hitbsecconf2011kul

 

[   ]

D1 LABS - VoIP Attacking CUCM.pdf

2014-06-19 23:44

2.7M

 

[   ]

D1 SIGINT - Adnan Mohd Shukor - Fun With Javascript DeObfuscation.pdf

2014-06-19 23:44

4.0M

 

[   ]

D1 SIGINT - Jurre van Bergen and Youri van der Zwart - Abusing RFID.pdf

2014-06-19 23:44

772K

 

[   ]

D1 SIGINT - Muhammad Najmi Ahmad Zabidi - Compiling Features for Malcious Binaries.pdf

2014-06-19 23:44

410K

 

[   ]

D1T1 - Alex Kirk - Mobile Malware Analysis.pdf

2014-06-19 23:44

1.8M

 

[   ]

D1T1 - Andrea Barisani and Daniele Bianco - EMV Protocol and POS Physical Analysis.pdf

2014-06-19 23:44

2.0M

 

[   ]

D1T1 - Jonathan Brossard - Post Memory Corruption Analysis.pdf

2014-06-19 23:44

278K

 

[   ]

D1T1 - Mahmud Ab Rahman - Reverse Engineering Android Malware.pdf

2014-06-19 23:44

9.2M

 

[   ]

D1T1 - Marco Balduzzi - Attacking the Privacy of Social Network Users.pdf

2014-06-19 23:44

6.3M

 

[   ]

D1T1 - Riley Hassell - Exploiting Androids for Fun and Profit.pdf

2014-06-19 23:44

8.9M

 

[   ]

D1T2 - Alexander Polyakov and Dimitry Chastuhin - SAPocalypse Now.pdf

2014-06-19 23:44

15M

 

[   ]

D1T2 - Don Bailey - GoodFUN - The GoodFET.pdf

2014-06-19 23:44

968K

 

[   ]

D1T2 - Jim Geovedi - Satellite Telephony Security.pdf

2014-06-19 23:44

5.4M

 

[   ]

D1T2 - Laurent Weber - All your Base Stations Are Belong To Us.pdf

2014-06-19 23:44

313K

 

[   ]

D1T2 - The Grugq - Smashing the Slack for Fun and Profit.pdf

2014-06-19 23:44

14M

 

[   ]

D1T2 - biatch0 and RuFI0 - Pwning a 4G Device for the LuLz.pdf

2014-06-19 23:44

3.5M

 

[   ]

D1T3 - Barry van Kampen - DIY Video Surveillance.pdf

2014-06-19 23:44

894K

 

[   ]

D1T3 - Jimmy Shah - Mobile App Moolah.pdf

2014-06-19 23:44

1.6M

 

[   ]

D2 LABS - Daniel Mende and Jim Geovedi - Practical 3G-4G Attacks.pdf

2014-06-19 23:44

2.2M

 

[   ]

D2 SIGINT - Keith Lee - iPhone Espionage.pdf

2014-06-19 23:44

4.9M

 

[   ]

D2 SIGINT - Nur Muhammed Kamil - MyKotakPasir.pdf

2014-06-19 23:44

1.1M

 

[   ]

D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities.zip

2014-06-19 23:44

48M

 

[   ]

D2T1 - Hendrik Scholz - Air Travel Hacking.pdf

2014-06-19 23:44

5.5M

 

[   ]

D2T1 - Marc Blanchou and Mathew Solnik - Blackbox Android.pdf

2014-06-19 23:44

3.6M

 

[   ]

D2T1 - Ravi B Kevin R and Nico G - Femtocells.pdf

2014-06-19 23:44

5.9M

 

[   ]

D2T1 - Stefan Esser - iPhone Exploitation - One ROPe to Bind Them All.pdf

2014-06-19 23:44

8.2M

 

[   ]

D2T2 - KaiJern Lau - Malware Sandboxing the Xandora Way.pdf

2014-06-19 23:44

15M

 

[   ]

D2T2 - Paul Sebastian Ziegler - Stenographic AVI FIlesystems.pdf

2014-06-19 23:44

2.9M

 

[   ]

D2T2 - Philippe Langlois - Attacking the GPRS Roaming Exchange.pdf

2014-06-19 23:44

13M

 

[   ]

D2T2 - Saumil Shah - NO SLIDES.pdf

2014-06-19 23:44

0

 

[   ]

D2T2 - Travis Goodspeed - Remotely Exploiting Layer One.pdf

2014-06-19 23:44

311K

 

[SND]

HITB2011KUL - Post Conference Party Mix by Jim Geovedi.mp3

2014-06-19 23:44

183M

 

[SND]

HITB2011KUL - Post Conference Party Mix by Joernchen.mp3

2014-06-19 23:44

128M

 

[   ]

HackWEEKDAY - Arzumy.pdf

2014-06-19 23:44

244K

 

[   ]

HackWEEKDAY - sniffit.pdf

2014-06-19 23:44

1.3M

 

[   ]

KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.pdf

2014-06-19 23:44

1.5M

 

[   ]

KEYNOTE 2 - Jennifer Granick - NO SLIDES.pdf

2014-06-19 23:44

0

 

[   ]

KEYNOTE CLOSING - Richard Thieme - NO SLIDES.pdf

2014-06-19 23:44

0