Index of /hitbsecconf2010kul/materials
Name
Last modified
Size
Description
Parent Directory
-
D2T2 - Long Le and Thanh Nguyen - Payload Already Inside.pdf
2017-10-14 22:02
307K
D1T1 - Marco Slaviero - Cache on Delivery.pdf
2017-10-14 22:02
16M
D2T2 - Don Bailey - Micro Control.pdf
2017-10-14 22:02
837K
D1T2 - Laurent Oudot - Analyzing Massive Web Attacks.pdf
2017-10-14 22:02
4.0M
D2T1 - Cedric Halbronn and Jean Sigwald - iPhone Security Model.pdf
2017-10-14 22:02
793K
D1T2 - Shreeraj Shah - Hacking a Browsers DOM.pdf
2017-10-14 22:02
750K
D2T2 - Claudio Criscione - Virtually Pwned Pentesting VMWare.pdf
2017-10-14 22:02
2.8M
D1T1 - Meder Kydyraliev - Milking a Horse.pdf
2017-10-14 22:02
23M
D1-SIGINT - Mahmud AB Rahman - LibTAPAU.pdf
2017-10-14 22:02
2.1M
D2T1 - Dennis Brown - Botnet Command and Control with Tor.pdf
2017-10-14 22:02
337K
D2T1 - Paul Thierault - Can You Trust Your Workers.pdf
2017-10-14 22:02
869K
D2T2 - Mitja Kolsek - Remote Binary Planting.pdf
2017-10-14 22:02
8.2M
D2T2 - Saumil Shah - Exploit Delivery.pdf
2017-10-14 22:02
26M
D1T2 - Sebastian Ziegler - Smartphones, Applications and Security.pdf
2017-10-14 22:02
19M
KEYNOTE 1 - Chris Wysopal - Perpetual Insecurity Machine.zip
2017-10-14 22:02
23M
D2-SIGINT - Tan Kean Siong - Dionaea.pdf
2017-10-14 22:02
385K
D2T1 - Jean Baptise Bedrune - Cracking DRM.pdf
2017-10-14 22:02
7.9M
D2T1 - The Grugq - Attacking GSM Basestations.pdf
2017-10-14 22:02
1.5M
D1T2 - Mary Yeoh - Fuzzing the RTL.pdf
2017-10-14 22:02
3.4M
D1T1 - Jonathan Brossard - Breaking Virtualization by Any Means.pdf
2017-10-14 22:02
646K
D1T1 - Fabian Mihailowitsch - Detecting Hardware Keyloggers.pdf
2017-10-14 22:02
1.2M
KEYNOTE 2 - Paul Vixie - Taking Back The DNS.pdf
2017-10-14 22:02
123K
D1T2 - Luis Corrons - Lessons Learned from Mariposa.pdf
2017-10-14 22:02
19M
D1T1 - Alexander Polyakov - Attacking SAP Users with sapsploit.pdf
2017-10-14 22:02
1.7M