Index of /hitbsecconf2011kul/materials

[ICO]NameLast modifiedSizeDescription

[DIR]Parent Directory  -  
[   ]D1 LABS - VoIP Attacking CUCM.pdf19-Jun-2014 23:44 2.7M 
[   ]D1 SIGINT - Adnan Mohd Shukor - Fun With Javascript DeObfuscation.pdf19-Jun-2014 23:44 4.0M 
[   ]D1 SIGINT - Jurre van Bergen and Youri van der Zwart - Abusing RFID.pdf19-Jun-2014 23:44 772K 
[   ]D1 SIGINT - Muhammad Najmi Ahmad Zabidi - Compiling Features for Malcious Binaries.pdf19-Jun-2014 23:44 410K 
[   ]D1T1 - Alex Kirk - Mobile Malware Analysis.pdf19-Jun-2014 23:44 1.8M 
[   ]D1T1 - Andrea Barisani and Daniele Bianco - EMV Protocol and POS Physical Analysis.pdf19-Jun-2014 23:44 2.0M 
[   ]D1T1 - Jonathan Brossard - Post Memory Corruption Analysis.pdf19-Jun-2014 23:44 278K 
[   ]D1T1 - Mahmud Ab Rahman - Reverse Engineering Android Malware.pdf19-Jun-2014 23:44 9.2M 
[   ]D1T1 - Marco Balduzzi - Attacking the Privacy of Social Network Users.pdf19-Jun-2014 23:44 6.3M 
[   ]D1T1 - Riley Hassell - Exploiting Androids for Fun and Profit.pdf19-Jun-2014 23:44 8.9M 
[   ]D1T2 - Alexander Polyakov and Dimitry Chastuhin - SAPocalypse Now.pdf19-Jun-2014 23:44 15M 
[   ]D1T2 - Don Bailey - GoodFUN - The GoodFET.pdf19-Jun-2014 23:44 968K 
[   ]D1T2 - Jim Geovedi - Satellite Telephony Security.pdf19-Jun-2014 23:44 5.4M 
[   ]D1T2 - Laurent Weber - All your Base Stations Are Belong To Us.pdf19-Jun-2014 23:44 313K 
[   ]D1T2 - The Grugq - Smashing the Slack for Fun and Profit.pdf19-Jun-2014 23:44 14M 
[   ]D1T2 - biatch0 and RuFI0 - Pwning a 4G Device for the LuLz.pdf19-Jun-2014 23:44 3.5M 
[   ]D1T3 - Barry van Kampen - DIY Video Surveillance.pdf19-Jun-2014 23:44 894K 
[   ]D1T3 - Jimmy Shah - Mobile App Moolah.pdf19-Jun-2014 23:44 1.6M 
[   ]D2 LABS - Daniel Mende and Jim Geovedi - Practical 3G-4G Attacks.pdf19-Jun-2014 23:44 2.2M 
[   ]D2 SIGINT - Keith Lee - iPhone Espionage.pdf19-Jun-2014 23:44 4.9M 
[   ]D2 SIGINT - Nur Muhammed Kamil - MyKotakPasir.pdf19-Jun-2014 23:44 1.1M 
[   ]D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities.zip19-Jun-2014 23:44 48M 
[   ]D2T1 - Hendrik Scholz - Air Travel Hacking.pdf19-Jun-2014 23:44 5.5M 
[   ]D2T1 - Marc Blanchou and Mathew Solnik - Blackbox Android.pdf19-Jun-2014 23:44 3.6M 
[   ]D2T1 - Ravi B Kevin R and Nico G - Femtocells.pdf19-Jun-2014 23:44 5.9M 
[   ]D2T1 - Stefan Esser - iPhone Exploitation - One ROPe to Bind Them All.pdf19-Jun-2014 23:44 8.2M 
[   ]D2T2 - KaiJern Lau - Malware Sandboxing the Xandora Way.pdf19-Jun-2014 23:44 15M 
[   ]D2T2 - Paul Sebastian Ziegler - Stenographic AVI FIlesystems.pdf19-Jun-2014 23:44 2.9M 
[   ]D2T2 - Philippe Langlois - Attacking the GPRS Roaming Exchange.pdf19-Jun-2014 23:44 13M 
[   ]D2T2 - Saumil Shah - NO SLIDES.pdf19-Jun-2014 23:44 0  
[   ]D2T2 - Travis Goodspeed - Remotely Exploiting Layer One.pdf19-Jun-2014 23:44 311K 
[SND]HITB2011KUL - Post Conference Party Mix by Jim Geovedi.mp319-Jun-2014 23:44 183M 
[SND]HITB2011KUL - Post Conference Party Mix by Joernchen.mp319-Jun-2014 23:44 128M 
[   ]HackWEEKDAY - Arzumy.pdf19-Jun-2014 23:44 244K 
[   ]HackWEEKDAY - sniffit.pdf19-Jun-2014 23:44 1.3M 
[   ]KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.pdf19-Jun-2014 23:44 1.5M 
[   ]KEYNOTE 2 - Jennifer Granick - NO SLIDES.pdf19-Jun-2014 23:44 0  
[   ]KEYNOTE CLOSING - Richard Thieme - NO SLIDES.pdf19-Jun-2014 23:44 0  

Apache/2.2.22 (Ubuntu) Server at conference.hitb.org Port 80