Index of /files/hitbsecconf2022sin/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]D1 COMMSEC - API Security Through External Attack Surface Management - Phillip Wylie.pdf2022-08-25 09:00 7.7M 
[   ]D1 COMMSEC - Building an Army of Bots by Hijacking a Unicorn’s Twitter Handle - Rahul Sasi & Vishal Singh.pdf2022-08-26 01:45 10M 
[   ]D1 COMMSEC - Faking at Level 1 - How Digital Twins Save Your PLCs - Thomas Weber.pdf2022-08-26 01:37 3.5M 
[   ]D1 COMMSEC - Fuzzing the MCU of Connected Vehicles for Security and Safety - Hao Chen.pdf2022-08-25 08:53 1.0M 
[   ]D1 COMMSEC - ICEFALL – Revisiting a Decade of OT Insecure-by-Design Practices - Jos Wetzels.pdf2022-08-25 08:53 6.0M 
[   ]D1 COMMSEC - MPT - Pentest In Action - Jyoti Raval.pdf2022-08-25 08:53 656K 
[   ]D1T1 - Attacking WPA3 - New Vulnerabilities and Exploit Framework - Mathy Vanhoef.pdf2022-08-25 08:53 1.0M 
[   ]D1T1 - Breaking Web3 - Exploitation Techniques for Cryptocurrency Hacking - David Pethes.pdf2022-08-26 01:47 3.6M 
[   ]D1T1 - EDR Evasion Primer for Red Teamers - Karsten Nohl & Jorge Gimenez.pdf2022-08-29 08:30 2.3M 
[   ]D1T1 - Erybody Gettin TIPC - Demystifying Remote Linux Kernel Exploitation - Sam Page.pdf2022-08-25 08:53 5.6M 
[   ]D1T1 - One-Click to Completely Takeover a MacOS Device - Mickey Jin.pdf2022-08-26 01:36 4.6M 
[   ]D1T1 - Settlers of Netlink - Exploiting a Limited UAF on Ubuntu 22.04 to Achieve LPE - Aaron Adams.pdf2022-08-25 08:53 2.1M 
[   ]D2 COMMESC - Biometrics System Hacking in the Age of the Smart Vehicle - Kevin Chen & Li Siwei.pdf2022-08-26 04:36 7.8M 
[   ]D2 COMMSEC - Best Practices For Simulating Execution in Malicious Text Detection - Shuo Wang & Yi Sun.pdf2022-08-26 03:30 1.9M 
[   ]D2 COMMSEC - Can a Fuzzer Match a Human - Bhargava Shastry.pdf2022-08-26 09:15 450K 
[   ]D2 COMMSEC - Cracking Kyocera Printers - Yue Liu, Minghang Shen & Juyang Gao.pdf2022-08-26 03:44 6.1M 
[   ]D2 COMMSEC - Exploiting Race Condition Vulnerabilities in Web Applications - Javan Rasokat.pdf2022-08-27 03:45 3.8M 
[   ]D2 COMMSEC - Getting Clear Text Passwords from an IdP & More - Our Research Methodology - Gal Diskin.pdf2022-08-26 09:16 2.9M 
[   ]D2 COMMSEC - Web3 + Scams = It’s a Match - Zoltan Balazs.pdf2022-08-26 05:47 1.8M 
[   ]D2T1 - Browser Hacking with ANGLE - Jeonghoon Shin.pdf2022-08-26 09:21 927K 
[   ]D2T1 - Scripts-behavioral ML Classification Using Windows 10 AMSI-instrumentation - Ankit Garg.pdf2022-08-26 09:19 3.0M 
[   ]D2T1 - Suborner - Windows Bribery for Invisible Persistence - Sebastian Castro.pdf2022-08-27 03:45 2.3M 
[   ]D2T1 - The Ransomware Protection Full Of Holes - Soya Aoyama.pdf2022-08-26 09:24 4.3M 
[   ]D2T1 - Unlocking KeeLoq -A Reverse Engineering Story - Rogan Dawes.pdf2022-08-26 03:40 2.3M 
[   ]KEYNOTE 1 - A Random Walk through a Few Million Things - Chris Rouland.pdf2022-08-26 04:09 12M 
[   ]KEYNOTE 2 - Adventures in Security Research - Runa Sandvik.pdf2022-08-26 03:06 3.9M 

Apache/2.4.54 (Ubuntu) Server at conference.hitb.org Port 443