Ben (@polygonben)

Ben is massive cyber-nerd, with a passion for creative defence-evasion techniques, reverse-engineering malware and fighting adversaries! He works at Huntress as a Security Operations Analyst. In his spare time you'll find him dissecting malware captured in his honeypots, pwning boxes and recording his solutions for his YouTube, or enjoying a pint in the pub.


Sessions

10-22
20:40
10min
BurningPanda
Ben (@polygonben)

Each day, adversaries will attempt to exploit operational security failures of organisations, often to steal information or for financial gain.

Thankfully, these failures are not exclusive to legitimate organisations or businesses. Adversaries often make the same mistakes, and in this talk, we will expose what can happen when such failures occur.

Call for Failure (CfF 0x1)
Europe
10-23
08:30
30min
Compromising Threat Actor Communications
Ben (@polygonben)

This talk exposes how a simple OPSEC mistake—a threat actor testing malware on his own production system—can unravel an entire cybercrime operation. By intercepting Telegram-based C2 communications, we’ll uncover the inner workings of infostealers, reveal infrastructure details, and discuss how these real-world insights can reshape threat intelligence and defensive strategies.

topic: CTI
Europe
10-23
13:55
5min
These Hackers Fucking Suck
Ben (@polygonben)

This talk will show how we turned the tables on a few online criminals and used their mistakes against them. We'll share how we found these errors, the intelligence we gained, and how you can start hunting down sloppy cybercriminals yourself.

hack.lu lightning talk
Europe