Index of /hitbsecconf2011ams/materials

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[SND]Abdullah Geels - Hackers Op De Gracht.mp32017-10-14 22:02 49M 
[   ]D1 SIGINT - Elger Stitch Jonker - Building the Hackerspace.pdf2017-10-14 22:02 8.4M 
[   ]D1 SIGINT - Frank Breedijk - Seccubus - Vuln Scanning Doesn't Have to Be a Time Drain.pdf2017-10-14 22:02 3.8M 
[   ]D1 SIGINT - Raoul Chiesa - Cyber Weapons in 2011.pdf2017-10-14 22:02 7.1M 
[   ]D1T1 - Don Bailey - I'm Going Hunting I'm The Hunter.pdf2017-10-14 22:02 2.3M 
[   ]D1T1 - Elena K and Joffrey C - Webshells - A Framework for Pentesting.pdf2017-10-14 22:02 5.1M 
[   ]D1T1 - Mariano Nunez - Attacks Against SAP Web Applications.pdf2017-10-14 22:02 1.3M 
[   ]D1T1 - Michael Sandee - Beyond Botnets - SLIDES UNAVAILABLE.pdf2017-10-14 22:02 0  
[   ]D1T1 - Stefan Esser - Antid0te 2.0 - ASLR in iOS.pdf2017-10-14 22:02 4.8M 
[   ]D1T2 - Asia Slowinka - Excavating Data Structures from Stripped Binaries.pdf2017-10-14 22:02 882K 
[   ]D1T2 - Claudio Criscione - MetaXSSploit - Bringing XSS to Pentesting.pdf2017-10-14 22:02 3.1M 
[   ]D1T2 - Guillaume Prigent - Really Open Source Information Gathering.pdf2017-10-14 22:02 5.3M 
[   ]D1T2 - Laurent Oudot - Extracting Senstive Data from Your iPhone.pdf2017-10-14 22:02 14M 
[   ]D1T2 - Thomas Caplin - Silverlight - A New Way to Surf .Net Holes.pdf2017-10-14 22:02 1.4M 
[   ]D1T3 - Didier Stevens - Malicious PDF Analysis Lab .zip2017-10-14 22:02 282K 
[   ]D1T3 - Itzhak Zuk Avraham - Popping Shell On Android Devices.pdf2017-10-14 22:02 1.3M 
[   ]D1T3 - Mitja Kolsek - Remote Binary Planting.pdf2017-10-14 22:02 4.2M 
[   ]D2 SIGINT - Ferdinand Vroom - How OWASP Helps You Tell The Story - NO SLIDES.pdf2017-10-14 22:02 0  
[   ]D2 SIGINT - Jim Manico - Ghost of XSS Past Present and Future.pdf2017-10-14 22:02 2.1M 
[   ]D2 SIGINT - Martin Knobloch - Secure Your Software Using OWASP.pdf2017-10-14 22:02 1.5M 
[   ]D2T1 - Andreas Weigenstein - SQL Injection with ABAP.pdf2017-10-14 22:02 1.2M 
[   ]D2T1 - Andrew Gavin - Stealing Sensitive Data from Thousands of Systems.pdf2017-10-14 22:02 64K 
[   ]D2T1 - Daniele Bianco and Adam Laurie - Credit Card Skimming and PIN Harvesting in an EMV World.pdf2017-10-14 22:02 2.0M 
[   ]D2T1 - Itzik Kotler - Let Me Stuxnet You.pdf2017-10-14 22:02 530K 
[   ]D2T1 - Ivan Ristic - A Study of What Really Breaks SSL.pdf2017-10-14 22:02 3.0M 
[   ]D2T2 - D. Mende & Enno Rey - Attacking 3G and 4G Networks.pdf2017-10-14 22:02 2.2M 
[   ]D2T2 - Jean-Baptiste BeĢdrune & Jean Sigwald - iPhone Data Protection in Depth.pdf2017-10-14 22:02 710K 
[   ]D2T2 - Jim Geovedi and Raoul Chiesa - Hacking a Bird in the Sky.pdf2017-10-14 22:02 17M 
[   ]D2T2 - Rosario Valotta - Cookie Jacking.pdf2017-10-14 22:02 2.5M 
[   ]D2T2 - Shreeraj Shah - Next Generation Web Attacks.pdf2017-10-14 22:02 735K 
[   ]D2T3 - Aditya K Sood - Spying on SpyEye.pdf2017-10-14 22:02 2.7M 
[   ]D2T3 - Bert Hubert - DNSSEC - The Good The Bad and The Very Bad.pdf2017-10-14 22:02 397K 
[   ]D2T3 - Guillaume Delugre - Reverse Engineering Broadcom NetExtreme Firmware.pdf2017-10-14 22:02 1.2M 
[   ]D2T3 - Maarten Oosterink - Attacking Critical Infrastructure.pdf2017-10-14 22:02 2.4M 
[   ]D2T3 - Travis Goodspeed - Building a Promiscious nRF24L01 Packet Sniffer.pdf2017-10-14 22:02 31M 
[SND]Jose Ibanez - Hackers Op De Gracht.mp32017-10-14 22:02 124M 
[   ]KEYNOTE 1 - Joe Sullivan - NO SLIDES.pdf2017-10-14 22:02 0  
[   ]KEYNOTE 2 - PANEL DISCUSSION - NO SLIDES.pdf2017-10-14 22:02 0  
[   ]KEYNOTE CLOSING - Richard Thieme - NO SLIDES.pdf2017-10-14 22:02 0  
[SND]Roy Verschuren - Hackers Op De Gracht.mp32017-10-14 22:02 148M