Index of /hitbsecconf2015ams/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[DIR]Whitepapers/2017-10-14 21:59 -  
[   ]KEYNOTE CLOSING - Runa Sandvik - Bringing Security and Privacy to Where the Wild Things Are.pdf2017-10-14 21:59 6.9M 
[   ]KEYNOTE 2 - John Matherly - The Return of Dragons.pdf2017-10-14 21:59 6.3M 
[   ]KEYNOTE 1 - Marcia Hoffmann - Fighting for Internet Security in the New Crypto Wars.pdf2017-10-14 21:59 7.6M 
[   ]D2T3 LAB - Nikhil Mittal - Powershell for Pentesters.zip2017-10-14 21:59 429K 
[   ]D2T3 LAB - A. Quint, F. Lone-Sang and G. Dedrie - IRMA Framework.pdf2017-10-14 21:59 2.0M 
[   ]D2T2 - Julien Vehent - Mozilla InvestiGator.pdf2017-10-14 21:59 8.3M 
[   ]D2T2 - JB Bedrune, A. Gazet, F. Monjalet - Reversing Proprietary SCADA Tech.pdf2017-10-14 21:59 4.4M 
[   ]D2T2 - Filippo Valsorda and George Tankersly - Non-Hidden Hidden Services Considered Harmful.pdf2017-10-14 21:59 1.0M 
[   ]D2T2 - Alfonso Munoz and Sergio de los Santos - Opcodes in Google Play.pdf2017-10-14 21:59 11M 
[   ]D2T2 - Ajin Abraham - Hacking Tizen - The OS of Everything.pdf2017-10-14 21:59 7.6M 
[   ]D2T1 - Matias Eissler - Eight Ou Two Mobile.pdf2017-10-14 21:59 9.0M 
[   ]D2T1 - Marina Krotofil and Jason Larsen - Hacking Chemical Processes.pdf2017-10-14 21:59 28M 
[   ]D2T1 - Luca De Fulgentis - The Windows Phone Freakshow.pdf2017-10-14 21:59 4.5M 
[   ]D2T1 - Jose Guasch - Remotely Owning Secure Parking Systems.pdf2017-10-14 21:59 17M 
[   ]D2T1 - Joaquim Espinhara and Rafael Silva - MIMOSAWRITERROUTER - Abusing EPC on Cisco Routers.pdf2017-10-14 21:59 3.1M 
[   ]D1T3 LAB - Tony Trummer - Attacking Android Apps.pdf2017-10-14 21:59 6.2M 
[   ]D1T3 LAB - Dider Stevens and Xavier Mertens - Memory Forensics for Cisco iOS.pdf2017-10-14 21:59 445K 
[   ]D1T3 LAB - Breaking Bad Crypto.zip2017-10-14 21:59 38K 
[   ]D1T2 - Tony Trummer and Tushar Dalvi - Mobile SSL Failures.pdf2017-10-14 21:59 6.3M 
[   ]D1T2 - Pedram Hayati - Uncovering Secret Connections Amongst Attackers.pdf2017-10-14 21:59 5.6M 
[   ]D1T2 - Bas Venis - Exploiting Browsers the Logical Way.pdf2017-10-14 21:59 2.4M 
[   ]D1T2 - Anestis Bechtsoudis - Fuzzing Objects d’ ART.pdf2017-10-14 21:59 9.4M 
[   ]D1T2 - Andrea Barisani - Forging the USB Armory.pdf2017-10-14 21:59 9.3M 
[   ]D1T2 - Alexey Tiurin - Oracle Peoplesoft Applications are Under Attack.pdf2017-10-14 21:59 2.2M 
[   ]D1T1 - Xeno Kovah and Corey Kallenberg - How Many Million BIOSes Would You Like to Infect.pdf2017-10-14 21:59 21M 
[   ]D1T1 - T. Yunusov K. Nesterov - Bootkit via SMS.pdf2017-10-14 21:59 11M 
[   ]D1T1 - Saumil Shah - Stegosploit - Hacking with Pictures.pdf2017-10-14 21:59 17M 
[   ]D1T1 - R. Rodriguez P. Vila - Relay Attacks in EMV Contactless Cards with Android OTS Devices.pdf2017-10-14 21:59 3.0M 
[   ]D1T1 - Markus Vervier - Mobile Authentication Subspace Travel.pdf2017-10-14 21:59 1.2M 
[   ]D1T1 - Alfonso De Gregorio - illusoryTLS.pdf2017-10-14 21:59 13M