Index of /hitbsecconf2012kul/materials

[ICO]NameLast modifiedSizeDescription

[DIR]Parent Directory  -  
[   ]D1T1 - Barisani and Bianco - Practical Exploitation of Embedded Systems.pdf20-Jan-2014 05:15 1.8M 
[   ]D1T1 - Chris Wysopal - Data Mining a Mountain of Vulnerabilities.pdf20-Jan-2014 05:15 3.0M 
[   ]D1T1 - Lucas Adamski - Firefox OS and You.pdf20-Jan-2014 05:15 3.7M 
[   ]D1T1 - Petko Petkov - History of the JavaScript Security Arsenal.pdf20-Jan-2014 05:15 4.6M 
[   ]D1T1 - Philippe Langlois and Emmanuel Gadaix - 6000 Ways and More.pdf20-Jan-2014 05:15 18M 
[   ]D1T1 - The Pirate Bay - Data is Political - NO SHOW20-Jan-2014 05:15 0  
[   ]D1T2 - Don Bailey - Hackers, The Movie - A Retrospective.pdf20-Jan-2014 05:15 19M 
[   ]D1T2 - Haroon Meer - You and Your Research.pdf20-Jan-2014 05:15 38M 
[   ]D1T2 - Marc Heuse - IPv6 Insecurity Revolutions.pdf20-Jan-2014 05:15 1.8M 
[   ]D1T2 - Mark Dowd & Tarjei Mandt - iOS6 Security.pdf20-Jan-2014 05:15 769K 
[   ]D1T2 - Meder Kydyraliev - Defibrilating Web Security.pdf20-Jan-2014 05:15 299K 
[   ]D1T2 - Wes Brown - Supercomputing, Malware and Correlation.pdf20-Jan-2014 05:15 10M 
[   ]D1T3 - Charlie Miller - Attacking NFC.pdf20-Jan-2014 05:15 7.0M 
[   ]D1T3 - F Raynal & G Campana - An Attack Path to Jailbreaking Your Home Router.pdf20-Jan-2014 05:15 2.4M 
[   ]D1T3 - John Draper - A Historical Look at the Personal Computer and Phreaking.pdf20-Jan-2014 05:15 5.0M 
[   ]D1T3 - Jose Nazario - Tracking Large Scale Botnets.pdf20-Jan-2014 05:15 2.4M 
[   ]D1T3 - Paul Sebastian Ziegler - Hacking in the Far East.pdf20-Jan-2014 05:15 18M 
[   ]D1T3 - The Grugq - OPSEC - Because jail is for wuftpd.pdf20-Jan-2014 05:15 19M 
[   ]D2T1 - Chris Evans - Element 1337 in the Periodic Table - Pwnium.pdf20-Jan-2014 05:15 5.1M 
[   ]D2T1 - Katie Moussouris - How to Get Along with Vendors Without Really Trying.pdf20-Jan-2014 05:15 5.5M 
[   ]D2T1 - Ollie Whitehouse - Finding the Weak Link in Binaries.pdf20-Jan-2014 05:15 738K 
[   ]D2T1 - Paul Vixie - Silo Busting in Information Security - NO SLIDES20-Jan-2014 05:15 0  
[   ]D2T1 - Rodrigo Branco - A Scientific Study of Malware Obfuscation Technologies.zip20-Jan-2014 05:15 1.2M 
[   ]D2T1 - Shreeraj Shah - XSS and CSRF Strike Back Powered by HTML5.pdf20-Jan-2014 05:15 2.7M 
[   ]D2T2 - Fyodor Yarochkin and Vladimir - Messing up the Kids Playground.pdf20-Jan-2014 05:15 8.0M 
[   ]D2T2 - Jeremiah Grossman - Why Web Security is Fundamentally Broken.pdf20-Jan-2014 05:15 3.9M 
[   ]D2T2 - Raoul Chiesa - Information Warfare and Cyberwar.pdf20-Jan-2014 05:15 3.7M 
[   ]D2T2 - Saumil Shah - Innovative Approaches to Exploit Delivery.pdf20-Jan-2014 05:15 11M 
[   ]D2T3 - Emmanuel Gadaix - Something MEGA.pdf20-Jan-2014 05:15 7.0M 
[   ]D2T3 - Felix FX Lindner - Hacking Huawei VRP.pdf20-Jan-2014 05:15 3.8M 
[   ]D2T3 - Mikko Hypponen - Behind Enemy Lines.pdf20-Jan-2014 05:15 6.1M 
[   ]D2T3 - OPENBOTTLE PANEL - NO SLIDES20-Jan-2014 05:15 0  
[   ]D2T3 - Stefano Zanero - Behaviour-Based Methods for Automated Scalable Malware Analysis.pdf20-Jan-2014 05:15 1.5M 
[   ]D2T123 - IOS SECURITY PANEL - NO SLIDES20-Jan-2014 05:15 0  

Apache/2.2.22 (Ubuntu) Server at conference.hackinthebox.org Port 80