Index of /hitbsecconf2008kl/materials

[ICO]NameLast modifiedSizeDescription

[DIR]Parent Directory  -  
[   ]D1T1 - Amitpal Dhillon - Addressing Identity Management.pdf19-Jun-2014 23:42 3.7M 
[   ]D1T1 - Dino Dai Zovi - Mac OS Xploitation.pdf19-Jun-2014 23:42 623K 
[   ]D1T1 - Ero Carrera - Analysis and Visualization of Common Packers.pdf19-Jun-2014 23:41 3.7M 
[   ]D1T1 - Hernan Ochoa - Pass-The-Hash Toolkit for Windows.pdf19-Jun-2014 23:42 535K 
[   ]D1T1 - Jim Geovedi - Hacking a Bird in the Sky 2.0.pdf19-Jun-2014 23:41 3.1M 
[   ]D1T1 - Julian Ho - Moocherhunter.pdf19-Jun-2014 23:42 124K 
[   ]D1T1 - Peter Silberman - Full Process Reconstitution from Memory.pdf19-Jun-2014 23:41 144K 
[   ]D1T2 - Alexander Tereshkin - Bluepilling the Xen Hypervisor.pdf19-Jun-2014 23:42 8.3M 
[   ]D1T2 - Alexander Tereshkin - Xen Hypervisor Demos.zip19-Jun-2014 23:41 142M 
[   ]D1T2 - Eric Lawrence - IE 8 - Engineering a Trustworthy Browser.pdf19-Jun-2014 23:41 13M 
[   ]D1T2 - Jonathan Squire - A Fox in the Hen House.pdf19-Jun-2014 23:41 3.5M 
[   ]D1T2 - Paul Craig - Hacking Internet Kiosks.pdf19-Jun-2014 23:42 1.2M 
[   ]D1T2 - Roberto Preatoni - Time for a Free Hardware Foundation.pdf19-Jun-2014 23:41 11M 
[   ]D1T2 - Saumil Shah - Browser Exploits - A New Model for Browser Security.pdf19-Jun-2014 23:42 2.1M 
[   ]D1T2 - The Grugq - How the Leopard Hides His Spots.pdf19-Jun-2014 23:42 128K 
[   ]D1T3 - Advanced Lock Picking Lab - NO SLIDES.pdf19-Jun-2014 23:42 0  
[   ]D1T3 - Mel Mudin and CS Lee - Advanced Network Forensics Lab.zip19-Jun-2014 23:41 29M 
[   ]D2T1 - Charlie Miller - iPwning the iPhone.pdf19-Jun-2014 23:42 9.8M 
[   ]D2T1 - Charl van Der Walt - Pushing the Camel Through the Eye of a Needle.pdf19-Jun-2014 23:42 23M 
[   ]D2T1 - Ilfak Guilfanov - Decompilers and Beyond.pdf19-Jun-2014 23:42 418K 
[   ]D2T1 - Kris Kaspersky - Remote Code Execution Through Intel CPU Bugs.pdf19-Jun-2014 23:41 1.3M 
[   ]D2T1 - Petko D Petkov - Client Side Security.pdf19-Jun-2014 23:42 1.0M 
[   ]D2T2 - AR Samhuri - Next Generation Reverse Shell.pdf19-Jun-2014 23:42 7.7M 
[   ]D2T2 - Adrian Pastor - Cracking into Embedded Devices and Beyond.pdf19-Jun-2014 23:42 889K 
[   ]D2T2 - Mary Yeoh - Security Penetration Testing at RTL Level.pdf19-Jun-2014 23:42 4.4M 
[   ]D2T2 - Matthew Geiger - How to Build Your Own Password Cracker and Disassembler.pdf19-Jun-2014 23:42 471K 
[   ]D2T2 - Shreeraj Shah - Top 10 Web 2.0 Attacks.pdf19-Jun-2014 23:41 1.1M 
[   ]D2T3 - Advanced Wireless Lab.zip19-Jun-2014 23:42 1.2G 
[   ]D2T3 - Ching Tim Meng - Detecting and Removing Malware without Antivirus Software.pdf19-Jun-2014 23:42 321K 
[   ]KEYNOTE 1 - Jeremiah Grossman - The Art of Click-Jacking.pdf19-Jun-2014 23:42 2.5M 
[   ]KEYNOTE 2 - Marcus Ranum - Cyberwar is Bullshit.pdf19-Jun-2014 23:41 54K 
[   ]KEYNOTE 3 + 4 - The Pirate Bay - Dissolving a Billion Dollar Industry as a Hobby.zip19-Jun-2014 23:42 38M 
[   ]SPECIAL - HITB Charity Auction Movie.m4v19-Jun-2014 23:41 63M 
[   ]SPECIAL - HITB Live Set by DJ Negative.zip19-Jun-2014 23:41 273M 

Apache/2.2.22 (Ubuntu) Server at conference.hitb.org Port 80