hitbsecconf2010ams
D1T1 - Alexander Polyakov - Attacking SAP Users with Sapsploit.pdf
2014-06-19 23:43
1.3M
D1T1 - John Kanen Flowers - Kanelbox.pdf
1.1M
D1T1 - Laurent Oudot - Web in the Middle.pdf
13M
D1T1 - Niels Teusink - Owned Live on Stage.pdf
2.1M
D1T1 - Tamas Rudnai - Fireshark .pdf
6.6M
D1T2 - Alexey Sintsov - JIT Spray Attacks and Advanced Shellcode.pdf
D1T2 - Fyodor Yarochkin - From Russia with Love 2.pdf
3.5M
D1T2 - Ilja van Sprundel - Having Fun with Apples IOKit.pdf
661K
D1T2 - Jonathan Brossard - Breaking Virtualization by Switching to Virtual 8086 Mode.pdf
D1T2 - R Gassira and R Piccirillo - Hijacking Mobile Data Connections.pdf
9.6M
D2T1 - Dumitri Codreanu - Abusing Microsofts Postmark Validation.zip
15M
D2T1 - Fyodor Yarochkin - XProbe NG.pdf
665K
D2T1 - Michael Thumann - How to Rate the Security of Closed Source Software.zip
2.9M
D2T1 - Roelof Temmingh - Maltego 3 - Start Your Engines.pdf
D2T2 - Chris Hofmann - Firefox 4 and Opportunities for Security Research.pdf
4.6M
D2T2 - Devine & Aumaitre - Subverting Windows 7 x64 Kernel with DMA Attacks.pdf
D2T2 - Job de Haas - SCA of Embedded Systems.pdf
5.9M
D2T2 - Mariano Nunez Di Croce - SAProuter .pdf
1.7M
D2T2 - Shreeraj Shah - Top 10 Web 2.0 Attacks.pdf
478K
D2T3 - BV Kampen - Arduino Lab.pdf
D2T3 - Barry van Kampen - Arduino Lab.pdf
D2T3 - Wes Brown - Advanced Malware Analysis Lab.pdf
6.1M
KEYNOTE 1 - Anton Chuvakin - Security Chasm.pdf
651K
KEYNOTE 2 - Mark Curphey - 10 Ideas That Might Change the Security industry.pdf
5.5M