• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • HITB2021UAE
  • HITB2020UAE
  • HITB2019AUH
  • HITB2018DXB
Edition logo

Hack In The Box - UAE HITB2018DXB

2018-11-27 - 2018-11-28
  • Thumbnail for the video - click to play

    ►

    Welcome Address
    - H.E. Yousuf Hamad Al Shaibani
  • Thumbnail for the video - click to play

    ►

    Crouching Tiger, Sudden Keynote
    - Katie Moussouris
  • Video will not be published
    Welcome Comments
    - Andrea Zapparoli Manzoni
  • Thumbnail for the video - click to play

    ►

    Welcome Address
    - Karim Sabbagh
  • Thumbnail for the video - click to play

    ►

    Hacking The 0Day Market
    - Andrea Zapparoli Manzoni
  • Thumbnail for the video - click to play

    ►

    Rooting Routers Using Symbolic Execution
    - Mathy Vanhoef
  • Thumbnail for the video - click to play

    ►

    Somebody Answer The Phone: Hacking Telephone Systems For Fun & Profit
    - Himanshu Mehta and Sachin Wagh
  • Thumbnail for the video - click to play

    ►

    Running Cyber Resilient Mega Events
    - Eman Al Awadhi
  • Thumbnail for the video - click to play

    ►

    Gentlehackers - Start Your AIs: Building Your Own Self Driving, Self Racing Car
    - Dhillon 'L33tdawg' Kannabhiran
  • Thumbnail for the video - click to play

    ►

    Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding
    - Vikash Yadav
  • Thumbnail for the video - click to play

    ►

    Virtualizing IoT With Code Coverage Guided Fuzzing
    - Kai Jern Lau and Nguyen Anh Quynh
  • Thumbnail for the video - click to play

    ►

    IPv666 - Address Of The Beast
    - Marc Newlin and Chris Grayson
  • Thumbnail for the video - click to play

    ►

    Panel Discussion: Safe Digital Transformation In Everyday Life
    - Chadi Moujaes,Eman Al Awadhi,Marwan Bin Dalmook,Yousuf Al Shaiba and Rabih Daboussi
  • Thumbnail for the video - click to play

    ►

    The Phantom Menace: Intel ME Manufacturing Mode
    - Maxim Goryachy and Mark Ermolov
  • Thumbnail for the video - click to play

    ►

    IoT Woodpecker: Intrusion-Detection On The Hardware Bus
    - Congyuan Xu,Wang Kang and Yang Bo
  • Thumbnail for the video - click to play

    ►

    Cyber Threats And Vulnerabilities In The UAE For 2018 - Key Findings
    - Eddie Schwartz and Alan White
  • Thumbnail for the video - click to play

    ►

    Hacking The Human: What You Need To Know About Social Engineering
    - Alan White
  • Thumbnail for the video - click to play

    ►

    Building Security Beyond The Genesis Block
    - Ryan Shepherd
  • Thumbnail for the video - click to play

    ►

    Hunting For Backdoors In IoT Firmware At Unprecedented Scale
    - John Toterhi
  • Thumbnail for the video - click to play

    ►

    A Multidimensional Hardware Attack And Defense Tool Set
    - Kunzhe Chai,Jie Fu and Mingchuang Qin
  • Thumbnail for the video - click to play

    ►

    Panel Discussion: Knowledge And Capacity Building
    - Fahem Al Nuaimi,Jamal N. Al-Karaki,Khalid Al-Wazani,Ronald Hale and Joni Cholwich
  • Thumbnail for the video - click to play

    ►

    Closing Comments
    - Karim Sabbagh
  • Thumbnail for the video - click to play

    ►

    Hacking Yachts Remotely: IoT Hacking At Sea
    - Stephan Gerling
  • Thumbnail for the video - click to play

    ►

    AI Model Security: Reverse Engineering Machine Learning Models
    - Kang Li
  • Thumbnail for the video - click to play

    ►

    Cloudy With A Chance Of Messages: Extracting Messages From Icloud
    - Vladimir Katalov
  • Thumbnail for the video - click to play

    ►

    Hacking Into Broadband And Broadcast TV Systems
    - Chaouki Kasmi,Pierre Barre and Thomas Sabono
  • Thumbnail for the video - click to play

    ►

    Taking Over Telecom Networks
    - Loay Hassan Abdelrazek and Hardik Mehta
  • Thumbnail for the video - click to play

    ►

    Spanish Fly: Infecting Files On-The-Fly
    - Leonardo Nve
  • Thumbnail for the video - click to play

    ►

    Gold Digging: Discovering Hidden Gems In APKs
    - Marc Schoenefeld
  • Thumbnail for the video - click to play

    ►

    System-level Threats: Dangerous Assumptions In Modern Product Security
    - Cristofaro Mune
  • Thumbnail for the video - click to play

    ►

    HitB 10th Year Anniversary Lucky Draw: Win A Trip To Amsterdam!
    - HitB Crew
  • Thumbnail for the video - click to play

    ►

    Cyber Arms Race
    - Mikko Hypponen
  • Thumbnail for the video - click to play

    ►

    Horror On The Bus: Hacking COMBUS
    - Kirils Solovjovs
  • Thumbnail for the video - click to play

    ►

    Are You Listening? Auditable & Provable Privacy Of Smart Speakers
    - Wang Kang and Yang Bo
  • Thumbnail for the video - click to play

    ►

    Evolution of Security Threats To Telecommunications Infrastructures
    - Emmanuel Gadaix
  • Thumbnail for the video - click to play

    ►

    DHCP Is Hard
    - Felix Wilhelm
  • Thumbnail for the video - click to play

    ►

    Back On The Chain Gang: Blockchain, Public Chain and Contract Security
    - Li Jiafeng and Yang Changcheng
  • Thumbnail for the video - click to play

    ►

    Offensive Memory Forensics
    - Hugo Teso
  • Thumbnail for the video - click to play

    ►

    It WISN't Me: Attacking Industrial Wireless Mesh Networks
    - Mattijs Van Ommeren and Erwin Paternotte
  • Thumbnail for the video - click to play

    ►

    Capture This: Real Time Packet Processing With FPGAs
    - Matteo Collura
  • Thumbnail for the video - click to play

    ►

    HWallet: The Simple Cryptocurrency Hardware Wallet
    - Nemanja Nikodijevic
  • Thumbnail for the video - click to play

    ►

    Glitch Chronicles: Turning WebGL Into A Hammer
    - Pietro Frigo
  • Thumbnail for the video - click to play

    ►

    NTLM Relay Is Dead, Long Live NTLM Relay
    - Jianing Wang and Junyu Zhou
  • Thumbnail for the video - click to play

    ►

    A Secured And Robust Wireless Communication System For Low-Latency Applications
    - Dr. Hussameldin Mukhtar
  • Thumbnail for the video - click to play

    ►

    Improved Blockchain Infrastructure With IoT For Critical/Smart Government Applications
    - Dr Qassim Nasir and Dr Manar Abu Talib
  • Thumbnail for the video - click to play

    ►

    Vote Of No Confidence: Second Factor Correctness
    - Victor Mateu
  • Thumbnail for the video - click to play

    ►

    Using Machine-Learning To Investigate Web Campaigns At Large
    - Federico Maggi
  • Thumbnail for the video - click to play

    ►

    Hacking The International RFQ Process #killthebuzzwords
    - Dino Covotsos
  • Video will not be published
    Closing Comments
    - Andrea Zapparoli Manzoni
  • Thumbnail for the video - click to play

    ►

    Blind Digital Signatures (BDS)
    - Dr. Manar Abu Talib and Dr. Qassim Nasir
  • Thumbnail for the video - click to play

    ►

    CTF Prize Giving + Closing Ceremony + Locknote
    - HitB Crew