Index of /files/hitbsecconf2022sin/materials
Name
Last modified
Size
Description
Parent Directory
-
KEYNOTE 1 - A Random Walk through a Few Million Things - Chris Rouland.pdf
2022-08-26 04:09
12M
D1 COMMSEC - Building an Army of Bots by Hijacking a Unicorn’s Twitter Handle - Rahul Sasi & Vishal Singh.pdf
2022-08-26 01:45
10M
D2 COMMESC - Biometrics System Hacking in the Age of the Smart Vehicle - Kevin Chen & Li Siwei.pdf
2022-08-26 04:36
7.8M
D1 COMMSEC - API Security Through External Attack Surface Management - Phillip Wylie.pdf
2022-08-25 09:00
7.7M
D2 COMMSEC - Cracking Kyocera Printers - Yue Liu, Minghang Shen & Juyang Gao.pdf
2022-08-26 03:44
6.1M
D1 COMMSEC - ICEFALL – Revisiting a Decade of OT Insecure-by-Design Practices - Jos Wetzels.pdf
2022-08-25 08:53
6.0M
D1T1 - Erybody Gettin TIPC - Demystifying Remote Linux Kernel Exploitation - Sam Page.pdf
2022-08-25 08:53
5.6M
D1T1 - One-Click to Completely Takeover a MacOS Device - Mickey Jin.pdf
2022-08-26 01:36
4.6M
D2T1 - The Ransomware Protection Full Of Holes - Soya Aoyama.pdf
2022-08-26 09:24
4.3M
KEYNOTE 2 - Adventures in Security Research - Runa Sandvik.pdf
2022-08-26 03:06
3.9M
D2 COMMSEC - Exploiting Race Condition Vulnerabilities in Web Applications - Javan Rasokat.pdf
2022-08-27 03:45
3.8M
D1T1 - Breaking Web3 - Exploitation Techniques for Cryptocurrency Hacking - David Pethes.pdf
2022-08-26 01:47
3.6M
D1 COMMSEC - Faking at Level 1 - How Digital Twins Save Your PLCs - Thomas Weber.pdf
2022-08-26 01:37
3.5M
D2T1 - Scripts-behavioral ML Classification Using Windows 10 AMSI-instrumentation - Ankit Garg.pdf
2022-08-26 09:19
3.0M
D2 COMMSEC - Getting Clear Text Passwords from an IdP & More - Our Research Methodology - Gal Diskin.pdf
2022-08-26 09:16
2.9M
D2T1 - Suborner - Windows Bribery for Invisible Persistence - Sebastian Castro.pdf
2022-08-27 03:45
2.3M
D1T1 - EDR Evasion Primer for Red Teamers - Karsten Nohl & Jorge Gimenez.pdf
2022-08-29 08:30
2.3M
D2T1 - Unlocking KeeLoq -A Reverse Engineering Story - Rogan Dawes.pdf
2022-08-26 03:40
2.3M
D1T1 - Settlers of Netlink - Exploiting a Limited UAF on Ubuntu 22.04 to Achieve LPE - Aaron Adams.pdf
2022-08-25 08:53
2.1M
D2 COMMSEC - Best Practices For Simulating Execution in Malicious Text Detection - Shuo Wang & Yi Sun.pdf
2022-08-26 03:30
1.9M
D2 COMMSEC - Web3 + Scams = It’s a Match - Zoltan Balazs.pdf
2022-08-26 05:47
1.8M
D1 COMMSEC - Fuzzing the MCU of Connected Vehicles for Security and Safety - Hao Chen.pdf
2022-08-25 08:53
1.0M
D1T1 - Attacking WPA3 - New Vulnerabilities and Exploit Framework - Mathy Vanhoef.pdf
2022-08-25 08:53
1.0M
D2T1 - Browser Hacking with ANGLE - Jeonghoon Shin.pdf
2022-08-26 09:21
927K
D1 COMMSEC - MPT - Pentest In Action - Jyoti Raval.pdf
2022-08-25 08:53
656K
D2 COMMSEC - Can a Fuzzer Match a Human - Bhargava Shastry.pdf
2022-08-26 09:15
450K
Apache/2.4.54 (Ubuntu) Server at conference.hitb.org Port 443