Index of /hitbsecconf2012ams/materials

[ICO]NameLast modifiedSizeDescription

[DIR]Parent Directory  -  
[   ]CLOSING KEYNOTE - Ms Jaya Baloo - Identity Privacy and Security.pdf20-Jan-2014 05:15 1.9M 
[   ]D1 SIGINT - Marinus Kuivenhoven - Hack to the Future.pdf20-Jan-2014 05:15 1.2M 
[   ]D1 SIGINT - Ralf- Philip Weinmann - NO SLIDES.pdf20-Jan-2014 05:15 0  
[   ]D1 SIGINT - Xavier Mertens - Pastebinmon and Leakedin.pdf20-Jan-2014 05:15 308K 
[   ]D1T1 - Arnauld Mascret - Whistling Over The Wire.zip20-Jan-2014 05:15 41M 
[   ]D1T1 - Claudio Guarnieri - One Flew Over the Cuckoos Nest.pdf20-Jan-2014 05:15 4.5M 
[   ]D1T1 - Ivo Pooters - Turning Android Inside Out.pdf20-Jan-2014 05:15 6.4M 
[   ]D1T1 - Juan-Pablo Echtegoyen - Attacking the SAP Solution Manager.pdf20-Jan-2014 05:15 2.5M 
[   ]D1T1 - Roberto Suggi and Scott Bell - Browser Bug Hunting in 2012.pdf20-Jan-2014 05:15 3.3M 
[   ]D1T2 - Adam Gowdiak - Security Threats in Digital Sat Televisions.pdf20-Jan-2014 05:15 1.9M 
[   ]D1T2 - Adam Gowdiak - Security Vulnerabilities of DVB Chipsets.pdf20-Jan-2014 05:15 2.4M 
[   ]D1T2 - Itzhak Zuk Avraham and Nir Goldshlager - Killing a Bug Bounty Program - Twice.pdf20-Jan-2014 05:15 5.4M 
[   ]D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks.pdf20-Jan-2014 05:15 229K 
[   ]D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT.pdf20-Jan-2014 05:15 1.4M 
[   ]D1T3 - Didier Stevens - Whitehat Shellcode.zip20-Jan-2014 05:15 100M 
[   ]D1T3 - Gal Diskin - Hacking Using Dynamic Binary Instrumentation.pdf20-Jan-2014 05:15 2.9M 
[   ]D1T3 - Jurriaan Bremer - Binary Obfuscation the SSE Way.pdf20-Jan-2014 05:15 1.5M 
[   ]D2 SIGINT - Elger Jonker - Close-Up of Three Technical Hackerspace Projects.pdf20-Jan-2014 05:15 10M 
[   ]D2 SIGINT - Rory Breuk and Albert Spruyt - Integrating DMA Attacks in Metasploit.pdf20-Jan-2014 05:15 2.8M 
[   ]D2T1 - Alex Bazhanyuk and Nikita Tarakanov - Automatically Searching for Vulnerabilities.pdf20-Jan-2014 05:15 1.1M 
[   ]D2T1 - Andrei Costin - Postscript Dangers Ahead - Hacking MFPCs.pdf20-Jan-2014 05:15 1.5M 
[   ]D2T1 - Georgia Weidman - Bypassing the Android Permission Model.pdf20-Jan-2014 05:15 1.4M 
[   ]D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services.pdf20-Jan-2014 05:15 3.7M 
[   ]D2T1 - Marco Balduzzi - SatanCloud.pdf20-Jan-2014 05:15 1.5M 
[   ]D2T2 - Jailbreak Dream Team - Absinthe Jailbreak for iOS 5.0.1.pdf20-Jan-2014 05:15 5.2M 
[   ]D2T2 - Jailbreak Dream Team - Corona Jailbreak for iOS 5.0.1.pdf20-Jan-2014 05:15 7.8M 
[   ]D2T2 - Nicolas Gregoire - Attacking XML Processing.pdf20-Jan-2014 05:15 11M 
[   ]D2T2 - Rahul Sasi - CXML VXML Auditing for IVR Pentesters.zip20-Jan-2014 05:15 63M 
[   ]D2T2 - Steven Seeley - Ghost In the Windows 7 Allocator.pdf20-Jan-2014 05:15 1.3M 
[   ]D2T3 - Chema Alonso and Manu The Sur - Power of FOCA 3.pdf20-Jan-2014 05:15 18M 
[   ]D2T3 - Enno Rey Daniel Mende Pascal Turbing Matthias Luft - Smashing VMDK Files for Fun and Profit.pdf20-Jan-2014 05:15 6.1M 
[   ]D2T3 - Mario Vuksan and Tomislav Pericin - Titan Engine 3.pdf20-Jan-2014 05:15 435K 
[   ]KEYNOTE 1 - Andy Ellis - Staying Ahead of the Security Poverty Line.pdf20-Jan-2014 05:15 5.9M 
[   ]KEYNOTE 2 - Bruce Schneier - Trust, Security and Society - NO SLIDES.pdf20-Jan-2014 05:15 0  

Apache/2.2.22 (Ubuntu) Server at conference.hitb.org Port 80