• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • HITB2021UAE
  • HITB2020UAE
  • HITB2019AUH
  • HITB2018DXB
Edition logo

Hack In The Box - UAE HITB2020UAE

2020-11-18 - 2020-11-19
  • Video will not be published
    Welcome To Cyberweek
    - Dhillon 'L33tdawg' Kannabhiran
  • Thumbnail for the video - click to play

    ►

    Ask Bruce
    - Bruce Schneier
  • Video will not be published
    Workshop: Penetration Testing Of ECU (Red Team Version)
    - Arun Mane
  • Thumbnail for the video - click to play

    ►

    Understanding Exploitation Techniques And Attacks On Hosting Assets And Access For Resale
    - Vladimir Kropotov and Fyodor Yarochkin
  • Thumbnail for the video - click to play

    ►

    Android RAT Detection With A Machine Learning-Based Python IDS
    - Sebastian Garcia and Kamila Babayeva
  • Thumbnail for the video - click to play

    ►

    Hacking The 0day Marketplace
    - Andrea Zapparoli Manzoni
  • Thumbnail for the video - click to play

    ►

    The Work of Cyber in the Age of Mechanical Reproduction
    - Juan Andres Guerrero-Saade
  • Thumbnail for the video - click to play

    ►

    Data Breaches Related To Critical Infrastructure: An In-Depth Analysis Of Cyber Risk To The Critical Infrastructure Of The United States Of America
    - Mars Cheng,YenTing Lee and Max Farrell
  • Thumbnail for the video - click to play

    ►

    Constructing An OS X Cyber Range For Red & Blue Teams
    - Yi-Hsien Chen and Yen-Ta Lin
  • Thumbnail for the video - click to play

    ►

    Your First Hardware Device and Firmware: Adventures in Building a CAN Bus Sniffer
    - Andrey Voloshin,Sasha Olenyev and Illia Tolokonnikov
  • Thumbnail for the video - click to play

    ►

    The Continuous Journey For Manufacturers To Develop Cyber Resilient IoT Devices
    - Chen and Ku-Chieh
  • Thumbnail for the video - click to play

    ►

    Panel: Pre-empting Attacks - Relevance Of Red Teaming In Enterprises
    - Emmanuel Gadaix,Erdal Ozkaya,Kiran Kumar P G,Bryson Bort and Anant Shrivastava
  • Thumbnail for the video - click to play

    ►

    Anatomy Of Automated Account Takeovers
    - Tal Eliyahu
  • Thumbnail for the video - click to play

    ►

    Kernel Exploitation With A File System Fuzzer
    - SeungPyo Hong,HeoungJin Jo,Dong Hee Kim and WonYoung Jung
  • Thumbnail for the video - click to play

    ►

    Bit Leaker: Subverting Bit Locker With One Vulnerability
    - Seunghun Han
  • Thumbnail for the video - click to play

    ►

    Hunting The Hunters: Detection and Efficiency Testing of Endpoint Security Sensors
    - Filipi Pires
  • Thumbnail for the video - click to play

    ►

    Writing Bare-Metal ARM Shellcode
    - Munawwar Hussain Shelia
  • Thumbnail for the video - click to play

    ►

    Zero Trust Networks: Opportunities And Challenges For Red Team Ops
    - Dan Levy
  • Thumbnail for the video - click to play

    ►

    How To Train Your Self-Driving (Dragon) Car
    - Dhillon 'l33tdawg' Kannabhiran and Jonathan Tse
  • Thumbnail for the video - click to play

    ►

    The Art of Exploiting Logical Flaws in Web Applications
    - SaifAllah BenMassaoud
  • Thumbnail for the video - click to play

    ►

    Evolution Of Offensive Security: It Was Always About Providing Business Value
    - Jorge Orchilles and Bryson Bort
  • Thumbnail for the video - click to play

    ►

    A Practical Introduction to BLE Security Without Any Special Hardware
    - Slawomir Jasek
  • Thumbnail for the video - click to play

    ►

    Attacking Storage Services: The Lynchpin Of Cloud Services
    - Anant Shrivastava
  • Thumbnail for the video - click to play

    ►

    Privilege Escalation In Da House
    - Carlos Polop Martin
  • Video will not be published
    Applied Defense On Docker And Kubernetes (Cancelled)
    - Sol Ozzan
  • Thumbnail for the video - click to play

    ►

    Qiling Framework with IDA Pro
    - Kai Jern Lau,Wu ChenXu and Kong ZiQiao
  • Thumbnail for the video - click to play

    ►

    Signal Processing With GNURadio And SDRs
    - Ateet Kumar
  • Thumbnail for the video - click to play

    ►

    The War for Control of DNS Encryption
    - Paul Vixie
  • Thumbnail for the video - click to play

    ►

    Threat Hunting With Elastic Security
    - Aravind Putrevu and Haran Kumar
  • Thumbnail for the video - click to play

    ►

    Trust, But Verify: Maintaining Democracy In Spite Of Информационные Контрмеры
    - Allie Mellen
  • Thumbnail for the video - click to play

    ►

    RAMN: Resistant Automotive Minimal Network
    - Camille Gay,Tsuyoshi Toyama and Hisashi Oguma
  • Thumbnail for the video - click to play

    ►

    Develop Your Enterprise Security Strategy Leveraging On Zero Trust Approach
    - Aloysius Cheang
  • Thumbnail for the video - click to play

    ►

    Machine Learning Security Evasion Competition 2020
    - Zoltan Balazs and Hyrum Anderson
  • Thumbnail for the video - click to play

    ►

    Visibility In The Clouds: Introducing A New Open Source Tool For Cloud Security
    - Ilia Rabinovich and Oleg Lerner
  • Thumbnail for the video - click to play

    ►

    Jailbreaks Never Die: Exploiting iOS 13.7
    - @08Tc3wBB
  • Thumbnail for the video - click to play

    ►

    Industrial Protocol Gateways: A Deep-Dive Of Moxa MGate 5105-MB-EIP
    - Philippe Lin
  • Thumbnail for the video - click to play

    ►

    Blue Team Visibility
    - Ibrahim Mohammed Alshmranie
  • Thumbnail for the video - click to play

    ►

    So You Have A Blacklist: Optimizing The Protection Of IoT Devices By A Scored-Prioritized Aging BlackList Of Attackers
    - Thomas O’Hara,Maria Jose Erquiaga and Sebastian Garcia
  • Video will not be published
    Offensive Embedded Exploitation: Getting Hands Dirty With Hardware Hacking And Firmware Analysis
    - kaustubh Padwad and Arun Mane
  • Thumbnail for the video - click to play

    ►

    AEZAKMI: Browser Anonymity & Fingerprinting Bypass
    - Timur Nasirov
  • Thumbnail for the video - click to play

    ►

    The Road Towards 365 Bugs In Microsoft Office 365
    - Ashar Javed
  • Thumbnail for the video - click to play

    ►

    Inside The Mind Of A Threat Actor: Beyond Pentesting
    - Philip Wylie
  • Thumbnail for the video - click to play

    ►

    Spoofing Your Location On IOS Without Jailbreaking
    - Kelvin Wong
  • Thumbnail for the video - click to play

    ►

    Red Team Vs. Blue Team Exercises For ICS/SCADA Security
    - Mars Cheng
  • Thumbnail for the video - click to play

    ►

    Payload Delivery For Initial Access In Red Team Engagement And Adversary Simulation
    - Jean Marie Bourbon
  • Thumbnail for the video - click to play

    ►

    CI/CD With SAST And DAST For Embedded Devices
    - Andrey Voloshin,Sasha Olenyev and Illia Tolokonnikov
  • Thumbnail for the video - click to play

    ►

    Trustworthy Shield – A Cheap TPM Module For Older Systems
    - Heyi Wu
  • Thumbnail for the video - click to play

    ►

    Fuzzing: Finding Your Own Bugs And 0days!
    - Rodolpho Concurde
  • Thumbnail for the video - click to play

    ►

    Old Still Cool: Classic SE Formats Merge For High Complex Context In Three Peculiar Tales
    - Daniel Isler
  • Thumbnail for the video - click to play

    ►

    Hands-On Purple Team Exercises
    - Jorge Orchilles
  • Video will not be published
    Analysing Malicious Word And Excel Documents
    - Josh Stroschein
  • Thumbnail for the video - click to play

    ►

    Hands-on Introduction to Timeless Debugging & Analysis
    - Mathieu Favreaux