hitbsecconf2010ams

 

 

[   ]

D1T1 - Alexander Polyakov - Attacking SAP Users with Sapsploit.pdf

2014-06-19 23:43

1.3M

 

[   ]

D1T1 - John Kanen Flowers - Kanelbox.pdf

2014-06-19 23:43

1.1M

 

[   ]

D1T1 - Laurent Oudot - Web in the Middle.pdf

2014-06-19 23:43

13M

 

[   ]

D1T1 - Niels Teusink - Owned Live on Stage.pdf

2014-06-19 23:43

2.1M

 

[   ]

D1T1 - Tamas Rudnai - Fireshark .pdf

2014-06-19 23:43

6.6M

 

[   ]

D1T2 - Alexey Sintsov - JIT Spray Attacks and Advanced Shellcode.pdf

2014-06-19 23:43

1.1M

 

[   ]

D1T2 - Fyodor Yarochkin - From Russia with Love 2.pdf

2014-06-19 23:43

3.5M

 

[   ]

D1T2 - Ilja van Sprundel - Having Fun with Apples IOKit.pdf

2014-06-19 23:43

661K

 

[   ]

D1T2 - Jonathan Brossard - Breaking Virtualization by Switching to Virtual 8086 Mode.pdf

2014-06-19 23:43

2.1M

 

[   ]

D1T2 - R Gassira and R Piccirillo - Hijacking Mobile Data Connections.pdf

2014-06-19 23:43

9.6M

 

[   ]

D2T1 - Dumitri Codreanu - Abusing Microsofts Postmark Validation.zip

2014-06-19 23:43

15M

 

[   ]

D2T1 - Fyodor Yarochkin - XProbe NG.pdf

2014-06-19 23:43

665K

 

[   ]

D2T1 - Michael Thumann - How to Rate the Security of Closed Source Software.zip

2014-06-19 23:43

2.9M

 

[   ]

D2T1 - Roelof Temmingh - Maltego 3 - Start Your Engines.pdf

2014-06-19 23:43

2.1M

 

[   ]

D2T2 - Chris Hofmann - Firefox 4 and Opportunities for Security Research.pdf

2014-06-19 23:43

4.6M

 

[   ]

D2T2 - Devine & Aumaitre - Subverting Windows 7 x64 Kernel with DMA Attacks.pdf

2014-06-19 23:43

1.3M

 

[   ]

D2T2 - Job de Haas - SCA of Embedded Systems.pdf

2014-06-19 23:43

5.9M

 

[   ]

D2T2 - Mariano Nunez Di Croce - SAProuter .pdf

2014-06-19 23:43

1.7M

 

[   ]

D2T2 - Shreeraj Shah - Top 10 Web 2.0 Attacks.pdf

2014-06-19 23:43

478K

 

[   ]

D2T3 - BV Kampen - Arduino Lab.pdf

2014-06-19 23:43

2.1M

 

[   ]

D2T3 - Barry van Kampen - Arduino Lab.pdf

2014-06-19 23:43

2.1M

 

[   ]

D2T3 - Wes Brown - Advanced Malware Analysis Lab.pdf

2014-06-19 23:43

6.1M

 

[   ]

KEYNOTE 1 - Anton Chuvakin - Security Chasm.pdf

2014-06-19 23:43

651K

 

[   ]

KEYNOTE 2 - Mark Curphey - 10 Ideas That Might Change the Security industry.pdf

2014-06-19 23:43

5.5M