• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • HITB2021UAE
  • HITB2020UAE
  • HITB2019AUH
  • HITB2018DXB
Edition logo

Hack In The Box - UAE HITB2019AUH

2019-10-13 - 2019-10-17
  • Thumbnail for the video - click to play

    ►

    AI Security: Why, What, How?
    - Alexander Polyakov
  • Thumbnail for the video - click to play

    ►

    Right The First Time: Modular PCB Design For Makers
    - Brita Meriac
  • Thumbnail for the video - click to play

    ►

    New Threats Are Already Around You, The IPV6 Attack Must Be Understood
    - Jie Fu and KunZhe Chai & YongTao Wang
  • Thumbnail for the video - click to play

    ►

    AI For Security Or Security For AI?
    - Sergey Gordeychik
  • Thumbnail for the video - click to play

    ►

    Hacking The 0day Market
    - Andrea Zapparoli Manzoni
  • Thumbnail for the video - click to play

    ►

    Discover Invisible Fileless Webshell In The APT Attack
    - Tim Yeh & Dove Chiu
  • Thumbnail for the video - click to play

    ►

    Practical Approaches For Testing And Breaking JWT Authentication
    - Mazin Ahmed
  • Thumbnail for the video - click to play

    ►

    Docker Container (In)Security
    - Suraj Khetani
  • Thumbnail for the video - click to play

    ►

    Securing Your Laptop Like You *Mean* It: Virtualization Based Security
    - Milosch Meriac
  • Thumbnail for the video - click to play

    ►

    Transferability Of Adversarial Examples To Attack Real World Porn Image Detection
    - Dou Goodman. Wang Yang and Hao Xin
  • Thumbnail for the video - click to play

    ►

    On The Wings Of Time: Demystifying Wireless Ethical Hacking And Defenses
    - Harshit Agrawal & Himanshu Mehta
  • Thumbnail for the video - click to play

    ►

    Looking Through Muddy Waters: Insight Into TTPs Of A Middle Eastern Threat Actor
    - Jaromir Horejsi
  • Thumbnail for the video - click to play

    ►

    Building A GEN2 UHF RFID Reader With SDR
    - Adam Laurie
  • Thumbnail for the video - click to play

    ►

    Call Of Duty: Modern Browser Warfare
    - Dhiraj Mishra
  • Thumbnail for the video - click to play

    ►

    Physics Of Security
    - Tomas Drab
  • Thumbnail for the video - click to play

    ►

    Hack In, Cash Out. Adventures In The World Of Transaction Fraud
    - Tim Yunosov
  • Thumbnail for the video - click to play

    ►

    Power Line Communication Security On Smart Grids
    - Fatih Kayran
  • Thumbnail for the video - click to play

    ►

    IoT Pentesting The Right Way
    - Yogesh Ojha
  • Video will not be published
    Welcome Address
    - Dhillon 'L33tdawg' Kannabhiran
  • Thumbnail for the video - click to play

    ►

    Security Is Already Here... It’s Just Not Evenly Distributed Yet
    - Chris Wysopal
  • Thumbnail for the video - click to play

    ►

    Debunking Fault Injection Myths And Misconceptions
    - Cristofaro Mune and Niek Timmers
  • Thumbnail for the video - click to play

    ►

    SOCMINT – Hunting Threats In Social Media Networks
    - Fyodor Yarochkin and Vladimir Kropotov
  • Thumbnail for the video - click to play

    ►

    Government At The Center Of A Cyber Battle
    - H.E. Mohammed Gheyath
  • Thumbnail for the video - click to play

    ►

    Are You Insured Around Cyber Crime?
    - Jake Kouns
  • Thumbnail for the video - click to play

    ►

    Fuzzing Farm Monoculture Antipatterns: Are We Finding The Same Bugs?
    - Marc Schoenefeld
  • Thumbnail for the video - click to play

    ►

    Build A Quantum Computer At Home – Hacker Style!
    - Yann Allain
  • Thumbnail for the video - click to play

    ►

    Cloud Computing's Appeal Is Cloud Security's Complexity
    - Nils Puhlmann
  • Thumbnail for the video - click to play

    ►

    Quantum Disruption
    - Jose Ignacio
  • Thumbnail for the video - click to play

    ►

    Car Hacking: Practical Guide To Automotive Security
    - Yogesh Ojha
  • Thumbnail for the video - click to play

    ►

    What Would A Quantum Computer Do To Crypto
    - Najwa Aaraj
  • Thumbnail for the video - click to play

    ►

    Quantum Panel Discussion
    - Marc Manzano,Yann Allain,Najwa Aaraj and Jose Ignacio
  • Thumbnail for the video - click to play

    ►

    DCART: Decoupled Components For Automated Ransomware Testing
    - Mark Mager
  • Thumbnail for the video - click to play

    ►

    We Hacked The Planet - Now What?
    - Katie Moussouris
  • Thumbnail for the video - click to play

    ►

    Introducing ARM-X: The ARM IoT Firmware Emulation Framework
    - Saumil Shah
  • Thumbnail for the video - click to play

    ►

    CyptoAPT: APT Attacks On Crypto Exchange Employees
    - Heungsoo Kang
  • Thumbnail for the video - click to play

    ►

    ABBE: Detecting Attacks In Ethereum Smart Contracts
    - Nguyen Quoc Bao and Nguyen Anh Quynh
  • Thumbnail for the video - click to play

    ►

    The Sum Of All Fears, When ICS/SCADA Are Compromised
    - Mars Cheng
  • Thumbnail for the video - click to play

    ►

    The Impact Of Blockchain And Cryptocurrencies On Governments Around The World
    - Gerard Dache
  • Thumbnail for the video - click to play

    ►

    EOS: Hackers New Bank
    - Vic Huang
  • Thumbnail for the video - click to play

    ►

    BCM – Secure Messaging By Hackers For Hackers
    - KunZhe Chai
  • Thumbnail for the video - click to play

    ►

    Blockchain-Security Symbiosis: Security Enabling Blockchains; Blockchains Enabling Security
    - Paul Makowski
  • Thumbnail for the video - click to play

    ►

    Reimplementing Local RPC In .Net
    - James Forshaw
  • Thumbnail for the video - click to play

    ►

    Hackers And Cyberwar: How Hacking Has Changed The Modern Battlefield
    - Marc Rogers
  • Thumbnail for the video - click to play

    ►

    Scapula: An Open-Source Toolkit For Model- Based Fuzzing And Verification Of ARM CPUs
    - Jared Wright
  • Thumbnail for the video - click to play

    ►

    The Road To Building Defendable Systems
    - Saumil Shah
  • Thumbnail for the video - click to play

    ►

    Practical LoRaWAN Auditing And Exploitation
    - Esteban Martínez Fayó,Matías Sequeira and Cesar Cerrudo
  • Thumbnail for the video - click to play

    ►

    RIDL: Rogue In Flight Data Load
    - Stephan van Schaik,Alyssa Milburn,Pietro Frigo and Sebastian Osterlund
  • Thumbnail for the video - click to play

    ►

    Advances In The Trinity Of AI: Data, Algorithms & Compute Infrastructure
    - Anima Anandkumar
  • Thumbnail for the video - click to play

    ►

    Ridiculous Radios
    - Michael Ossmann
  • Thumbnail for the video - click to play

    ►

    Reputation Systems Against Social Engineering And Manipulation In Online Environments
    - Anton Kolonin
  • Thumbnail for the video - click to play

    ►

    Open Source Security – Vulnerabilities Never Come Alone
    - Fermin J. Serna