Index of /hitbsecconf2011ams/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[SND]Abdullah Geels - Hackers Op De Gracht.mp32014-06-19 23:43 49M 
[   ]D1 SIGINT - Elger Stitch Jonker - Building the Hackerspace.pdf2014-06-19 23:43 8.4M 
[   ]D1 SIGINT - Frank Breedijk - Seccubus - Vuln Scanning Doesn't Have to Be a Time Drain.pdf2014-06-19 23:44 3.8M 
[   ]D1 SIGINT - Raoul Chiesa - Cyber Weapons in 2011.pdf2014-06-19 23:43 7.1M 
[   ]D1T1 - Don Bailey - I'm Going Hunting I'm The Hunter.pdf2014-06-19 23:43 2.3M 
[   ]D1T1 - Elena K and Joffrey C - Webshells - A Framework for Pentesting.pdf2014-06-19 23:43 5.1M 
[   ]D1T1 - Mariano Nunez - Attacks Against SAP Web Applications.pdf2014-06-19 23:44 1.3M 
[   ]D1T1 - Michael Sandee - Beyond Botnets - SLIDES UNAVAILABLE.pdf2014-06-19 23:43 0  
[   ]D1T1 - Stefan Esser - Antid0te 2.0 - ASLR in iOS.pdf2014-06-19 23:43 4.8M 
[   ]D1T2 - Asia Slowinka - Excavating Data Structures from Stripped Binaries.pdf2014-06-19 23:43 882K 
[   ]D1T2 - Claudio Criscione - MetaXSSploit - Bringing XSS to Pentesting.pdf2014-06-19 23:43 3.1M 
[   ]D1T2 - Guillaume Prigent - Really Open Source Information Gathering.pdf2014-06-19 23:43 5.3M 
[   ]D1T2 - Laurent Oudot - Extracting Senstive Data from Your iPhone.pdf2014-06-19 23:43 14M 
[   ]D1T2 - Thomas Caplin - Silverlight - A New Way to Surf .Net Holes.pdf2014-06-19 23:43 1.4M 
[   ]D1T3 - Didier Stevens - Malicious PDF Analysis Lab .zip2014-06-19 23:43 282K 
[   ]D1T3 - Itzhak Zuk Avraham - Popping Shell On Android Devices.pdf2014-06-19 23:43 1.3M 
[   ]D1T3 - Mitja Kolsek - Remote Binary Planting.pdf2014-06-19 23:43 4.2M 
[   ]D2 SIGINT - Ferdinand Vroom - How OWASP Helps You Tell The Story - NO SLIDES.pdf2014-06-19 23:43 0  
[   ]D2 SIGINT - Jim Manico - Ghost of XSS Past Present and Future.pdf2014-06-19 23:43 2.1M 
[   ]D2 SIGINT - Martin Knobloch - Secure Your Software Using OWASP.pdf2014-06-19 23:43 1.5M 
[   ]D2T1 - Andreas Weigenstein - SQL Injection with ABAP.pdf2014-06-19 23:43 1.2M 
[   ]D2T1 - Andrew Gavin - Stealing Sensitive Data from Thousands of Systems.pdf2014-06-19 23:43 64K 
[   ]D2T1 - Daniele Bianco and Adam Laurie - Credit Card Skimming and PIN Harvesting in an EMV World.pdf2014-06-19 23:43 2.0M 
[   ]D2T1 - Itzik Kotler - Let Me Stuxnet You.pdf2014-06-19 23:43 530K 
[   ]D2T1 - Ivan Ristic - A Study of What Really Breaks SSL.pdf2014-06-19 23:43 3.0M 
[   ]D2T2 - D. Mende & Enno Rey - Attacking 3G and 4G Networks.pdf2014-06-19 23:43 2.2M 
[   ]D2T2 - Jean-Baptiste BeĢdrune & Jean Sigwald - iPhone Data Protection in Depth.pdf2014-06-19 23:43 710K 
[   ]D2T2 - Jim Geovedi and Raoul Chiesa - Hacking a Bird in the Sky.pdf2014-06-19 23:43 17M 
[   ]D2T2 - Rosario Valotta - Cookie Jacking.pdf2014-06-19 23:43 2.5M 
[   ]D2T2 - Shreeraj Shah - Next Generation Web Attacks.pdf2014-06-19 23:43 735K 
[   ]D2T3 - Aditya K Sood - Spying on SpyEye.pdf2014-06-19 23:43 2.7M 
[   ]D2T3 - Bert Hubert - DNSSEC - The Good The Bad and The Very Bad.pdf2014-06-19 23:43 397K 
[   ]D2T3 - Guillaume Delugre - Reverse Engineering Broadcom NetExtreme Firmware.pdf2014-06-19 23:43 1.2M 
[   ]D2T3 - Maarten Oosterink - Attacking Critical Infrastructure.pdf2014-06-19 23:43 2.4M 
[   ]D2T3 - Travis Goodspeed - Building a Promiscious nRF24L01 Packet Sniffer.pdf2014-06-19 23:43 31M 
[SND]Jose Ibanez - Hackers Op De Gracht.mp32014-06-19 23:43 124M 
[   ]KEYNOTE 1 - Joe Sullivan - NO SLIDES.pdf2014-06-19 23:43 0  
[   ]KEYNOTE 2 - PANEL DISCUSSION - NO SLIDES.pdf2014-06-19 23:43 0  
[   ]KEYNOTE CLOSING - Richard Thieme - NO SLIDES.pdf2014-06-19 23:43 0  
[SND]Roy Verschuren - Hackers Op De Gracht.mp32014-06-19 23:44 148M 

Apache/2.4.7 (Ubuntu) Server at conference.hackinthebox.org Port 80