Index of /hitbsecconf2015ams/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]D1T1 - Alfonso De Gregorio - illusoryTLS.pdf2015-05-28 12:09 13M 
[   ]D1T1 - Markus Vervier - Mobile Authentication Subspace Travel.pdf2015-05-28 17:44 1.2M 
[   ]D1T1 - R. Rodriguez P. Vila - Relay Attacks in EMV Contactless Cards with Android OTS Devices.pdf2015-05-28 15:11 3.0M 
[   ]D1T1 - Saumil Shah - Stegosploit - Hacking with Pictures.pdf2015-05-28 18:33 17M 
[   ]D1T1 - T. Yunusov K. Nesterov - Bootkit via SMS.pdf2015-05-28 12:46 11M 
[   ]D1T1 - Xeno Kovah and Corey Kallenberg - How Many Million BIOSes Would You Like to Infect.pdf2015-05-28 16:37 21M 
[   ]D1T2 - Alexey Tiurin - Oracle Peoplesoft Applications are Under Attack.pdf2015-05-28 16:49 2.2M 
[   ]D1T2 - Andrea Barisani - Forging the USB Armory.pdf2015-05-28 12:46 9.3M 
[   ]D1T2 - Anestis Bechtsoudis - Fuzzing Objects d’ ART.pdf2015-05-28 16:25 9.4M 
[   ]D1T2 - Bas Venis - Exploiting Browsers the Logical Way.pdf2015-05-28 17:44 2.4M 
[   ]D1T2 - Pedram Hayati - Uncovering Secret Connections Amongst Attackers.pdf2015-05-28 12:54 5.6M 
[   ]D1T2 - Tony Trummer and Tushar Dalvi - Mobile SSL Failures.pdf2015-05-28 18:33 6.3M 
[   ]D1T3 LAB - Breaking Bad Crypto.zip2015-05-28 18:30 38K 
[   ]D1T3 LAB - Dider Stevens and Xavier Mertens - Memory Forensics for Cisco iOS.pdf2015-05-28 15:55 445K 
[   ]D1T3 LAB - Tony Trummer - Attacking Android Apps.pdf2015-05-28 12:46 6.2M 
[   ]D2T1 - Joaquim Espinhara and Rafael Silva - MIMOSAWRITERROUTER - Abusing EPC on Cisco Routers.pdf2015-05-29 16:41 3.1M 
[   ]D2T1 - Jose Guasch - Remotely Owning Secure Parking Systems.pdf2015-05-29 15:57 17M 
[   ]D2T1 - Luca De Fulgentis - The Windows Phone Freakshow.pdf2015-05-29 12:49 4.5M 
[   ]D2T1 - Marina Krotofil and Jason Larsen - Hacking Chemical Processes.pdf2015-05-29 17:34 28M 
[   ]D2T1 - Matias Eissler - Eight Ou Two Mobile.pdf2015-05-29 11:52 9.0M 
[   ]D2T2 - Ajin Abraham - Hacking Tizen - The OS of Everything.pdf2015-05-29 17:27 7.6M 
[   ]D2T2 - Alfonso Munoz and Sergio de los Santos - Opcodes in Google Play.pdf2015-05-29 16:31 11M 
[   ]D2T2 - Filippo Valsorda and George Tankersly - Non-Hidden Hidden Services Considered Harmful.pdf2015-05-29 11:52 1.0M 
[   ]D2T2 - JB Bedrune, A. Gazet, F. Monjalet - Reversing Proprietary SCADA Tech.pdf2015-05-29 15:23 4.4M 
[   ]D2T2 - Julien Vehent - Mozilla InvestiGator.pdf2015-05-29 16:41 8.3M 
[   ]D2T3 LAB - A. Quint, F. Lone-Sang and G. Dedrie - IRMA Framework.pdf2015-05-29 16:05 2.0M 
[   ]D2T3 LAB - Nikhil Mittal - Powershell for Pentesters.zip2015-05-29 12:49 429K 
[   ]KEYNOTE 1 - Marcia Hoffmann - Fighting for Internet Security in the New Crypto Wars.pdf2015-05-28 11:22 7.6M 
[   ]KEYNOTE 2 - John Matherly - The Return of Dragons.pdf2015-05-29 10:02 6.3M 
[   ]KEYNOTE CLOSING - Runa Sandvik - Bringing Security and Privacy to Where the Wild Things Are.pdf2015-05-29 18:48 6.9M 
[DIR]Whitepapers/2015-06-11 21:09 -  

Apache/2.4.7 (Ubuntu) Server at conference.hitb.org Port 80