Index of /hitbsecconf2008kl/materials

[ICO]NameLast modifiedSizeDescription

[DIR]Parent Directory  -  
[   ]D1T1 - Amitpal Dhillon - Addressing Identity Management.pdf20-Jan-2014 05:05 3.7M 
[   ]D1T1 - Dino Dai Zovi - Mac OS Xploitation.pdf20-Jan-2014 05:06 623K 
[   ]D1T1 - Ero Carrera - Analysis and Visualization of Common Packers.pdf20-Jan-2014 05:04 3.7M 
[   ]D1T1 - Hernan Ochoa - Pass-The-Hash Toolkit for Windows.pdf20-Jan-2014 05:06 535K 
[   ]D1T1 - Jim Geovedi - Hacking a Bird in the Sky 2.0.pdf20-Jan-2014 05:04 3.1M 
[   ]D1T1 - Julian Ho - Moocherhunter.pdf20-Jan-2014 05:06 124K 
[   ]D1T1 - Peter Silberman - Full Process Reconstitution from Memory.pdf20-Jan-2014 05:04 144K 
[   ]D1T2 - Alexander Tereshkin - Bluepilling the Xen Hypervisor.pdf20-Jan-2014 05:06 8.3M 
[   ]D1T2 - Alexander Tereshkin - Xen Hypervisor Demos.zip20-Jan-2014 05:04 142M 
[   ]D1T2 - Eric Lawrence - IE 8 - Engineering a Trustworthy Browser.pdf20-Jan-2014 05:04 13M 
[   ]D1T2 - Jonathan Squire - A Fox in the Hen House.pdf20-Jan-2014 05:04 3.5M 
[   ]D1T2 - Paul Craig - Hacking Internet Kiosks.pdf20-Jan-2014 05:06 1.2M 
[   ]D1T2 - Roberto Preatoni - Time for a Free Hardware Foundation.pdf20-Jan-2014 05:04 11M 
[   ]D1T2 - Saumil Shah - Browser Exploits - A New Model for Browser Security.pdf20-Jan-2014 05:06 2.1M 
[   ]D1T2 - The Grugq - How the Leopard Hides His Spots.pdf20-Jan-2014 05:06 128K 
[   ]D1T3 - Advanced Lock Picking Lab - NO SLIDES.pdf20-Jan-2014 05:05 0  
[   ]D1T3 - Mel Mudin and CS Lee - Advanced Network Forensics Lab.zip20-Jan-2014 05:04 29M 
[   ]D2T1 - Charlie Miller - iPwning the iPhone.pdf20-Jan-2014 05:06 9.8M 
[   ]D2T1 - Charl van Der Walt - Pushing the Camel Through the Eye of a Needle.pdf20-Jan-2014 05:06 23M 
[   ]D2T1 - Ilfak Guilfanov - Decompilers and Beyond.pdf20-Jan-2014 05:06 418K 
[   ]D2T1 - Kris Kaspersky - Remote Code Execution Through Intel CPU Bugs.pdf20-Jan-2014 05:04 1.3M 
[   ]D2T1 - Petko D Petkov - Client Side Security.pdf20-Jan-2014 05:06 1.0M 
[   ]D2T2 - AR Samhuri - Next Generation Reverse Shell.pdf20-Jan-2014 05:06 7.7M 
[   ]D2T2 - Adrian Pastor - Cracking into Embedded Devices and Beyond.pdf20-Jan-2014 05:06 889K 
[   ]D2T2 - Mary Yeoh - Security Penetration Testing at RTL Level.pdf20-Jan-2014 05:06 4.4M 
[   ]D2T2 - Matthew Geiger - How to Build Your Own Password Cracker and Disassembler.pdf20-Jan-2014 05:06 471K 
[   ]D2T2 - Shreeraj Shah - Top 10 Web 2.0 Attacks.pdf20-Jan-2014 05:04 1.1M 
[   ]D2T3 - Advanced Wireless Lab.zip20-Jan-2014 05:05 1.2G 
[   ]D2T3 - Ching Tim Meng - Detecting and Removing Malware without Antivirus Software.pdf20-Jan-2014 05:06 321K 
[   ]KEYNOTE 1 - Jeremiah Grossman - The Art of Click-Jacking.pdf20-Jan-2014 05:06 2.5M 
[   ]KEYNOTE 2 - Marcus Ranum - Cyberwar is Bullshit.pdf20-Jan-2014 05:04 54K 
[   ]KEYNOTE 3 + 4 - The Pirate Bay - Dissolving a Billion Dollar Industry as a Hobby.zip20-Jan-2014 05:06 38M 
[   ]SPECIAL - HITB Charity Auction Movie.m4v20-Jan-2014 05:04 63M 
[   ]SPECIAL - HITB Live Set by DJ Negative.zip20-Jan-2014 05:04 273M 

Apache/2.2.22 (Ubuntu) Server at conference.hackinthebox.org Port 80