Index of /hitbsecconf2013ams/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]D2T3 - Evan Booth - Terminal Cornucopia.pdf2014-06-19 23:45 176M 
[   ]D1 KEYNOTE - Edward Schwartz - Embracing the Uncertainty of Advanced Attacks with Big Data Analytics.pdf2014-06-19 23:45 51M 
[   ]D2T1 - Peter Geissler and Steven Ketelaar - How I Met Your Modem.pdf2014-06-19 23:45 19M 
[   ]D1T1 - Petko D Petkov - Defeating the Intercepting Web Proxy – A Glimpse Into the Next Generation of Web Security Tools.pdf2014-06-19 23:45 17M 
[   ]CLOSING KEYNOTE - Winn Schwartau - The History of the Future of InfoSec.pdf2014-06-19 23:45 15M 
[   ]D2T2 - Dan Tentler - The Shodan Computer Search Engine.pdf2014-06-19 23:45 13M 
[   ]D2T2 - Chilik Tamir - iAnalyzer - No More Blackbox iOS Analysis.pdf2014-06-19 23:45 12M 
[   ]D2T1 - Pod2g, Planetbeing, Musclenerd and Pimskeks aka Evad3rs - Swiping Through Modern Security Features.pdf2014-06-19 23:45 8.2M 
[   ]D1T2 - Philippe Langlois - Hacking HLR HSS and MME Core Network Elements.pdf2014-06-19 23:45 6.4M 
[   ]D2T2 - Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.pdf2014-06-19 23:45 5.1M 
[   ]D1LAB - Vladimir Kropotov and Sergey Soldatov - Defending the Enterprise the Russian Way.pdf2014-06-19 23:45 4.6M 
[   ]D1T1 - Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.pdf2014-06-19 23:45 4.5M 
[   ]D1T1 - Sergey Bratus and Julian Bangert - Better Security Through Creative x86 Trapping.pdf2014-06-19 23:45 4.1M 
[   ]D2LAB - Jim Manico - Secure Coding - Web and Mobile.pdf2014-06-19 23:45 3.8M 
[   ]D2T2 - Ofer Shezaf - The Infosec Risks of Charging Electric Cars.pdf2014-06-19 23:45 3.4M 
[   ]D1T2 - Nicolas Seriot - Abusing Twitters API and OAuth Implementation.pdf2014-06-19 23:45 3.0M 
[   ]D1T1 - Hugo Teso - Aircraft Hacking - Practical Aero Series.pdf2014-06-19 23:45 2.9M 
[   ]D1T1 - Vladimir Vorontsov and Alexander Golovko - SSRF PWNs - New Techniques and Stories.pdf2014-06-19 23:45 2.5M 
[   ]D2T2 - A Petukhov G Noseevich and D Gamayunov - Breaking Through Certified Crypto in Banking Apps.pdf2014-06-19 23:45 2.2M 
[   ]D1T2 - Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel.zip2014-06-19 23:45 2.1M 
[   ]D2T1 - Sebastien Kaczmarek - Dreamboot UEFI Bootkit.pdf2014-06-19 23:45 2.0M 
[   ]D1T2 - Tal Zeltzer - Analysis to Remote Root 0day in an Industry Leading SSL-VPN Appliance.pdf2014-06-19 23:45 1.9M 
[   ]D2T1 - Sergey Shekyan and Artem Harutyunyan - Turning Your Surveillance Camera Against You.pdf2014-06-19 23:45 1.7M 
[   ]D1T2 - Daniel Mende - Paparazzi Over IP.pdf2014-06-19 23:45 1.6M 
[   ]D1T1 - Peleus Uhley and Karthik Raman - Security Response in the Age of Mass Customized Attacks.pdf2014-06-19 23:45 1.4M 
[   ]D1T2 - Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.pdf2014-06-19 23:45 577K 
[   ]D2T1 - Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.pdf2014-06-19 23:45 502K 
[   ]D2 KEYNOTE - Bob Lord - Rethinking the Front Lines.pdf2014-06-19 23:45 453K 
[   ]D1LAB - Itzik Kotler - Hack Like It's 2013.pdf2014-06-19 23:45 336K 
[   ]D1LAB - Didier Stevens - Windows x64 Essentials.pdf2014-06-19 23:45 329K 

Apache/2.4.7 (Ubuntu) Server at conference.hitb.org Port 443