hitbsecconf2013ams
CLOSING KEYNOTE - Winn Schwartau - The History of the Future of InfoSec.pdf
2014-06-19 23:45
15M
D1 KEYNOTE - Edward Schwartz - Embracing the Uncertainty of Advanced Attacks with Big Data Analytics.pdf
51M
D1LAB - Didier Stevens - Windows x64 Essentials.pdf
329K
D1LAB - Itzik Kotler - Hack Like It's 2013.pdf
336K
D1LAB - Vladimir Kropotov and Sergey Soldatov - Defending the Enterprise the Russian Way.pdf
4.6M
D1T1 - Hugo Teso - Aircraft Hacking - Practical Aero Series.pdf
2.9M
D1T1 - Peleus Uhley and Karthik Raman - Security Response in the Age of Mass Customized Attacks.pdf
1.4M
D1T1 - Petko D Petkov - Defeating the Intercepting Web Proxy – A Glimpse Into the Next Generation of Web Security Tools.pdf
17M
D1T1 - Sergey Bratus and Julian Bangert - Better Security Through Creative x86 Trapping.pdf
4.1M
D1T1 - Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.pdf
4.5M
D1T1 - Vladimir Vorontsov and Alexander Golovko - SSRF PWNs - New Techniques and Stories.pdf
2.5M
D1T2 - Daniel Mende - Paparazzi Over IP.pdf
1.6M
D1T2 - Nicolas Seriot - Abusing Twitters API and OAuth Implementation.pdf
3.0M
D1T2 - Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel.zip
2.1M
D1T2 - Philippe Langlois - Hacking HLR HSS and MME Core Network Elements.pdf
6.4M
D1T2 - Tal Zeltzer - Analysis to Remote Root 0day in an Industry Leading SSL-VPN Appliance.pdf
1.9M
D1T2 - Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.pdf
577K
D2 KEYNOTE - Bob Lord - Rethinking the Front Lines.pdf
453K
D2LAB - Jim Manico - Secure Coding - Web and Mobile.pdf
3.8M
D2T1 - Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.pdf
502K
D2T1 - Peter Geissler and Steven Ketelaar - How I Met Your Modem.pdf
19M
D2T1 - Pod2g, Planetbeing, Musclenerd and Pimskeks aka Evad3rs - Swiping Through Modern Security Features.pdf
8.2M
D2T1 - Sebastien Kaczmarek - Dreamboot UEFI Bootkit.pdf
2.0M
D2T1 - Sergey Shekyan and Artem Harutyunyan - Turning Your Surveillance Camera Against You.pdf
1.7M
D2T2 - A Petukhov G Noseevich and D Gamayunov - Breaking Through Certified Crypto in Banking Apps.pdf
2.2M
D2T2 - Chilik Tamir - iAnalyzer - No More Blackbox iOS Analysis.pdf
12M
D2T2 - Dan Tentler - The Shodan Computer Search Engine.pdf
13M
D2T2 - Ofer Shezaf - The Infosec Risks of Charging Electric Cars.pdf
3.4M
D2T2 - Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.pdf
5.1M
D2T3 - Evan Booth - Terminal Cornucopia.pdf
176M