweekday\/\">HackWEEKDAY<\/a>, a 12 hour hackathon hosted alongside the actual confererence.<\/p>\n<p>The line-up looks promising, with Andy Ellis and Bruce Schneier giving the keynote talks on may 24th and 25th, and a series of talks that seem to be technical enough to attract an interesting crowd \ud83d\ude42<\/p>\n<p>Nothing has been carved in stone yet, but the talks\/labs that I plan on attending include:<\/p>\n<ul>\n<li>WinRT : <a title=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/sebastien-renaud-quarkslab\/\" href=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/sebastien-renaud-quarkslab\/\">http:\/\/conference.hitb.org\/hitbsecconf2012ams\/sebastien-renaud-quarkslab\/<\/a><\/li>\n<li>One Flew Over The Cuckoos Nets: Automated Malware Analysis: <a title=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/claudio-guarnieri\/\" href=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/claudio-guarnieri\/\">http:\/\/conference.hitb.org\/hitbsecconf2012ams\/claudio-guarnieri\/<\/a><\/li>\n<li>Hacking Using Dynamic Binary Instrumentation LAB: <a href=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/gal-diskin-hacking-using-dbi\/\">http:\/\/conference.hitb.org\/hitbsecconf2012ams\/gal-diskin-hacking-using-dbi\/<\/a><\/li>\n<li>Window Shopping: Browser Bug Hunting in 2012: <a href=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/roberto-suggi-liverani-scott-bell\/\">http:\/\/conference.hitb.org\/hitbsecconf2012ams\/roberto-suggi-liverani-scott-bell\/<\/a><\/li>\n<li>PostScript - Danger Ahead: <a href=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/ivo-pooters\/\">http:\/\/conference.hitb.org\/hitbsecconf2012ams\/ivo-pooters\/<\/a><\/li>\n<li>Automatically searching for vulnerabilities: <a href=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/alex-bazhanyuk-nikita-tarakanov\/\">http:\/\/conference.hitb.org\/hitbsecconf2012ams\/alex-bazhanyuk-nikita-tarakanov\/<\/a><\/li>\n<li>Ghost in the Windows 7 allocator: <a href=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/steven-seeley-stratsec-bae\/\">http:\/\/conference.hitb.org\/hitbsecconf2012ams\/steven-seeley-stratsec-bae\/<\/a><\/li>\n<\/ul>\n<p>Similar to what I did at BlackHat Europe earlier this year, I'm going to try to capture notes during the talks and publish them right after, so you can follow the conference from your seat at home or at work.<\/p>\n<p>I'm looking forward to meeting old friends again, making new friends, meeting people for the first time and experience the great atmosphere of information gathering &amp; sharing.\u00a0 This is the first time I will be attending HITB, but I'm excited about it.<\/p>\n<p>If you happen to be at the conference, and want to hang out and grab a beer with me, let me know!<\/p>\n<p>If not, keep an eye on this website or <a href=\"https:\/\/twitter.com\/corelanc0d3r\">twitter<\/a> for updates during the conference, and use the #HITB2012AMS hashtag if you tweet about the conference yourself.<\/p>\n<p>Peter<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>In less than a week from now, Hack In The Box Amsterdam will open its 2012 edition.  The conference will take place in the Okura Hotel, and features 3 days of training, 2 days of quad-track talks, a CTF and HackWEEKDAY, a 12 hour hackathon hosted alongside the actual confererence. The line-up looks promising...<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2250],"tags":[2802,2775,2308,261],"class_list":["post-9156","post","type-post","status-publish","format-standard","hentry","category-cons-seminars","tag-mona-py","tag-hitb","tag-ctf","tag-corelan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hack In The Box Amsterdam 2012 - Preview - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hack In The Box Amsterdam 2012 - Preview - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"In less than a week from now, Hack In The Box Amsterdam will open its 2012 edition. The conference will take place in the Okura Hotel, and features 3 days of training, 2 days of quad-track talks, a CTF and HackWEEKDAY, a 12 hour hackathon hosted alongside the actual confererence. The line-up looks promising...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2012-05-17T07:45:31+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/wp-content\/themes\/hitbsec\/images\/logo.jpg\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/17\\\/hack-in-the-box-amsterdam-2012-preview\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/17\\\/hack-in-the-box-amsterdam-2012-preview\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"Hack In The Box Amsterdam 2012 - Preview\",\"datePublished\":\"2012-05-17T07:45:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/17\\\/hack-in-the-box-amsterdam-2012-preview\\\/\"},\"wordCount\":326,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/17\\\/hack-in-the-box-amsterdam-2012-preview\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/conference.hitb.org\\\/hitbsecconf2012ams\\\/wp-content\\\/themes\\\/hitbsec\\\/images\\\/logo.jpg\",\"keywords\":[\"mona.py\",\"hitb\",\"ctf\",\"corelan\"],\"articleSection\":[\"Cons and Seminars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/17\\\/hack-in-the-box-amsterdam-2012-preview\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/17\\\/hack-in-the-box-amsterdam-2012-preview\\\/\",\"name\":\"Hack In The Box Amsterdam 2012 - Preview - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/17\\\/hack-in-the-box-amsterdam-2012-preview\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/17\\\/hack-in-the-box-amsterdam-2012-preview\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/conference.hitb.org\\\/hitbsecconf2012ams\\\/wp-content\\\/themes\\\/hitbsec\\\/images\\\/logo.jpg\",\"datePublished\":\"2012-05-17T07:45:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/17\\\/hack-in-the-box-amsterdam-2012-preview\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/17\\\/hack-in-the-box-amsterdam-2012-preview\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/17\\\/hack-in-the-box-amsterdam-2012-preview\\\/#primaryimage\",\"url\":\"http:\\\/\\\/conference.hitb.org\\\/hitbsecconf2012ams\\\/wp-content\\\/themes\\\/hitbsec\\\/images\\\/logo.jpg\",\"contentUrl\":\"http:\\\/\\\/conference.hitb.org\\\/hitbsecconf2012ams\\\/wp-content\\\/themes\\\/hitbsec\\\/images\\\/logo.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2012\\\/05\\\/17\\\/hack-in-the-box-amsterdam-2012-preview\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hack In The Box Amsterdam 2012 &#8211; Preview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hack In The Box Amsterdam 2012 - Preview - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/","og_locale":"en_US","og_type":"article","og_title":"Hack In The Box Amsterdam 2012 - Preview - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"In less than a week from now, Hack In The Box Amsterdam will open its 2012 edition. The conference will take place in the Okura Hotel, and features 3 days of training, 2 days of quad-track talks, a CTF and HackWEEKDAY, a 12 hour hackathon hosted alongside the actual confererence. The line-up looks promising...","og_url":"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2012-05-17T07:45:31+00:00","og_image":[{"url":"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/wp-content\/themes\/hitbsec\/images\/logo.jpg","type":"","width":"","height":""}],"author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"Hack In The Box Amsterdam 2012 - Preview","datePublished":"2012-05-17T07:45:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/"},"wordCount":326,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/#primaryimage"},"thumbnailUrl":"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/wp-content\/themes\/hitbsec\/images\/logo.jpg","keywords":["mona.py","hitb","ctf","corelan"],"articleSection":["Cons and Seminars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/","url":"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/","name":"Hack In The Box Amsterdam 2012 - Preview - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/#primaryimage"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/#primaryimage"},"thumbnailUrl":"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/wp-content\/themes\/hitbsec\/images\/logo.jpg","datePublished":"2012-05-17T07:45:31+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/#primaryimage","url":"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/wp-content\/themes\/hitbsec\/images\/logo.jpg","contentUrl":"http:\/\/conference.hitb.org\/hitbsecconf2012ams\/wp-content\/themes\/hitbsec\/images\/logo.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2012\/05\/17\/hack-in-the-box-amsterdam-2012-preview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Hack In The Box Amsterdam 2012 &#8211; Preview"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":2801,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=9156"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9156\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=9156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=9156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=9156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}