hitbsecconf2013ams

 

[   ]

CLOSING KEYNOTE - Winn Schwartau - The History of the Future of InfoSec.pdf

2014-06-19 23:45

15M

 

[   ]

D1 KEYNOTE - Edward Schwartz - Embracing the Uncertainty of Advanced Attacks with Big Data Analytics.pdf

2014-06-19 23:45

51M

 

[   ]

D1LAB - Didier Stevens - Windows x64 Essentials.pdf

2014-06-19 23:45

329K

 

[   ]

D1LAB - Itzik Kotler - Hack Like It's 2013.pdf

2014-06-19 23:45

336K

 

[   ]

D1LAB - Vladimir Kropotov and Sergey Soldatov - Defending the Enterprise the Russian Way.pdf

2014-06-19 23:45

4.6M

 

[   ]

D1T1 - Hugo Teso - Aircraft Hacking - Practical Aero Series.pdf

2014-06-19 23:45

2.9M

 

[   ]

D1T1 - Peleus Uhley and Karthik Raman - Security Response in the Age of Mass Customized Attacks.pdf

2014-06-19 23:45

1.4M

 

[   ]

D1T1 - Petko D Petkov - Defeating the Intercepting Web Proxy – A Glimpse Into the Next Generation of Web Security Tools.pdf

2014-06-19 23:45

17M

 

[   ]

D1T1 - Sergey Bratus and Julian Bangert - Better Security Through Creative x86 Trapping.pdf

2014-06-19 23:45

4.1M

 

[   ]

D1T1 - Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.pdf

2014-06-19 23:45

4.5M

 

[   ]

D1T1 - Vladimir Vorontsov and Alexander Golovko - SSRF PWNs - New Techniques and Stories.pdf

2014-06-19 23:45

2.5M

 

[   ]

D1T2 - Daniel Mende - Paparazzi Over IP.pdf

2014-06-19 23:45

1.6M

 

[   ]

D1T2 - Nicolas Seriot - Abusing Twitters API and OAuth Implementation.pdf

2014-06-19 23:45

3.0M

 

[   ]

D1T2 - Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel.zip

2014-06-19 23:45

2.1M

 

[   ]

D1T2 - Philippe Langlois - Hacking HLR HSS and MME Core Network Elements.pdf

2014-06-19 23:45

6.4M

 

[   ]

D1T2 - Tal Zeltzer - Analysis to Remote Root 0day in an Industry Leading SSL-VPN Appliance.pdf

2014-06-19 23:45

1.9M

 

[   ]

D1T2 - Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.pdf

2014-06-19 23:45

577K

 

[   ]

D2 KEYNOTE - Bob Lord - Rethinking the Front Lines.pdf

2014-06-19 23:45

453K

 

[   ]

D2LAB - Jim Manico - Secure Coding - Web and Mobile.pdf

2014-06-19 23:45

3.8M

 

[   ]

D2T1 - Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.pdf

2014-06-19 23:45

502K

 

[   ]

D2T1 - Peter Geissler and Steven Ketelaar - How I Met Your Modem.pdf

2014-06-19 23:45

19M

 

[   ]

D2T1 - Pod2g, Planetbeing, Musclenerd and Pimskeks aka Evad3rs - Swiping Through Modern Security Features.pdf

2014-06-19 23:45

8.2M

 

[   ]

D2T1 - Sebastien Kaczmarek - Dreamboot UEFI Bootkit.pdf

2014-06-19 23:45

2.0M

 

[   ]

D2T1 - Sergey Shekyan and Artem Harutyunyan - Turning Your Surveillance Camera Against You.pdf

2014-06-19 23:45

1.7M

 

[   ]

D2T2 - A Petukhov G Noseevich and D Gamayunov - Breaking Through Certified Crypto in Banking Apps.pdf

2014-06-19 23:45

2.2M

 

[   ]

D2T2 - Chilik Tamir - iAnalyzer - No More Blackbox iOS Analysis.pdf

2014-06-19 23:45

12M

 

[   ]

D2T2 - Dan Tentler - The Shodan Computer Search Engine.pdf

2014-06-19 23:45

13M

 

[   ]

D2T2 - Ofer Shezaf - The Infosec Risks of Charging Electric Cars.pdf

2014-06-19 23:45

3.4M

 

[   ]

D2T2 - Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.pdf

2014-06-19 23:45

5.1M

 

[   ]

D2T3 - Evan Booth - Terminal Cornucopia.pdf

2014-06-19 23:45

176M