Index of /hitbsecconf2015ams/materials
Name
Last modified
Size
Description
Parent Directory
-
KEYNOTE 1 - Marcia Hoffmann - Fighting for Internet Security in the New Crypto Wars.pdf
2017-10-14 21:59
7.6M
D2T1 - Marina Krotofil and Jason Larsen - Hacking Chemical Processes.pdf
2017-10-14 21:59
28M
D1T1 - Alfonso De Gregorio - illusoryTLS.pdf
2017-10-14 21:59
13M
D1T2 - Bas Venis - Exploiting Browsers the Logical Way.pdf
2017-10-14 21:59
2.4M
KEYNOTE 2 - John Matherly - The Return of Dragons.pdf
2017-10-14 21:59
6.3M
D2T3 LAB - Nikhil Mittal - Powershell for Pentesters.zip
2017-10-14 21:59
429K
D1T1 - Xeno Kovah and Corey Kallenberg - How Many Million BIOSes Would You Like to Infect.pdf
2017-10-14 21:59
21M
D2T3 LAB - A. Quint, F. Lone-Sang and G. Dedrie - IRMA Framework.pdf
2017-10-14 21:59
2.0M
D2T2 - Ajin Abraham - Hacking Tizen - The OS of Everything.pdf
2017-10-14 21:59
7.6M
D1T2 - Alexey Tiurin - Oracle Peoplesoft Applications are Under Attack.pdf
2017-10-14 21:59
2.2M
D1T3 LAB - Dider Stevens and Xavier Mertens - Memory Forensics for Cisco iOS.pdf
2017-10-14 21:59
445K
D2T2 - Filippo Valsorda and George Tankersly - Non-Hidden Hidden Services Considered Harmful.pdf
2017-10-14 21:59
1.0M
D1T3 LAB - Breaking Bad Crypto.zip
2017-10-14 21:59
38K
Whitepapers/
2017-10-14 21:59
-
D2T2 - JB Bedrune, A. Gazet, F. Monjalet - Reversing Proprietary SCADA Tech.pdf
2017-10-14 21:59
4.4M
D2T1 - Joaquim Espinhara and Rafael Silva - MIMOSAWRITERROUTER - Abusing EPC on Cisco Routers.pdf
2017-10-14 21:59
3.1M
D1T1 - Saumil Shah - Stegosploit - Hacking with Pictures.pdf
2017-10-14 21:59
17M
D1T2 - Andrea Barisani - Forging the USB Armory.pdf
2017-10-14 21:59
9.3M
D2T1 - Luca De Fulgentis - The Windows Phone Freakshow.pdf
2017-10-14 21:59
4.5M
D2T1 - Jose Guasch - Remotely Owning Secure Parking Systems.pdf
2017-10-14 21:59
17M
D1T2 - Anestis Bechtsoudis - Fuzzing Objects d’ ART.pdf
2017-10-14 21:59
9.4M
D1T3 LAB - Tony Trummer - Attacking Android Apps.pdf
2017-10-14 21:59
6.2M
D1T1 - Markus Vervier - Mobile Authentication Subspace Travel.pdf
2017-10-14 21:59
1.2M
D2T1 - Matias Eissler - Eight Ou Two Mobile.pdf
2017-10-14 21:59
9.0M
D2T2 - Alfonso Munoz and Sergio de los Santos - Opcodes in Google Play.pdf
2017-10-14 21:59
11M
D2T2 - Julien Vehent - Mozilla InvestiGator.pdf
2017-10-14 21:59
8.3M
D1T2 - Pedram Hayati - Uncovering Secret Connections Amongst Attackers.pdf
2017-10-14 21:59
5.6M
KEYNOTE CLOSING - Runa Sandvik - Bringing Security and Privacy to Where the Wild Things Are.pdf
2017-10-14 21:59
6.9M
D1T1 - R. Rodriguez P. Vila - Relay Attacks in EMV Contactless Cards with Android OTS Devices.pdf
2017-10-14 21:59
3.0M
D1T2 - Tony Trummer and Tushar Dalvi - Mobile SSL Failures.pdf
2017-10-14 21:59
6.3M
D1T1 - T. Yunusov K. Nesterov - Bootkit via SMS.pdf
2017-10-14 21:59
11M