hitbsecconf2010kul
D1-SIGINT - Mahmud AB Rahman - LibTAPAU.pdf
2014-10-28 05:10
2.1M
D1T1 - Alexander Polyakov - Attacking SAP Users with sapsploit.pdf
1.7M
D1T1 - Fabian Mihailowitsch - Detecting Hardware Keyloggers.pdf
1.2M
D1T1 - Jonathan Brossard - Breaking Virtualization by Any Means.pdf
646K
D1T1 - Marco Slaviero - Cache on Delivery.pdf
16M
D1T1 - Meder Kydyraliev - Milking a Horse.pdf
23M
D1T2 - Laurent Oudot - Analyzing Massive Web Attacks.pdf
4.0M
D1T2 - Luis Corrons - Lessons Learned from Mariposa.pdf
19M
D1T2 - Mary Yeoh - Fuzzing the RTL.pdf
3.4M
D1T2 - Sebastian Ziegler - Smartphones, Applications and Security.pdf
D1T2 - Shreeraj Shah - Hacking a Browsers DOM.pdf
750K
D2-SIGINT - Tan Kean Siong - Dionaea.pdf
385K
D2T1 - Cedric Halbronn and Jean Sigwald - iPhone Security Model.pdf
793K
D2T1 - Dennis Brown - Botnet Command and Control with Tor.pdf
337K
D2T1 - Jean Baptise Bedrune - Cracking DRM.pdf
7.9M
D2T1 - Paul Thierault - Can You Trust Your Workers.pdf
869K
D2T1 - The Grugq - Attacking GSM Basestations.pdf
1.5M
D2T2 - Claudio Criscione - Virtually Pwned Pentesting VMWare.pdf
2.8M
D2T2 - Don Bailey - Micro Control.pdf
837K
D2T2 - Long Le and Thanh Nguyen - Payload Already Inside.pdf
2014-10-28 05:09
307K
D2T2 - Mitja Kolsek - Remote Binary Planting.pdf
8.2M
D2T2 - Saumil Shah - Exploit Delivery.pdf
26M
KEYNOTE 1 - Chris Wysopal - Perpetual Insecurity Machine.zip
KEYNOTE 2 - Paul Vixie - Taking Back The DNS.pdf
123K