Index of /hitbsecconf2008kl/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]D1T1 - Amitpal Dhillon - Addressing Identity Management.pdf2014-06-19 23:42 3.7M 
[   ]D1T1 - Dino Dai Zovi - Mac OS Xploitation.pdf2014-06-19 23:42 623K 
[   ]D1T1 - Ero Carrera - Analysis and Visualization of Common Packers.pdf2014-06-19 23:41 3.7M 
[   ]D1T1 - Hernan Ochoa - Pass-The-Hash Toolkit for Windows.pdf2014-06-19 23:42 535K 
[   ]D1T1 - Jim Geovedi - Hacking a Bird in the Sky 2.0.pdf2014-06-19 23:41 3.1M 
[   ]D1T1 - Julian Ho - Moocherhunter.pdf2014-06-19 23:42 124K 
[   ]D1T1 - Peter Silberman - Full Process Reconstitution from Memory.pdf2014-06-19 23:41 144K 
[   ]D1T2 - Alexander Tereshkin - Bluepilling the Xen Hypervisor.pdf2014-06-19 23:42 8.3M 
[   ]D1T2 - Alexander Tereshkin - Xen Hypervisor Demos.zip2014-06-19 23:41 142M 
[   ]D1T2 - Eric Lawrence - IE 8 - Engineering a Trustworthy Browser.pdf2014-06-19 23:41 13M 
[   ]D1T2 - Jonathan Squire - A Fox in the Hen House.pdf2014-06-19 23:41 3.5M 
[   ]D1T2 - Paul Craig - Hacking Internet Kiosks.pdf2014-06-19 23:42 1.2M 
[   ]D1T2 - Roberto Preatoni - Time for a Free Hardware Foundation.pdf2014-06-19 23:41 11M 
[   ]D1T2 - Saumil Shah - Browser Exploits - A New Model for Browser Security.pdf2014-06-19 23:42 2.1M 
[   ]D1T2 - The Grugq - How the Leopard Hides His Spots.pdf2014-06-19 23:42 128K 
[   ]D1T3 - Advanced Lock Picking Lab - NO SLIDES.pdf2014-06-19 23:42 0  
[   ]D1T3 - Mel Mudin and CS Lee - Advanced Network Forensics Lab.zip2014-06-19 23:41 29M 
[   ]D2T1 - Charlie Miller - iPwning the iPhone.pdf2014-06-19 23:42 9.8M 
[   ]D2T1 - Charl van Der Walt - Pushing the Camel Through the Eye of a Needle.pdf2014-06-19 23:42 23M 
[   ]D2T1 - Ilfak Guilfanov - Decompilers and Beyond.pdf2014-06-19 23:42 418K 
[   ]D2T1 - Kris Kaspersky - Remote Code Execution Through Intel CPU Bugs.pdf2014-06-19 23:41 1.3M 
[   ]D2T1 - Petko D Petkov - Client Side Security.pdf2014-06-19 23:42 1.0M 
[   ]D2T2 - AR Samhuri - Next Generation Reverse Shell.pdf2014-06-19 23:42 7.7M 
[   ]D2T2 - Adrian Pastor - Cracking into Embedded Devices and Beyond.pdf2014-06-19 23:42 889K 
[   ]D2T2 - Mary Yeoh - Security Penetration Testing at RTL Level.pdf2014-06-19 23:42 4.4M 
[   ]D2T2 - Matthew Geiger - How to Build Your Own Password Cracker and Disassembler.pdf2014-06-19 23:42 471K 
[   ]D2T2 - Shreeraj Shah - Top 10 Web 2.0 Attacks.pdf2014-06-19 23:41 1.1M 
[   ]D2T3 - Advanced Wireless Lab.zip2014-06-19 23:42 1.2G 
[   ]D2T3 - Ching Tim Meng - Detecting and Removing Malware without Antivirus Software.pdf2014-06-19 23:42 321K 
[   ]KEYNOTE 1 - Jeremiah Grossman - The Art of Click-Jacking.pdf2014-06-19 23:42 2.5M 
[   ]KEYNOTE 2 - Marcus Ranum - Cyberwar is Bullshit.pdf2014-06-19 23:41 54K 
[   ]KEYNOTE 3 + 4 - The Pirate Bay - Dissolving a Billion Dollar Industry as a Hobby.zip2014-06-19 23:42 38M 
[   ]SPECIAL - HITB Charity Auction Movie.m4v2014-06-19 23:41 63M 
[   ]SPECIAL - HITB Live Set by DJ Negative.zip2014-06-19 23:41 273M 

Apache/2.4.7 (Ubuntu) Server at conference.hackinthebox.org Port 80