Index of /hitbsecconf2007kl/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]D1KEYNOTE1 - Lance Spitzner - Fast Flux.pdf2014-06-19 23:41 672K 
[   ]D1KEYNOTE2 - Mikko Hypponen - Online Crime and Crime Online.pdf2014-06-19 23:41 2.4M 
[   ]D1T1 - Andrew Cushman - State of Security.pdf2014-06-19 23:41 3.6M 
[   ]D1T1 - Marc Weber Tobias - High Security Locks - Illusion or Reality.pdf2014-06-19 23:41 13M 
[   ]D1T1 - Martin Johns - Hacking the Intranet with a Webpage.pdf2014-06-19 23:41 1.9M 
[   ]D1T1 - Michael Thumann and Dror-John Roecher - Hacking Cisco NAC.pdf2014-06-19 23:41 4.3M 
[   ]D1T1 - TOOOL USA - Security - Past Present and Future.zip2014-06-19 23:41 10M 
[   ]D1T1 - The Grugq - Meta Antiforensics - The HASH Hacking Harness.pdf2014-06-19 23:41 466K 
[   ]D1T2 - Andrea Barisani and Daniele Bianco - Injecting RDS-TMC Traffic Information Signals.pdf2014-06-19 23:41 13M 
[   ]D1T2 - Frank Yuan Fan - Advanced Web Application and Database Threat Analysis with MatriXay.pdf2014-06-19 23:41 13M 
[   ]D1T2 - Raffael Marty - Insider Threat Visualization.pdf2014-06-19 23:41 9.0M 
[   ]D1T2 - Raoul Chiesa and Mayhem - Hacking SCADA - How to 0wn Critical National Infrastructure.pdf2014-06-19 23:41 8.1M 
[   ]D1T2 - Roberto Preatoni - WabiSabiLabi - The Exploit Marketplace.pdf2014-06-19 23:41 3.2M 
[   ]D1T2 - Stefano Zanero - 360° Anomaly Based Intrusion Detection.pdf2014-06-19 23:41 461K 
[   ]D2KEYNOTE1 - Mark Phiber Optik Abene - NO SLIDES.pdf2014-06-19 23:41 70K 
[   ]D2KEYNOTE2 - Emmanuel Goldstein - NO SLIDES.pdf2014-06-19 23:41 70K 
[   ]D2T1 - Alexander Kornbrust - Hacking Hardened and Secured Oracle Servers.pdf2014-06-19 23:41 961K 
[   ]D2T1 - Billy Rios - Slipping Past the Firewall.pdf2014-06-19 23:41 11M 
[   ]D2T1 - Felix Lindner - %09 Attack Surface of Modern Applications.pdf2014-06-19 23:41 677K 
[   ]D2T1 - Shreeraj Shah - Hacking Ajax and Web Services �%80%93 Next Generation Web Attacks on the Rise.pdf2014-06-19 23:41 462K 
[   ]D2T1 - Starbug - Hacking Biometric Systems.pdf2014-06-19 23:41 7.9M 
[   ]D2T1 - Window Snyder - SLIDES UNAVAILABLE.pdf2014-06-19 23:41 70K 
[   ]D2T2 - Dino Covotsos - Hacking the Bluetooth Stack for Fun Fame and Profit.pdf2014-06-19 23:41 5.0M 
[   ]D2T2 - Domingo Montanaro and Rodrigo Rubira Branco - The Computer Forensics Challenge and Anti-Forensics Techniques.pdf.pdf2014-06-19 23:41 1.5M 
[   ]D2T2 - Dr Jose Nazario - Googling for Malware and Bugs.pdf2014-06-19 23:41 654K 
[   ]D2T2 - Fetri Miftach and Jim Geovedi - Enterprise Hacking - Who Needs Exploit Codes.pdf2014-06-19 23:41 1.8M 
[   ]D2T2 - Luiz Eduardo - Protocol Fuzzing.pdf2014-06-19 23:41 4.5M 
[   ]D2T2 - Sarb Sembhi - End to End Analysis of Securing Networked CCTV Systems.pdf2014-06-19 23:41 15M 

Apache/2.4.7 (Ubuntu) Server at conference.hitb.org Port 80