Index of /hitbsecconf2011kul/materials

[ICO]NameLast modifiedSizeDescription

[DIR]Parent Directory  -  
[   ]D1 LABS - VoIP Attacking CUCM.pdf20-Jan-2014 05:12 2.7M 
[   ]D1 SIGINT - Adnan Mohd Shukor - Fun With Javascript DeObfuscation.pdf20-Jan-2014 05:12 4.0M 
[   ]D1 SIGINT - Jurre van Bergen and Youri van der Zwart - Abusing RFID.pdf20-Jan-2014 05:12 772K 
[   ]D1 SIGINT - Muhammad Najmi Ahmad Zabidi - Compiling Features for Malcious Binaries.pdf20-Jan-2014 05:12 410K 
[   ]D1T1 - Alex Kirk - Mobile Malware Analysis.pdf20-Jan-2014 05:12 1.8M 
[   ]D1T1 - Andrea Barisani and Daniele Bianco - EMV Protocol and POS Physical Analysis.pdf20-Jan-2014 05:12 2.0M 
[   ]D1T1 - Jonathan Brossard - Post Memory Corruption Analysis.pdf20-Jan-2014 05:12 278K 
[   ]D1T1 - Mahmud Ab Rahman - Reverse Engineering Android Malware.pdf20-Jan-2014 05:12 9.2M 
[   ]D1T1 - Marco Balduzzi - Attacking the Privacy of Social Network Users.pdf20-Jan-2014 05:12 6.3M 
[   ]D1T1 - Riley Hassell - Exploiting Androids for Fun and Profit.pdf20-Jan-2014 05:12 8.9M 
[   ]D1T2 - Alexander Polyakov and Dimitry Chastuhin - SAPocalypse Now.pdf20-Jan-2014 05:12 15M 
[   ]D1T2 - Don Bailey - GoodFUN - The GoodFET.pdf20-Jan-2014 05:12 968K 
[   ]D1T2 - Jim Geovedi - Satellite Telephony Security.pdf20-Jan-2014 05:12 5.4M 
[   ]D1T2 - Laurent Weber - All your Base Stations Are Belong To Us.pdf20-Jan-2014 05:12 313K 
[   ]D1T2 - The Grugq - Smashing the Slack for Fun and Profit.pdf20-Jan-2014 05:12 14M 
[   ]D1T2 - biatch0 and RuFI0 - Pwning a 4G Device for the LuLz.pdf20-Jan-2014 05:12 3.5M 
[   ]D1T3 - Barry van Kampen - DIY Video Surveillance.pdf20-Jan-2014 05:12 894K 
[   ]D1T3 - Jimmy Shah - Mobile App Moolah.pdf20-Jan-2014 05:12 1.6M 
[   ]D2 LABS - Daniel Mende and Jim Geovedi - Practical 3G-4G Attacks.pdf20-Jan-2014 05:12 2.2M 
[   ]D2 SIGINT - Keith Lee - iPhone Espionage.pdf20-Jan-2014 05:12 4.9M 
[   ]D2 SIGINT - Nur Muhammed Kamil - MyKotakPasir.pdf20-Jan-2014 05:12 1.1M 
[   ]D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities.zip20-Jan-2014 05:12 48M 
[   ]D2T1 - Hendrik Scholz - Air Travel Hacking.pdf20-Jan-2014 05:12 5.5M 
[   ]D2T1 - Marc Blanchou and Mathew Solnik - Blackbox Android.pdf20-Jan-2014 05:12 3.6M 
[   ]D2T1 - Ravi B Kevin R and Nico G - Femtocells.pdf20-Jan-2014 05:12 5.9M 
[   ]D2T1 - Stefan Esser - iPhone Exploitation - One ROPe to Bind Them All.pdf20-Jan-2014 05:12 8.2M 
[   ]D2T2 - KaiJern Lau - Malware Sandboxing the Xandora Way.pdf20-Jan-2014 05:12 15M 
[   ]D2T2 - Paul Sebastian Ziegler - Stenographic AVI FIlesystems.pdf20-Jan-2014 05:12 2.9M 
[   ]D2T2 - Philippe Langlois - Attacking the GPRS Roaming Exchange.pdf20-Jan-2014 05:12 13M 
[   ]D2T2 - Saumil Shah - NO SLIDES.pdf20-Jan-2014 05:12 0  
[   ]D2T2 - Travis Goodspeed - Remotely Exploiting Layer One.pdf20-Jan-2014 05:12 311K 
[SND]HITB2011KUL - Post Conference Party Mix by Jim Geovedi.mp320-Jan-2014 05:12 183M 
[SND]HITB2011KUL - Post Conference Party Mix by Joernchen.mp320-Jan-2014 05:13 128M 
[   ]HackWEEKDAY - Arzumy.pdf20-Jan-2014 05:13 244K 
[   ]HackWEEKDAY - sniffit.pdf20-Jan-2014 05:12 1.3M 
[   ]KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.pdf20-Jan-2014 05:13 1.5M 
[   ]KEYNOTE 2 - Jennifer Granick - NO SLIDES.pdf20-Jan-2014 05:12 0  
[   ]KEYNOTE CLOSING - Richard Thieme - NO SLIDES.pdf20-Jan-2014 05:12 0  

Apache/2.2.22 (Ubuntu) Server at conference.hitb.org Port 80