/HITB 2003 - Malyasia/
|
bt1.mp4
|
143.2 MB
|
bt2.mp4
|
91.4 MB
|
bt3.mp4
|
73.3 MB
|
bt4.mp4
|
85.4 MB
|
bt5.mp4
|
84.5 MB
|
bt6.mp4
|
40.3 MB
|
panel.mp4
|
166.3 MB
|
tt1.mp4
|
144.5 MB
|
tt2.mp4
|
115.6 MB
|
tt3.mp4
|
96.2 MB
|
tt4.mp4
|
119.1 MB
|
tt5.mp4
|
128.3 MB
|
tt6.mp4
|
157.1 MB
|
tt7.mp4
|
185.6 MB
|
tt8.mp4
|
100.9 MB
|
tt9.mp4
|
164.8 MB
|
/proceedings/
|
hitb04-adam-gowdiak.pdf
|
56.4 MB
|
hitb04-captain-crunch-01.pdf
|
41.7 KB
|
hitb04-captain-crunch-02.pdf
|
38.6 KB
|
hitb04-chew-keong-tan.pdf
|
9.0 MB
|
hitb04-emmanuel-gadaix.pdf
|
43.8 MB
|
hitb04-fyodor-meder.pdf
|
880.4 KB
|
hitb04-gareth-davies.pdf
|
589.7 KB
|
hitb04-grugq.pdf
|
1.1 MB
|
hitb04-jose-nazario.pdf
|
458.4 KB
|
hitb04-kamal-hilmi.tgz
|
657.1 KB
|
hitb04-roberto-fabio.pdf
|
2.1 MB
|
hitb04-shreeraj-shah.pdf
|
583.6 KB
|
hitb04-sk-chong.pdf
|
988.5 KB
|
hitb04-sukhdev-singh.pdf
|
13.8 MB
|
hitb04-teo-sze-siong.zip
|
364.7 KB
|
hitb04-theo-deraadt.zip
|
2.7 MB
|
hitb04-toh-swee-hoe.pdf
|
6.7 MB
|
/videos/
|
hitb2004-adam-gowdiak.mp4
|
203.1 MB
|
hitb2004-emmanuel-gadaix.mp4
|
197.0 MB
|
hitb2004-fyodor-and-meder.mp4
|
95.4 MB
|
hitb2004-gareth-davies.mp4
|
63.9 MB
|
hitb2004-grugq.mp4
|
101.2 MB
|
hitb2004-jorge-sebastiao.mp4
|
71.0 MB
|
hitb2004-jose-nazario.mp4
|
120.3 MB
|
hitb2004-keynote-1-theo-de-raadt.mp4
|
101.2 MB
|
hitb2004-panel-discussion.mp4
|
111.3 MB
|
hitb2004-roberto-and-fabio.mp4
|
145.2 MB
|
hitb2004-shreeraj-shah.mp4
|
144.2 MB
|
hitb2004-sk-chong.mp4
|
173.1 MB
|
hitb2004-sukdev-singh.mp4
|
76.0 MB
|
hitb2004-suresh-ramasamy.mp4
|
67.1 MB
|
hitb2004-teo-sze-siong.mp4
|
74.3 MB
|
hitb2004-toh-swee-hoe.mp4
|
127.7 MB
|
/proceedings/
|
BT-Anthony-Zboralski-Social-Engineering.pdf
|
1.1 MB
|
BT-Fabrice-Marie-Hacking-Internet-Banking-Applications.pdf
|
1.2 MB
|
BT-Raoul-Chiesa-X25-Security.pdf
|
1.1 MB
|
BT-Roberto-Preatoni-Fabio-Ghioni-Corp-vs-Corp.ppt
|
7.5 MB
|
BT-Tim-Pritlove-Blinkenlights-Arcade-Project.pdf
|
5.3 MB
|
HITB.gif
|
14.4 KB
|
Keynote-Mikko-Hypponen-Mobile-Malware.pdf
|
3.6 MB
|
Keynote-Tony-Chor-IE-Security-Past-Present-and-Future.ppt
|
5.1 MB
|
Mark Schoenefeld - Java and Secure Programming.pdf
|
3.7 MB
|
TT-Dave-Aitel-Nematodes.zip
|
63.3 KB
|
TT-Fyodor-Yarochkin-Meder-Kydyraliev-STIFware-Evolution.ppt
|
491.0 KB
|
TT-Jim-Geovedi-Hotspot-Security.pdf
|
789.6 KB
|
TT-Joanna-Rutkowska-HITB-Virginity-Verifier.ppt
|
540.7 KB
|
TT-Jose-Nazario-Analyzing-all-that-data.pdf
|
806.3 KB
|
TT-Nish-Bhalla-Defects-Overview.pdf
|
614.9 KB
|
TT-Roelof-Temmingh-State-of-the-art.ppt
|
2.6 MB
|
TT-San-Hacking-Windows-CE.ppt
|
900.1 KB
|
TT-Shreeraj-Shah-Webhacking-Kungfu.pdf
|
294.0 KB
|
TT-The-Grugq-VoIPPhreaking.ppt
|
137.2 KB
|
/video/
|
AnalyzingCode.mp4
|
116.7 MB
|
AssesingSrvSec.mp4
|
161.9 MB
|
BeneficialWorms.mp4
|
184.8 MB
|
BuildSecOperCenter.mp4
|
142.3 MB
|
CCC.mp4
|
156.4 MB
|
CyberSkirmishes.mp4
|
90.5 MB
|
HITBSecConf2005 Malaysia _ Fyodor Y.mp4
|
81.2 MB
|
HITBSecConf2005 Malaysia _ Roelof T.mp4
|
87.3 MB
|
HITBSecConf2005 Malaysia _ Fabrice M.mp4
|
87.1 MB
|
HITBSecConf2005 Malaysia _ Jim Geove.mp4
|
50.7 MB
|
HITBSecConf2005 Malaysia _ Joanna Ru.mp4
|
87.0 MB
|
HITBSecConf2005 Malaysia _ Marc Scho.mp4
|
87.1 MB
|
HITBSecConf2005 Malaysia _ Raoul Chi.mp4
|
98.0 MB
|
HITBSecConf2005 Malaysia _ Roberto P.mp4
|
80.0 MB
|
HITBSecConf2005 Malaysia _ Rohyt Bel.mp4
|
53.1 MB
|
HITBSecConf2005 Malaysia _ The Grugq.mp4
|
99.6 MB
|
HckInternetBankingApp.mp4
|
160.7 MB
|
HckingWinCE.mp4
|
137.8 MB
|
IE-Security.mp4
|
256.9 MB
|
Java&SecProgramming.mp4
|
161.0 MB
|
MobileMalware.mp4
|
216.9 MB
|
ModernEspionage_all.mp4
|
222.8 MB
|
RealWorldAttacks.mp4
|
129.2 MB
|
STIF-wareEvol.mp4
|
170.5 MB
|
SocialEngineeringFundam.mp4
|
148.4 MB
|
StiftingHaystacks.mp4
|
140.5 MB
|
VoIPhreaking.mp4
|
176.0 MB
|
WHckingKungFU.mp4
|
144.8 MB
|
wifiHotspotSec.mp4
|
94.9 MB
|
windowsMalwareDetection.mp4
|
161.0 MB
|
x25SecurityWwwww.mp4
|
204.3 MB
|
/HITB 2006 - Malaysia/
|
HITBSecConf2006 Malaysia - Mark Curp.mp4
|
59.1 MB
|
HITBSecConf2006 Malaysia - Mark Curphey & John Viega - Keynote.mp4
|
59.1 MB
|
HITBSecConf2006 Malaysia _ Ching Ti.mp4
|
73.2 MB
|
HITBSecConf2006 Malaysia _ Ching Tim Meng - X.805 Standard.mp4
|
73.2 MB
|
HITBSecConf2006 Malaysia _ Michael Davis - Client Honeypots - Its not only ...(2).mp4
|
45.6 MB
|
HITBSecConf2006 Malaysia _ Michael Davis - Client Honeypots - Its not only ....mp4
|
45.6 MB
|
HITBSecConf2006 Malaysia _ Michael.mp4
|
45.6 MB
|
HITBSecConf2006 Malaysia _ Anthony Z.mp4
|
79.7 MB
|
HITBSecConf2006 Malaysia _ Anthony Zboralski & Dave McKay - Hacking Trust.mp4
|
79.7 MB
|
HITBSecConf2006 Malaysia _ CTF Prize Giving & Charity Auction.mp4
|
75.2 MB
|
HITBSecConf2006 Malaysia _ Carlos Sarraute & Javier Burroni - Neural Networks.mp4
|
53.2 MB
|
HITBSecConf2006 Malaysia _ Douglas M.mp4
|
72.1 MB
|
HITBSecConf2006 Malaysia _ Douglas MacIver - Pen Testing Windows Vista BitLocker.mp4
|
72.1 MB
|
HITBSecConf2006 Malaysia _ Fabrice M.mp4
|
83.6 MB
|
HITBSecConf2006 Malaysia _ Fabrice Marie - Application Intrusion Prevention....mp4
|
83.6 MB
|
HITBSecConf2006 Malaysia _ Fyodor Yarochkin & Meder Kydyraliev - YAWATT.mp4
|
48.1 MB
|
HITBSecConf2006 Malaysia _ Jim Geove.mp4
|
68.4 MB
|
HITBSecConf2006 Malaysia _ Jim Geovedi & Raditya Iryandi - Hacking VSAT.mp4
|
68.4 MB
|
HITBSecConf2006 Malaysia _ Joanna Rutkowska - Subverting Vista Kernel for Fun...mp4
|
87.8 MB
|
HITBSecConf2006 Malaysia _ Jonathan Limbo - The world through the eyes of a .....mp4
|
36.8 MB
|
HITBSecConf2006 Malaysia _ Lisa Thal.mp4
|
48.2 MB
|
HITBSecConf2006 Malaysia _ Lisa Thalheim - Visualization of Source Code.mp4
|
48.2 MB
|
HITBSecConf2006 Malaysia _ Marc Scho.mp4
|
88.8 MB
|
HITBSecConf2006 Malaysia _ Marc Schonefeld - Pentesting Java_J2EE.mp4
|
88.8 MB
|
HITBSecConf2006 Malaysia _ Nguyen An.mp4
|
68.7 MB
|
HITBSecConf2006 Malaysia _ Nguyen Anh Quynh - Invisible Honeypot Monitoring.mp4
|
68.7 MB
|
HITBSecConf2006 Malaysia _ Nish Balla - Finding Secrets in ISAPI.mp4
|
56.4 MB
|
HITBSecConf2006 Malaysia _ Paul Boeh.mp4
|
47.0 MB
|
HITBSecConf2006 Malaysia _ Paul Boehm - Taming Bugs.mp4
|
47.0 MB
|
HITBSecConf2006 Malaysia _ Philippe Biondi & Arnaud Ebalard - Scapy and IPv6.mp4
|
78.9 MB
|
HITBSecConf2006 Malaysia _ Philippe.mp4
|
78.9 MB
|
HITBSecConf2006 Malaysia _ Raoul Chi.mp4
|
56.2 MB
|
HITBSecConf2006 Malaysia _ Raoul Chiesa - Hacker's Profiling Project (HPP).mp4
|
56.2 MB
|
HITBSecConf2006 Malaysia _ Roberto P.mp4
|
59.5 MB
|
HITBSecConf2006 Malaysia _ Roberto Preatoni & Fabio Ghioni - The Biggest Brother.mp4
|
59.5 MB
|
HITBSecConf2006 Malaysia _ Rohyt Bel.mp4
|
67.6 MB
|
HITBSecConf2006 Malaysia _ Rohyt Belani - Smashing the stack for profit - period.mp4
|
67.6 MB
|
HITBSecConf2006 Malaysia _ Saumil Sh.mp4
|
69.3 MB
|
HITBSecConf2006 Malaysia _ Saumil Shah - Writing Metasploit Plugins.mp4
|
69.3 MB
|
HITBSecConf2006 Malaysia _ The Grugq - VoIPhreaking_ SIPhallis Unveiled.mp4
|
78.2 MB
|
HITBSecConf2006 Malaysia _ The Grugq.mp4
|
78.2 MB
|
HITBSecConf2006 Malaysia _ Thorsten Holz - Playing with Botnets.mp4
|
59.7 MB
|
HITBSecConf2006 Malaysia _ Thorsten.mp4
|
59.7 MB
|
HITBSecConf2006 Malaysia _ Van Hause.mp4
|
75.7 MB
|
HITBSecConf2006 Malaysia _ Van Hauser - Attacking the IPv6 Protocol Suite.mp4
|
75.7 MB
|
HITBSecConf2006 Malaysia _ Wes Brown - MOSREF(2).mp4
|
78.4 MB
|
HITBSecConf2006 Malaysia _ Wes Brown - MOSREF.mp4
|
78.4 MB
|
HITBSecConf2006 Malaysia _ Wes Brown.mp4
|
78.4 MB
|
HITBSecConf2006 Malaysia _ Window Sn.mp4
|
61.3 MB
|
HITBSecConf2006 Malaysia _ Window Snyder - Firefox Security.mp4
|
61.3 MB
|
HITBSecConf2006 Malaysia _ Yen Min C.mp4
|
77.1 MB
|
HITBSecConf2006 Malaysia _ Yen Min Cheng - Triple Play_ Triple Threats_.mp4
|
77.1 MB
|
/HITB 2007 - Malaysia/
|
CTF Prize Giving and Charity Auction.mov
|
484.6 MB
|
D1T1 - Andrew Cushman - State of Security.mov
|
244.4 MB
|
D1T1 - Grugq - Meta Anti Forensics - The Hash Hacking Harness.mov
|
92.9 MB
|
D1T1 - Marc Weber Tobias and TOOOL USA - High Security Locks.mov
|
163.1 MB
|
D1T1 - Martin Johns - Hacking the Intranet with a Webpage.mov
|
92.5 MB
|
D1T1 - Michael Thumann and Dror John Roecher - Hacking Cisco NAC.mov
|
232.6 MB
|
D1T2 - Andrea Barisani and Daniele Bianco - Injecting RDS-TMC.mov
|
265.1 MB
|
D1T2 - Frank Yuan Fan - Advanced Web Application and Database Threat Analysis with MatriXay.mov
|
85.6 MB
|
D1T2 - Raffael Marty - Insider Threat Visualization.mov
|
100.9 MB
|
D1T2 - Raoul Chiesa and Mayhem - Hacking SCADA.mov
|
80.9 MB
|
D1T2 - Roberto Preatoni - WabiSabiLabi - The Exploit Marketplace.mov
|
203.7 MB
|
D1T2 - Stefano Zanero - Anomaly Based Intrusion Detection.mov
|
165.1 MB
|
D2T1 - Alexander Kornbrust - Hacking Hardend and Secured Oracle Servers.mov
|
152.4 MB
|
D2T1 - Billy Rios and Nathan McFeters - Slipping Past the Firewall.mov
|
165.1 MB
|
D2T1 - Felix FX Lindner - Attack Surface of Modern Applications.mov
|
110.9 MB
|
D2T1 - Shreeraj Shah - Hacking AJAX and Web Services.mov
|
123.0 MB
|
D2T1 - Starbug - Hacking Biometric Passports.mov
|
113.7 MB
|
D2T1 - Window Snyder - Tools and Strategies for Securing a Large Development Project.mp4
|
121.0 MB
|
D2T2 - Dino Covotsos - Hacking the Bluetooth Stack for Fun Fame and Profit.mov
|
430.1 KB
|
D2T2 - Domingo Montanaro and Rodrigo Branco - Computer Forensics Challenge and Anti-Forensics Techniques.mov
|
450.6 KB
|
D2T2 - Fetri Miftach and Jim Geovedi - Hacking Trust aka Enterprise Hacking.mov
|
466.9 KB
|
D2T2 - Jose Nazario - Googling for Malware and Bugs.mov
|
495.6 KB
|
D2T2 - Luiz Eduardo - Protocol Fuzzing.mov
|
221.4 MB
|
D2T2 - Sarb Sembhi - An End to End Analysis of Securing Networked CCTV Systems.mov
|
265.7 MB
|
KEYNOTE 1 - Lance Spitzner - Honeypots - Past Present and Future.mp4
|
175.4 MB
|
KEYNOTE 2 - Mikko Hypponen - Online Crime and Crime Online.mp4
|
178.9 MB
|
KEYNOTE 3 - Mark Phiber Optik Abene.mov
|
2.3 MB
|
KEYNOTE 4 - Emmanuel Goldstein.mov
|
2.3 MB
|
/HITB 2008 - Dubai/
|
D1T1 - Ero Carrera - Malware Behavior Tools Scripting and Adavanced Analysis.zip
|
2.3 MB
|
D1T1 - Jim Geovedi - Hijacking VSAT Connections.zip
|
1.9 MB
|
D1T1 - Michael Thumann - Hacking Second Life.zip
|
106.7 MB
|
D1T1 - Shreeraj Shah - Securing Next Generation Applications - Scan Detect and Mitigate.zip
|
408.8 KB
|
D1T2 - Alessio Penasilico - VoIP INsecurities - Italians Do It Better.zip
|
12.9 MB
|
D1T2 - Jamie Butler - Computer Forensics and Incident Response.zip
|
172.8 KB
|
D1T2 - Meling Mudin and Lee Chin Sheng - Defensive Network Security.pdf
|
1.0 MB
|
D1T2 - Skyper - Cracking the GSM A5-1 Encryption in Seconds.zip
|
3.2 MB
|
D2T1 - Adrian Pastor - Cracking Into Embeded Devices and Beyond.zip
|
40.1 MB
|
D2T1 - Cesar Cerrudo - Token Kidnapping.zip
|
174.8 KB
|
D2T1 - Daniel Ingevaldson - Virtualization != Security.zip
|
10.6 MB
|
D2T1 - Dino Covotsos - Hacking the Bluetooth Stack for Fun Fame and Mayhem.zip
|
60.6 MB
|
D2T1 - Petko Petkov - For My Next Trick - Client Side Hacking.zip
|
7.5 MB
|
D2T1 Hacking the bluetooth stack.mpg
|
15.3 MB
|
D2T2 - Alexander Kornbrust - Practical Oracle Forensics.zip
|
1.3 MB
|
D2T2 - Benjamin Hagen and Walter Goulet - Real World Attacks Against 3G Networks Using Subscriber Devices.zip
|
385.0 KB
|
D2T2 - Domingo Montanaro - In-depth Anti-Forensics - Challenges of Steganography and Discovering Hidden Data.zip
|
1.5 MB
|
D2T2 - Raoul Chiesa and Alessio Pennasillico - Penetration Testing SCADA.zip
|
7.7 MB
|
D2T2 - Rodrigo Rubira Branco - Hacking The Cell Architecture.zip
|
1.5 MB
|
DAY 2 - KEYNOTE - Jeremiah Grossman.zip
|
5.6 MB
|
/HITB 2008 - Malaysia/
|
CTF Prize Giving & Charity Auction.mp4
|
339.5 MB
|
Day1-Keynote-1.JeremiahGrossman-The Art Of Click Jacking.mp4
|
210.3 MB
|
Day1-Keynote-2.MarcusRanum-Cyberwar Is Bullshit.mp4
|
211.1 MB
|
Day1-Track1-DinoDaiZovi-Mac OS X Exploitation.mp4
|
218.1 MB
|
Day1-Track1-Ero Carrera - Analysis and Visualization of Common Packers.mp4
|
211.6 MB
|
Day1-Track1-HernanOchoa-Pass The Hass Toolkit for Windows.mp4
|
198.1 MB
|
Day1-Track1-Jim Geovedi & Raditya Iryandi - Hacking a Bird in the Sky 2.0.mp4
|
139.2 MB
|
Day1-Track1-Julian Ho - MoocherHunting - Real-Time Geo-Location Unauthorized WiFi Users.mp4
|
190.6 MB
|
Day1-Track1-Peter Silberman - Full Process Reconsitution from Memory.mp4
|
197.1 MB
|
Day1-Track1-ThomasVarghese-Delivering Identity Management 2.0 by Leveraging OPSS.mp4
|
173.9 MB
|
Day1-Track2-Alexander Tereskin - Bluepilling the Xen Hypervisor.mp4
|
178.9 MB
|
Day1-Track2-Eric Lawrence - Internet Explorer 8 - Trustworthy Engineering and Browsing.mp4
|
230.4 MB
|
Day1-Track2-Jonathan Squire - A Fox in the Hen House - UPnP IGD.mp4
|
208.4 MB
|
Day1-Track2-Paul Craig - Hacking Internet Kiosks.mp4
|
230.1 MB
|
Day1-Track2-Roberto Preatoni - Time for a free hardware foundation.mp4
|
194.5 MB
|
Day1-Track2-Saumil Shah - Browser Exploits - A New Model For Browser Security.mp4
|
207.9 MB
|
Day1-Track2-The Grugq - How The Leopard Hides His Spots - OS X Anti-Forensics Techniques.mp4
|
201.0 MB
|
Day2-Keynote.The Pirate Bay - Dissolving an Industry as a Hobby.mp4
|
308.1 MB
|
Day2-Track1-Charl Van Der Walt - Pushing the Camel Through the Eye of a Needle.mp4
|
240.6 MB
|
Day2-Track1-Charlie Miller - iPwning the iPhone.mp4
|
217.9 MB
|
Day2-Track1-Ilfak Guilfanov - Decompilers and Beyond.mp4
|
216.6 MB
|
Day2-Track1-Kris Kaspersky - Remote Code Execution Through Intel CPU Bugs.mp4
|
123.0 MB
|
Day2-Track1-Petko D Petkov - Client-Side Security.mp4
|
146.7 MB
|
Day2-Track2-AR - Next Generation Reverse Shell.mp4
|
236.5 MB
|
Day2-Track2-Adrian Pagvac Pastor - Cracking into Embedded Devices and Beyond.mp4
|
206.8 MB
|
Day2-Track2-Matthew Geiger - How to Build Your Own Password Cracker with a VM.mp4
|
195.2 MB
|
Day2-Track2-Shreeraj Shah - Top 10 Web 2.0 Attacks.mp4
|
236.9 MB
|
/HITB 2009 - Malaysia/
|
Alexander Gazet & Yoann Guilot - Defeating Software Protection with Metasm.mp4
|
118.3 MB
|
Announcement of CTF Winners and Final HITB Charity Auction.mp4
|
189.1 MB
|
Bruno Goncalves - Hacking From The Restroom.mp4
|
111.6 MB
|
CTF.mp4
|
3.0 MB
|
Dimitrious Petroulos - Having Fun With ATMs and HSMs.mp4
|
135.7 MB
|
Ed Skoudis - The Bad Guys Are Winning. So Now What.mp4
|
315.9 MB
|
Frederic Raynal, Guillaume Deluge, Damien Aumaitre - PDF Origami Strikes Back.mp4
|
117.1 MB
|
Fyodor Yarochkin and The Grugq - From Russia With Love.exe.mp4
|
168.3 MB
|
Harron Meer - Clobbering The Cloud.mp4
|
111.4 MB
|
Job De Haas - Side Channel Analysis on Embedded Systems.mp4
|
145.1 MB
|
Joe Grand - Hardware Is The New Software.mp4
|
124.5 MB
|
Julian Assage - Publishing the Unpublished.mp4
|
158.0 MB
|
Julien Tinnes, Chris Evans - Security In-Depth for Linux Software.mp4
|
122.6 MB
|
Kuza55 - Implementing a Blind TCPIP Hijacking Tool.mp4
|
97.4 MB
|
Lucas Adamski - Freeing Sisyphus, Declaratively Address Web Security Issue.mp4
|
92.5 MB
|
MARES - APRS,HAM Radio.mp4
|
142.7 MB
|
Mark Dowd - Attacking Interoperability.mp4
|
115.9 MB
|
Meling Mudin & CS Lee - Network Forensics.mp4
|
179.6 MB
|
Nguyen Anh Quyuh - eKimono, A Malware Scanner for Virtual Machines.mp4
|
137.9 MB
|
Nishad Herath - How Low Will Malware Go.mp4
|
117.1 MB
|
Paul Theriault - Browser Ghosting Attacks.mp4
|
73.5 MB
|
Rop Gonggip - Modern Day Robin Hoods.mp4
|
166.6 MB
|
Saumil Shah - How To Own The World, One Desktop At A Time.mp4
|
135.2 MB
|
Sheran Gunasekera - Bugs and Kisses, Spying on Blackberry Users for Fun.mp4
|
134.9 MB
|
Steve Anson - Detecting Computer Intrusions.mp4
|
94.9 MB
|
The Secret History Of Hacking.DivxMp3.mp4
|
97.3 MB
|
Travis Ormandy - Making Software Dumber.mp4
|
69.1 MB
|
ctf-clip1.mp4
|
6.6 MB
|
/HITB 2010 - Malaysia/
|
HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 1.mp4
|
11.7 MB
|
HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 1.srt
|
9.0 KB
|
HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 2.mp4
|
13.7 MB
|
HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 2.srt
|
8.0 KB
|
HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 3.mp4
|
18.5 MB
|
HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 3.srt
|
11.1 KB
|
HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 4.mp4
|
13.7 MB
|
HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 4.srt
|
7.3 KB
|
HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 5.mp4
|
11.1 MB
|
HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 5.srt
|
7.2 KB
|
HITB2010KUL Keynote 2 - Taking Back the DNS Part 1.mp4
|
11.7 MB
|
HITB2010KUL Keynote 2 - Taking Back the DNS Part 2.mp4
|
11.8 MB
|
HITB2010KUL Keynote 2 - Taking Back the DNS Part 3.mp4
|
18.4 MB
|
HITB2010KUL Keynote 2 - Taking Back the DNS Part 4.mp4
|
21.9 MB
|
HITB2010KUL Keynote 2 - Taking Back the DNS Part 5.mp4
|
17.2 MB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 1.mp4
|
13.7 MB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 1.srt
|
8.6 KB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 10.mp4
|
17.3 MB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 10.srt
|
10.2 KB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 2.mp4
|
13.7 MB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 3.mp4
|
16.8 MB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 3.srt
|
11.0 KB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 4.mp4
|
13.7 MB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 4.srt
|
8.9 KB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 5.mp4
|
11.8 MB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 5.srt
|
9.5 KB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 6.mp4
|
16.8 MB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 7.mp4
|
13.3 MB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 8.mp4
|
13.3 MB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 8.srt
|
8.5 KB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 9.mp4
|
16.4 MB
|
HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 9.srt
|
11.0 KB
|
/HITB 2011 - Amsterdam/
|
Hackers Op De Gracht.mp4
|
32.8 MB
|
/HITB 2011 - Malaysia/
|
D1 LABS - VoIP Attacking CUCM.pdf
|
2.8 MB
|
D1 SIGINT - Adnan Mohd Shukor - Fun With Javascript DeObfuscation.pdf
|
4.2 MB
|
D1 SIGINT - Elger Stitch Jonker - Building the Hackerspace.pdf
|
8.8 MB
|
D1 SIGINT - Jurre van Bergen and Youri van der Zwart - Abusing RFID.pdf
|
790.1 KB
|
D1 SIGINT - Muhammad Najmi Ahmad Zabidi - Compiling Features for Malcious Binaries.pdf
|
420.2 KB
|
D1 SIGINT - Raoul Chiesa - Cyber Weapons in 2011.pdf
|
7.4 MB
|
D1T1 - Alex Kirk - Mobile Malware Analysis.pdf
|
1.9 MB
|
D1T1 - Andrea Barisani and Daniele Bianco - EMV Protocol and POS Physical Analysis.pdf
|
2.1 MB
|
D1T1 - Elena K and Joffrey C - Webshells - A Framework for Pentesting.pdf
|
5.4 MB
|
D1T1 - Jonathan Brossard - Post Memory Corruption Analysis.pdf
|
284.6 KB
|
D1T1 - Mahmud Ab Rahman - Reverse Engineering Android Malware.pdf
|
9.7 MB
|
D1T1 - Marco Balduzzi - Attacking the Privacy of Social Network Users.pdf
|
6.7 MB
|
D1T1 - Mariano Nunez - Attacks Against SAP Web Applications.pdf
|
1.4 MB
|
D1T1 - Riley Hassell - Exploiting Androids for Fun and Profit.pdf
|
9.4 MB
|
D1T1 - Stefan Esser - Antid0te 2.0 - ASLR in iOS.pdf
|
5.0 MB
|
D1T2 - Alexander Polyakov and Dimitry Chastuhin - SAPocalypse Now.pdf
|
15.9 MB
|
D1T2 - Asia Slowinka - Excavating Data Structures from Stripped Binaries.pdf
|
902.7 KB
|
D1T2 - Claudio Criscione - MetaXSSploit - Bringing XSS to Pentesting.pdf
|
3.2 MB
|
D1T2 - Don Bailey - GoodFUN - The GoodFET.pdf
|
991.1 KB
|
D1T2 - Guillaume Prigent - Really Open Source Information Gathering.pdf
|
5.6 MB
|
D1T2 - Jim Geovedi - Satellite Telephony Security.pdf
|
5.7 MB
|
D1T2 - Laurent Oudot - Extracting Senstive Data from Your iPhone.pdf
|
14.6 MB
|
D1T2 - Laurent Weber - All your Base Stations Are Belong To Us.pdf
|
320.0 KB
|
D1T2 - The Grugq - Smashing the Slack for Fun and Profit.pdf
|
14.7 MB
|
D1T2 - Thomas Caplin - Silverlight - A New Way to Surf .Net Holes.pdf
|
1.5 MB
|
D1T2 - biatch0 and RuFI0 - Pwning a 4G Device for the LuLz.pdf
|
3.7 MB
|
D1T3 - Barry van Kampen - DIY Video Surveillance.pdf
|
915.7 KB
|
D1T3 - Itzhak Zuk Avraham - Popping Shell On Android Devices.pdf
|
1.3 MB
|
D1T3 - Jimmy Shah - Mobile App Moolah.pdf
|
1.7 MB
|
D1T3 - Mitja Kolsek - Remote Binary Planting.pdf
|
4.4 MB
|
D2 LABS - Daniel Mende and Jim Geovedi - Practical 3G-4G Attacks.pdf
|
2.3 MB
|
D2 SIGINT - Jim Manico - Ghost of XSS Past Present and Future.pdf
|
2.2 MB
|
D2 SIGINT - Keith Lee - iPhone Espionage.pdf
|
5.1 MB
|
D2 SIGINT - Martin Knobloch - Secure Your Software Using OWASP.pdf
|
1.6 MB
|
D2 SIGINT - Nur Muhammed Kamil - MyKotakPasir.pdf
|
1.2 MB
|
D2T1 - Andreas Weigenstein - SQL Injection with ABAP.pdf
|
1.3 MB
|
D2T1 - Andrew Gavin - Stealing Sensitive Data from Thousands of Systems.pdf
|
65.9 KB
|
D2T1 - Daniele Bianco and Adam Laurie - Credit Card Skimming and PIN Harvesting in an EMV World.pdf
|
3.6 MB
|
D2T1 - Hendrik Scholz - Air Travel Hacking.pdf
|
5.7 MB
|
D2T1 - Itzik Kotler - Let Me Stuxnet You.pdf
|
542.6 KB
|
D2T1 - Ivan Ristic - A Study of What Really Breaks SSL.pdf
|
3.2 MB
|
D2T1 - Marc Blanchou and Mathew Solnik - Blackbox Android.pdf
|
3.7 MB
|
D2T1 - Ravi B Kevin R and Nico G - Femtocells.pdf
|
6.2 MB
|
D2T1 - Stefan Esser - iPhone Exploitation - One ROPe to Bind Them All.pdf
|
8.6 MB
|
D2T2 - D. Mende & Enno Rey - Attacking 3G and 4G Networks.pdf
|
2.4 MB
|
D2T2 - Jim Geovedi and Raoul Chiesa - Hacking a Bird in the Sky.pdf
|
18.1 MB
|
D2T2 - KaiJern Lau - Malware Sandboxing the Xandora Way.pdf
|
16.2 MB
|
D2T2 - Paul Sebastian Ziegler - Stenographic AVI FIlesystems.pdf
|
3.1 MB
|
D2T2 - Philippe Langlois - Attacking the GPRS Roaming Exchange.pdf
|
13.5 MB
|
D2T2 - Rosario Valotta - Cookie Jacking.pdf
|
2.6 MB
|
D2T2 - Shreeraj Shah - Next Generation Web Attacks.pdf
|
752.9 KB
|
D2T2 - Travis Goodspeed - Remotely Exploiting Layer One.pdf
|
318.5 KB
|
D2T3 - Aditya K Sood - Spying on SpyEye.pdf
|
2.8 MB
|
D2T3 - Bert Hubert - DNSSEC - The Good The Bad and The Very Bad.pdf
|
407.0 KB
|
D2T3 - Guillaume Delugre - Reverse Engineering Broadcom NetExtreme Firmware.pdf
|
1.3 MB
|
D2T3 - Maarten Oosterink - Attacking Critical Infrastructure.pdf
|
2.5 MB
|
D2T3 - Travis Goodspeed - Building a Promiscious nRF24L01 Packet Sniffer.pdf
|
32.2 MB
|
HackWEEKDAY - Arzumy.pdf
|
250.1 KB
|
KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.pdf
|
1.6 MB
|
/.../D1T3 - Didier Stevens - Malicious PDF Analysis Lab/
|
HITB2011AMS - PDF Chapter.pdf
|
272.0 KB
|
HITB2011AMS - Slides.pdf
|
42.4 KB
|
HITB2011AMS - Solutions.txt
|
2.7 KB
|
/.../D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities/
|
D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities.zip
|
50.6 MB
|
/HITB 2012 - Amsterdam/
|
#HITB2012AMS - KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line (2).srt
|
89.7 KB
|
#HITB2012AMS - KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line.mp4
|
164.7 MB
|
#HITB2012AMS - KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line.srt
|
89.7 KB
|
#HITB2012AMS CLOSING KEYNOTE - Ms jaya Baloo - Identity, Privacy and Security.mp4
|
178.1 MB
|
#HITB2012AMS D1T1 - Arnauld Mascret - Whistling Over the Wire.mp4
|
159.3 MB
|
#HITB2012AMS D1T1 - Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis (2).srt
|
66.3 KB
|
#HITB2012AMS D1T1 - Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis.mp4
|
152.7 MB
|
#HITB2012AMS D1T1 - Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis.srt
|
66.3 KB
|
#HITB2012AMS D1T1 - Ivo Pooters - Turning Android Inside Out (2).srt
|
72.1 KB
|
#HITB2012AMS D1T1 - Ivo Pooters - Turning Android Inside Out.mp4
|
150.9 MB
|
#HITB2012AMS D1T1 - Ivo Pooters - Turning Android Inside Out.srt
|
72.1 KB
|
#HITB2012AMS D1T1 - Juan Pablo Echtegoyen - Attacking the SAP Solution Manager (2).srt
|
64.2 KB
|
#HITB2012AMS D1T1 - Juan Pablo Echtegoyen - Attacking the SAP Solution Manager.mp4
|
180.5 MB
|
#HITB2012AMS D1T1 - Juan Pablo Echtegoyen - Attacking the SAP Solution Manager.srt
|
64.2 KB
|
#HITB2012AMS D1T1 - Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012 (2).srt
|
76.4 KB
|
#HITB2012AMS D1T1 - Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012.mp4
|
166.1 MB
|
#HITB2012AMS D1T1 - Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012.srt
|
76.4 KB
|
#HITB2012AMS D1T2 - Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV (2).srt
|
95.9 KB
|
#HITB2012AMS D1T2 - Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV.mp4
|
244.2 MB
|
#HITB2012AMS D1T2 - Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV.srt
|
95.9 KB
|
#HITB2012AMS D1T2 - Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets (2).srt
|
76.8 KB
|
#HITB2012AMS D1T2 - Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets.mp4
|
168.4 MB
|
#HITB2012AMS D1T2 - Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets.srt
|
76.8 KB
|
#HITB2012AMS D1T2 - Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE (2).srt
|
68.7 KB
|
#HITB2012AMS D1T2 - Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE.mp4
|
214.8 MB
|
#HITB2012AMS D1T2 - Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE.srt
|
68.7 KB
|
#HITB2012AMS D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks (2).srt
|
60.5 KB
|
#HITB2012AMS D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks.mp4
|
123.9 MB
|
#HITB2012AMS D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks.srt
|
60.5 KB
|
#HITB2012AMS D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT (2).srt
|
44.2 KB
|
#HITB2012AMS D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT.mp4
|
124.4 MB
|
#HITB2012AMS D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT.srt
|
44.2 KB
|
#HITB2012AMS D2T1 - A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities (2).srt
|
107.2 KB
|
#HITB2012AMS D2T1 - A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities.mp4
|
192.1 MB
|
#HITB2012AMS D2T1 - A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities.srt
|
107.2 KB
|
#HITB2012AMS D2T1 - Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond (2).srt
|
82.9 KB
|
#HITB2012AMS D2T1 - Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond.mp4
|
124.7 MB
|
#HITB2012AMS D2T1 - Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond.srt
|
82.9 KB
|
#HITB2012AMS D2T1 - Dr Marco Balduzzi - SatanCloud (2).srt
|
68.0 KB
|
#HITB2012AMS D2T1 - Dr Marco Balduzzi - SatanCloud.mp4
|
139.4 MB
|
#HITB2012AMS D2T1 - Dr Marco Balduzzi - SatanCloud.srt
|
68.0 KB
|
#HITB2012AMS D2T1 - Georgia Weidman - Bypassing the Android Permission Model (2).srt
|
84.4 KB
|
#HITB2012AMS D2T1 - Georgia Weidman - Bypassing the Android Permission Model.mp4
|
199.6 MB
|
#HITB2012AMS D2T1 - Georgia Weidman - Bypassing the Android Permission Model.srt
|
84.4 KB
|
#HITB2012AMS D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services (2).srt
|
75.6 KB
|
#HITB2012AMS D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services.mp4
|
178.6 MB
|
#HITB2012AMS D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services.srt
|
75.6 KB
|
#HITB2012AMS D2T2 - Dream Team - Part 1 - Corona for iOS 5.0.1 (2).srt
|
59.7 KB
|
#HITB2012AMS D2T2 - Dream Team - Part 1 - Corona for iOS 5.0.1.mp4
|
201.7 MB
|
#HITB2012AMS D2T2 - Dream Team - Part 1 - Corona for iOS 5.0.1.srt
|
59.7 KB
|
#HITB2012AMS D2T2 - Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing) (2).srt
|
68.7 KB
|
#HITB2012AMS D2T2 - Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing).mp4
|
190.1 MB
|
#HITB2012AMS D2T2 - Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing).srt
|
68.7 KB
|
#HITB2012AMS D2T2 - Nicolas Gregoire - Attacking XML Preprocessing (2).srt
|
62.3 KB
|
#HITB2012AMS D2T2 - Nicolas Gregoire - Attacking XML Preprocessing.mp4
|
162.2 MB
|
#HITB2012AMS D2T2 - Nicolas Gregoire - Attacking XML Preprocessing.srt
|
62.3 KB
|
#HITB2012AMS D2T2 - Rahul Sasi - CXML VXML IVR Pentesting for Auditors.mp4
|
130.5 MB
|
#HITB2012AMS D2T2 - Steven Seeley - Ghost in the Windows 7 Allocator (2).srt
|
81.6 KB
|
#HITB2012AMS D2T2 - Steven Seeley - Ghost in the Windows 7 Allocator.mp4
|
158.9 MB
|
#HITB2012AMS D2T2 - Steven Seeley - Ghost in the Windows 7 Allocator.srt
|
81.6 KB
|
#HITB2012AMS DAY 1 SPECIAL CLOSING - Rop Gonggrijp (2).srt
|
46.2 KB
|
#HITB2012AMS DAY 1 SPECIAL CLOSING - Rop Gonggrijp.mp4
|
114.4 MB
|
#HITB2012AMS DAY 1 SPECIAL CLOSING - Rop Gonggrijp.srt
|
46.2 KB
|
#HITB2012AMS KEYNOTE 2 - Bruce Schneier - Trust Security and Society (2).srt
|
72.4 KB
|
#HITB2012AMS KEYNOTE 2 - Bruce Schneier - Trust Security and Society.mp4
|
159.8 MB
|
#HITB2012AMS KEYNOTE 2 - Bruce Schneier - Trust Security and Society.srt
|
72.4 KB
|
Hackers Op De Gracht.mp4
|
96.8 MB
|
/HITB 2012 - Malaysia/
|
#HITB2012KUL D1T1 - A. Barisani & D. Bianco - Practical Exploitation of Embedded Systems.mp4
|
205.9 MB
|
#HITB2012KUL D1T1 - A. Barisani & D. Bianco - Practical Exploitation of Embedded Systems.srt
|
84.4 KB
|
#HITB2012KUL D1T1 - Chris Wysopal - Data Mining a Mountain of Vulnerabilities.mp4
|
226.1 MB
|
#HITB2012KUL D1T1 - Chris Wysopal - Data Mining a Mountain of Vulnerabilities.srt
|
89.2 KB
|
#HITB2012KUL D1T1 - Lucas Adamski - Mozilla Apps, Firefox OS and You.mp4
|
216.5 MB
|
#HITB2012KUL D1T1 - Lucas Adamski - Mozilla Apps, Firefox OS and You.srt
|
72.9 KB
|
#HITB2012KUL D1T1 - P. Langlois & E. Gadaix - Why Telcos Keep Getting Hacked.mp4
|
264.3 MB
|
#HITB2012KUL D1T1 - P. Langlois & E. Gadaix - Why Telcos Keep Getting Hacked.srt
|
94.8 KB
|
#HITB2012KUL D1T1 - Petko D. Petkov - A Short History of the JavaScript Security Arsenal.mp4
|
253.4 MB
|
#HITB2012KUL D1T1 - Petko D. Petkov - A Short History of the JavaScript Security Arsenal.srt
|
90.2 KB
|
#HITB2012KUL D1T2 - Don Bailey - Hackers the Movie A Retrospective.mp4
|
189.2 MB
|
#HITB2012KUL D1T2 - Don Bailey - Hackers the Movie A Retrospective.srt
|
79.5 KB
|
#HITB2012KUL D1T2 - Haroon Meer - You and Your Research.mp4
|
158.1 MB
|
#HITB2012KUL D1T2 - Haroon Meer - You and Your Research.srt
|
72.7 KB
|
#HITB2012KUL D1T2 - Marc Van Hauser Heuse - IPv6 Insecurity Revolutions.mp4
|
271.7 MB
|
#HITB2012KUL D1T2 - Marc Van Hauser Heuse - IPv6 Insecurity Revolutions.srt
|
92.0 KB
|
#HITB2012KUL D1T2 - Mark Dowd & Tarjei Mandt - iOS 6 Security.mp4
|
194.4 MB
|
#HITB2012KUL D1T2 - Mark Dowd & Tarjei Mandt - iOS 6 Security.srt
|
81.3 KB
|
#HITB2012KUL D1T2 - Meder Kydyraliev - Defibrilating Web Security.mp4
|
209.2 MB
|
#HITB2012KUL D1T2 - Meder Kydyraliev - Defibrilating Web Security.srt
|
80.0 KB
|
#HITB2012KUL D1T2 - Wes Brown - Supercomputing, Malware and Correlation.mp4
|
165.0 MB
|
#HITB2012KUL D1T2 - Wes Brown - Supercomputing, Malware and Correlation.srt
|
49.3 KB
|
#HITB2012KUL D1T3 - John Captain Crunch Draper - A Historical Look at the Phreaking Scene.mp4
|
180.4 MB
|
#HITB2012KUL D1T3 - John Captain Crunch Draper - A Historical Look at the Phreaking Scene.srt
|
75.5 KB
|
#HITB2012KUL D1T3 - Paul Sebastian Ziegler - Hacking in The Far East.mp4
|
201.0 MB
|
#HITB2012KUL D1T3 - Paul Sebastian Ziegler - Hacking in The Far East.srt
|
97.0 KB
|
#HITB2012KUL D1T3 - The Grugq - OPSEC Because Jail is for wuftpd.mp4
|
216.6 MB
|
#HITB2012KUL D1T3 - The Grugq - OPSEC Because Jail is for wuftpd.srt
|
91.7 KB
|
#HITB2012KUL D2 PANEL DISCUSSION iOS OS X Security.mp4
|
182.7 MB
|
#HITB2012KUL D2 PANEL DISCUSSION iOS OS X Security.srt
|
75.8 KB
|
#HITB2012KUL D2T1 - Chris Evans - Element 1337 in the Periodic Table Pwnium.mp4
|
179.0 MB
|
#HITB2012KUL D2T1 - Chris Evans - Element 1337 in the Periodic Table Pwnium.srt
|
75.4 KB
|
#HITB2012KUL D2T1 - Katie Moussouris - How to Get Along With Vendors Without Really Trying.mp4
|
192.4 MB
|
#HITB2012KUL D2T1 - Katie Moussouris - How to Get Along With Vendors Without Really Trying.srt
|
92.1 KB
|
#HITB2012KUL D2T1 - Ollie Whitehouse - Finding the Weak Link in Binaries.mp4
|
165.9 MB
|
#HITB2012KUL D2T1 - Ollie Whitehouse - Finding the Weak Link in Binaries.srt
|
59.5 KB
|
#HITB2012KUL D2T1 - Paul Vixie - Silo Busting in Information Security The ISC SIE Approach.mp4
|
256.5 MB
|
#HITB2012KUL D2T1 - Paul Vixie - Silo Busting in Information Security The ISC SIE Approach.srt
|
85.3 KB
|
#HITB2012KUL D2T1 - Rodrigo Rubira Branco - Study of Malware Obfuscation Techniques.mp4
|
238.1 MB
|
#HITB2012KUL D2T1 - Rodrigo Rubira Branco - Study of Malware Obfuscation Techniques.srt
|
89.4 KB
|
#HITB2012KUL D2T1 - Shreeraj Shah - XSS & CSRF Strike Back -- Powered by HTML5.mp4
|
216.8 MB
|
#HITB2012KUL D2T1 - Shreeraj Shah - XSS & CSRF Strike Back -- Powered by HTML5.srt
|
80.6 KB
|
#HITB2012KUL D2T2 - Fyodor Yarochkin - Messing Up the Kids Playground.mp4
|
267.2 MB
|
#HITB2012KUL D2T2 - Fyodor Yarochkin - Messing Up the Kids Playground.srt
|
93.5 KB
|
#HITB2012KUL D2T2 - Jeremiah Grossman - Why Web Security is Fundamentally Broken.mp4
|
192.3 MB
|
#HITB2012KUL D2T2 - Jeremiah Grossman - Why Web Security is Fundamentally Broken.srt
|
73.4 KB
|
#HITB2012KUL D2T2 - John Viega - Crypto for the Public Cloud.mp4
|
180.5 MB
|
#HITB2012KUL D2T2 - John Viega - Crypto for the Public Cloud.srt
|
71.2 KB
|
#HITB2012KUL D2T2 - Saumil Shah - Innovative Approaches to Exploit Delivery.mp4
|
219.9 MB
|
#HITB2012KUL D2T2 - Saumil Shah - Innovative Approaches to Exploit Delivery.srt
|
66.6 KB
|
#HITB2012KUL D2T3 - OPEN BOTTLE - Security Industry Panel Discussion.mp4
|
439.2 MB
|
#HITB2012KUL D2T3 - Emmanuel Gadaix - Something MEGA.mp4
|
143.5 MB
|
#HITB2012KUL D2T3 - Emmanuel Gadaix - Something MEGA.srt
|
56.1 KB
|
#HITB2012KUL D2T3 - Felix FX Lindner - Hacking Huawei VRP.mp4
|
164.7 MB
|
#HITB2012KUL D2T3 - Felix FX Lindner - Hacking Huawei VRP.srt
|
51.8 KB
|
#HITB2012KUL D2T3 - Mikko Hypponen - Behind Enemy Lines.mp4
|
244.4 MB
|
#HITB2012KUL D2T3 - Mikko Hypponen - Behind Enemy Lines.srt
|
80.7 KB
|
#HITB2012KUL D2T3 - Stefano Zanero - Scalable Malware Analysis.mp4
|
282.4 MB
|
#HITB2012KUL D2T3 - Stefano Zanero - Scalable Malware Analysis.srt
|
75.1 KB
|
/HITB 2013 - Amsterdam/
|
#HITB2013AMS CLOSING KEYNOTE Winn Schwartau - The History of the Future of InfoSec.mp4
|
230.5 MB
|
#HITB2013AMS CLOSING KEYNOTE Winn Schwartau - The History of the Future of InfoSec.srt
|
90.8 KB
|
#HITB2013AMS Coverage on RSI Telegiornale (Italian).mp4
|
6.1 MB
|
#HITB2013AMS D1T1 Hugo Teso - Aircraft Hacking Practical Aero Series.mp4
|
189.5 MB
|
#HITB2013AMS D1T1 Hugo Teso - Aircraft Hacking Practical Aero Series.srt
|
97.5 KB
|
#HITB2013AMS D1T1 P Uhley and K Raman - Security Response in the Age of Mass Customized Attacks.mp4
|
220.3 MB
|
#HITB2013AMS D1T1 P Uhley and K Raman - Security Response in the Age of Mass Customized Attacks.srt
|
108.8 KB
|
#HITB2013AMS D1T1 Petko D Petkov - Defeating the Intercepting Web Proxy.mp4
|
231.8 MB
|
#HITB2013AMS D1T1 Petko D Petkov - Defeating the Intercepting Web Proxy.srt
|
100.7 KB
|
#HITB2013AMS D1T1 Sergey Bratus and Julian Bangert - Page Fault Liberation Army.mp4
|
262.4 MB
|
#HITB2013AMS D1T1 Sergey Bratus and Julian Bangert - Page Fault Liberation Army.srt
|
90.4 KB
|
#HITB2013AMS D1T1 Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.mp4
|
238.6 MB
|
#HITB2013AMS D1T1 Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.srt
|
85.8 KB
|
#HITB2013AMS D1T1 V. Vorontsov and A. Golovko - SSRF PWNs - New Techniques and Stories.mp4
|
168.8 MB
|
#HITB2013AMS D1T1 V. Vorontsov and A. Golovko - SSRF PWNs - New Techniques and Stories.srt
|
59.5 KB
|
#HITB2013AMS D1T2 Daniel Mende - Paparazzi over IP.mp4
|
166.2 MB
|
#HITB2013AMS D1T2 Daniel Mende - Paparazzi over IP.srt
|
70.1 KB
|
#HITB2013AMS D1T2 Nicolas Seriot - Abusing Twitter s API and OAuth Implementation.mp4
|
150.4 MB
|
#HITB2013AMS D1T2 Nicolas Seriot - Abusing Twitter s API and OAuth Implementation.srt
|
52.4 KB
|
#HITB2013AMS D1T2 Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in MS Windows Kernel.mp4
|
175.7 MB
|
#HITB2013AMS D1T2 Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in MS Windows Kernel.srt
|
49.2 KB
|
#HITB2013AMS D1T2 Philippe Langlois - LTE Pwnage - Hacking Core Network Elements.mp4
|
229.3 MB
|
#HITB2013AMS D1T2 Philippe Langlois - LTE Pwnage - Hacking Core Network Elements.srt
|
75.5 KB
|
#HITB2013AMS D1T2 Tal Zeltzer - Analysis to Remote Root 0day in a SSL-VPN Appliance.mp4
|
184.0 MB
|
#HITB2013AMS D1T2 Tal Zeltzer - Analysis to Remote Root 0day in a SSL-VPN Appliance.srt
|
56.0 KB
|
#HITB2013AMS D1T2 Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.mp4
|
168.5 MB
|
#HITB2013AMS D1T2 Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.srt
|
59.4 KB
|
#HITB2013AMS D2T1 Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.mp4
|
120.3 MB
|
#HITB2013AMS D2T1 Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.srt
|
40.4 KB
|
#HITB2013AMS D2T1 Evad3rs - Swiping Through Modern Security Features.mp4
|
198.1 MB
|
#HITB2013AMS D2T1 Evad3rs - Swiping Through Modern Security Features.srt
|
87.7 KB
|
#HITB2013AMS D2T1 Peter Geissler and Steven Ketelaar - How I Met Your Modem.mp4
|
173.4 MB
|
#HITB2013AMS D2T1 Peter Geissler and Steven Ketelaar - How I Met Your Modem.srt
|
71.3 KB
|
#HITB2013AMS D2T1 S. Shekyan and A. Harutyunyan - Turning Your Surveillance Camera Against You.mp4
|
162.8 MB
|
#HITB2013AMS D2T1 S. Shekyan and A. Harutyunyan - Turning Your Surveillance Camera Against You.srt
|
56.3 KB
|
#HITB2013AMS D2T1 Sebastien Kaczmarek - Dreamboot - A UEFI Bootkit.mp4
|
246.4 MB
|
#HITB2013AMS D2T1 Sebastien Kaczmarek - Dreamboot - A UEFI Bootkit.srt
|
64.8 KB
|
#HITB2013AMS D2T2 Chilik Tamir - iNalyzer No More Blackbox iOS Analysis.mp4
|
234.6 MB
|
#HITB2013AMS D2T2 Dan Tentler - System Shock - The Shodan Computer Search Engine.mp4
|
168.9 MB
|
#HITB2013AMS D2T2 Ofer Shezaf - The Infosec Risks of Charging Electric Cars.mp4
|
213.1 MB
|
#HITB2013AMS D2T2 Ofer Shezaf - The Infosec Risks of Charging Electric Cars.srt
|
77.8 KB
|
#HITB2013AMS D2T2 Petukhov, Noseevich and Gamayunov - Breaking Certified Crypto in Banking Apps.mp4
|
178.7 MB
|
#HITB2013AMS D2T2 Petukhov, Noseevich and Gamayunov - Breaking Certified Crypto in Banking Apps.srt
|
52.6 KB
|
#HITB2013AMS D2T2 Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.mp4
|
128.0 MB
|
#HITB2013AMS D2T2 Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.srt
|
56.4 KB
|
#HITB2013AMS Evad3rs Press Briefing - 11th April 2013.mp4
|
115.5 MB
|
#HITB2013AMS Evad3rs Press Briefing - 11th April 2013.srt
|
18.8 KB
|
#HITB2013AMS KEYNOTE 1 E. Schwartz - Embracing the Uncertainty of Attacks with Big Data Analytics.mp4
|
234.2 MB
|
#HITB2013AMS KEYNOTE 1 E. Schwartz - Embracing the Uncertainty of Attacks with Big Data Analytics.srt
|
95.1 KB
|
#HITB2013AMS KEYNOTE 2 Bob Lord - Rethinking the Front Lines.mp4
|
229.3 MB
|
#HITB2013AMS KEYNOTE 2 Bob Lord - Rethinking the Front Lines.srt
|
98.8 KB
|
/presentations/
|
D1-LAB-Sniffing-the-Airwaves-with-RTL-SDR.pdf
|
6.2 MB
|
D1T1-AIS-Exposed-New-Vulnerabilities-and-Attacks.pdf
|
4.5 MB
|
D1T1-Compromise-as-a-Service-Our-PleAZURE.pdf
|
8.2 MB
|
D1T1-Escaping-IE11-Enhanced-Protected-Mode.pdf
|
2.3 MB
|
D1T1-Hacking-Your-Cable-TV-Network-Die-Hard-Style.pdf
|
39.2 MB
|
D1T1-The-NSA-Playset.pdf
|
10.4 MB
|
D1T1-Vulnerabilities-Exposed-at-the-Protocol-Level-in-TN3270-based-Applications.pdf
|
17.3 MB
|
D1T2-Bypassing-Endpoint-Security-for-Fun-and-Profit.pdf
|
28.2 MB
|
D1T2-More-Ways-to-Defeat-Secure-Boot.pdf
|
7.3 MB
|
D1T2-REboot-Bootkits-Revisited.pdf
|
924.3 KB
|
D1T2-State-of-the-Art-Exploring-the-New-Android-KitKat-Runtime.pdf
|
641.8 KB
|
D1T3-Exploiting-NoSQL-Like-Never-Before.pdf
|
2.5 MB
|
D1T3-XSSing-Your-Way-to-Shell.pdf
|
5.0 MB
|
D2-LAB-Attack-Surface-Intelligence-of-Source-Code.pdf
|
12.5 MB
|
D2T1-Alices-Adventures-in-Smart-Building-Land.pdf
|
7.2 MB
|
D2T1-Exploiting-Passbook-to-Fly-for-Free.pdf
|
19.8 MB
|
D2T1-G-Jacking-AppEngine-based-Applications.pdf
|
784.7 KB
|
D2T1-GRX-and-a-Spy-Agency.pdf
|
7.7 MB
|
D2T1-Why-Port-Scans-are-for-Pussies.pdf
|
2.4 MB
|
D2T2-Bitcoin-Forensics-Fact-or-Fiction.pdf
|
24.7 MB
|
D2T2-Breaking-Cloud-Isolation.pdf
|
1.1 MB
|
D2T2-Exploring-and-Exploiting-iOS-Web-Browsers.pdf
|
2.8 MB
|
D2T2-Shellcodes-for-ARM-Your-Pills-Dont-Work-on-Me-x86.pdf
|
4.3 MB
|
D2T2-The-InSecurity-of-Pull-Printing-Solutions.pdf
|
4.2 MB
|
D2T3-Exploit-Development-for-New-Platforms-Based-on-64-bits.pdf
|
74.1 KB
|
D2T3-Format-Reverser-of-Data-Objects.pdf
|
23.0 MB
|
D2T3-Using-Javascript-Security-Features-to-Kill-Itself.pdf
|
2.0 MB
|
/HITB 2014 - Malaysia/
|
#HITB2014KUL CLOSING KEYNOTE - Richard Thieme.mp4
|
238.0 MB
|
#HITB2014KUL CLOSING KEYNOTE - Richard Thieme.srt
|
81.4 KB
|
/HITB 2016 - Amsterdam/
|
#HITB2016AMS - D2T1 - Forging a Wireless Time Signal to Attack NTP Servers - Y. Zheng & H. Shan.mp4
|
69.0 MB
|
#HITB2016AMS - The Women In Cyber Security Woman Of The Year 2016 Award Ceremony.mp4
|
75.1 MB
|
#HITB2016AMS CLOSING KEYNOTE - Hardware Side Channels in Virtualized Environments - Sophia D Antoine.mp4
|
73.1 MB
|
#HITB2016AMS CommSec Track - CLOSING COMMENTS - Martin Knobloch.mp4
|
4.1 MB
|
#HITB2016AMS CommSec Track D1 - Applying Regulatory Data to IoT RF Reverse Engineering - Marc Newlin.mp4
|
93.8 MB
|
#HITB2016AMS CommSec Track D1 - Don t Feed The Hippos - Martin Knobloch.mp4
|
40.2 MB
|
#HITB2016AMS CommSec Track D1 - Exploiting GLIBC Hacking Everything - Gal De Leon and Nadav Markus.mp4
|
96.4 MB
|
#HITB2016AMS CommSec Track D1 - Pentesting Chatops - Melanie Rieback.mp4
|
71.1 MB
|
#HITB2016AMS CommSec Track D1 - Unformation In The Era Of Hyperconnectivity - Elisabeth De Leeuw.mp4
|
41.9 MB
|
#HITB2016AMS CommSec Track D2 - Anatomy Of An APT Attack - Paul Mason.mp4
|
60.7 MB
|
#HITB2016AMS CommSec Track D2 - Facebook Presents Capture The Flag - Paul Marinescu.mp4
|
41.2 MB
|
#HITB2016AMS CommSec Track D2 - Hack In The Class - Barry Fish van Kampen.mp4
|
36.8 MB
|
#HITB2016AMS CommSec Track D2 - Inspeckage Android Package Inspector - Antonio Martins.mp4
|
52.7 MB
|
#HITB2016AMS CommSec Track D2 - Park This! Yet Another Parking Meter Talk - Paul Moreno.mp4
|
48.0 MB
|
#HITB2016AMS CommSec Track D2 - Where Malware Meets Murphy - Mattijs Van Ommeren.mp4
|
47.8 MB
|
#HITB2016AMS D1T1 - Escape From The Docker KVM QEMU Machine - Shengping Wang and Xu Liu.mp4
|
51.1 MB
|
#HITB2016AMS D1T1 - Exploit Kits Hunting The Hunters - Nick Biasini.mp4
|
90.8 MB
|
#HITB2016AMS D1T1 - TeLeScope Peering Into The Depths Of TLS Traffic In Real Time - Radu Caragea.mp4
|
85.9 MB
|
#HITB2016AMS D1T1 - Using The Observer Effect And Cyber Feng Shui - Jacob Torrey.mp4
|
82.8 MB
|
#HITB2016AMS D1T1 - Virtualization System Vulnerability Discovery Framework - Tang Qinghao.mp4
|
74.2 MB
|
#HITB2016AMS D1T1 Forcing A Targeted LTE Cellphone Into An Eavesdropping Network - Lin Huang.mp4
|
65.3 MB
|
#HITB2016AMS D1T2 - Adaptive Android Kernel Live Patching - Tim Xia and Yulong Zhang.mp4
|
72.5 MB
|
#HITB2016AMS D1T2 - CSP Oddities - Michele Spagnuolo and Lukas Weichselbaum.mp4
|
107.1 MB
|
#HITB2016AMS D1T2 - Hardsploit Project - Yann Allain and Julien Moinard.mp4
|
107.1 MB
|
#HITB2016AMS D1T2 - IRON HID Create Your Own Bad USB Device - Seunghun Han.mp4
|
69.7 MB
|
#HITB2016AMS D1T2 - Kernel Exploit Hunting And Mitigation - Broderick Aquilino and Wayne Low.mp4
|
83.3 MB
|
#HITB2016AMS D1T2 - Sandjacking Profiting From iOS Malware - Chilik Tamir.mp4
|
109.6 MB
|
#HITB2016AMS D2T1 - Attacking Next Generation Firewalls Breaking PAN OS - Felix Wilhelm.mp4
|
97.6 MB
|
#HITB2016AMS D2T1 - CANsee An Automobile Intrusion Detection System - Jun Li.mp4
|
108.0 MB
|
#HITB2016AMS D2T1 - Cache Side Channel Attacks CPU Design As A Security Problem - Anders Fogh.mp4
|
91.2 MB
|
#HITB2016AMS D2T1 - In Plain Sight The Perfect Exfiltration Technique - Itzik Kotler and Amit Klein.mp4
|
103.9 MB
|
#HITB2016AMS D2T2 - Advanced Exploitation Xen Hypervisor VM Escape - Shangcong Luan.mp4
|
72.7 MB
|
#HITB2016AMS D2T2 - Breaking Naive ESSID WPA2 Key Generation Algorithms - Peter Blasty Geissler.mp4
|
92.9 MB
|
#HITB2016AMS D2T2 - Go Speed Tracer Guided Fuzzing - Richard Johnson.mp4
|
111.9 MB
|
#HITB2016AMS D2T2 - New Methods For Exploiting ORM Injections - Mikhail Egorov and Sergey Soldatov.mp4
|
98.5 MB
|
#HITB2016AMS D2T2 - Perf From Profiling To Kernel Exploiting - Wish Wu.mp4
|
61.9 MB
|
#HITB2016AMS KEYNOTE 1 - Beyond FBI vs Apple What s Next For The Crypto Wars - John Adams.mp4
|
41.7 MB
|
#HITB2016AMS KEYNOTE 2 - The Future Has Arrived And It s Effin Hilarious - Adam Laurie.mp4
|
101.8 MB
|
#HITB2016AMS WELCOME ADDRESS - Patricia M Zorko.mp4
|
21.4 MB
|
/HITB 2016 - Singapore/
|
#HITBGSEC 2016 SG CLOSING KEYNOTE - Hacking in Song - Fabienne Serriere.mp4
|
77.6 MB
|
#HITBGSEC 2016 SG CLOSING KEYNOTE - Hacking in Song - Fabienne Serriere.srt
|
27.3 KB
|
#HITBGSEC 2016 SG CommSec Track D1 - Data Driven Software Security - Sweety Chauhan.mp4
|
125.9 MB
|
#HITBGSEC 2016 SG CommSec Track D1- Halcyon - An IDE for Faster NSE Development - Sanoop Thomas.mp4
|
38.5 MB
|
#HITBGSEC 2016 SG CommSec Track D2 - Copy-paste Vulnerabilities - Vanessa Henderson.mp4
|
30.5 MB
|
#HITBGSEC 2016 SG CommSec Track D2 - Fake President Fraud Defrauded - Florian Lukavsky.mp4
|
39.8 MB
|
#HITBGSEC 2016 SG CommSec Track D2 - IoT Honeypots - Tan Kean Siong.mp4
|
52.2 MB
|
#HITBGSEC 2016 SG CommSec Track D2 - Local Privilege Escalation in 2016 - Paul Craig.mp4
|
39.7 MB
|
#HITBGSEC 2016 SG CommSec Track D2 - Vulnerabilities and Ethics - Alfonso De Gregorio.mp4
|
49.7 MB
|
#HITBGSEC 2016 SG Conference Track D1 - A Next Generation Assembler Framework - Nguyen Anh Quynh.mp4
|
101.6 MB
|
#HITBGSEC 2016 SG Conference Track D1 - Attacking NVidia s Tegra Platform - Peter Pi.mp4
|
52.5 MB
|
#HITBGSEC 2016 SG Conference Track D1 - Attacking NVidia s Tegra Platform - Peter Pi.srt
|
24.1 KB
|
#HITBGSEC 2016 SG Conference Track D1 - Attacking Software Tokens - Bernhard Mueller.mp4
|
66.4 MB
|
#HITBGSEC 2016 SG Conference Track D1 - Stumping The Mobile Chipset - A. Donenfeld & Y. Mordekhay.mp4
|
73.1 MB
|
#HITBGSEC 2016 SG Conference Track D1 - Stumping The Mobile Chipset - A. Donenfeld & Y. Mordekhay.srt
|
51.4 KB
|
#HITBGSEC 2016 SG Conference Track D1 - The Apple Sandbox Deeper Into The Quagmire - Jonathan Levin.mp4
|
118.4 MB
|
#HITBGSEC 2016 SG Conference Track D1 - The Apple Sandbox Deeper Into The Quagmire - Jonathan Levin.srt
|
86.8 KB
|
#HITBGSEC 2016 SG Conference Track D1 - Trust No One - O. Kochetova & A. Osipov.mp4
|
65.7 MB
|
#HITBGSEC 2016 SG Conference Track D2 - (Ab)using Smart Cities - Matteo Beccaro & Matteo Collura.mp4
|
64.6 MB
|
#HITBGSEC 2016 SG Conference Track D2 - (Ab)using Smart Cities - Matteo Beccaro & Matteo Collura.srt
|
39.8 KB
|
#HITBGSEC 2016 SG Conference Track D2 - Breaking Exploits - Shlomi Oberman & Ron Shina.mp4
|
88.3 MB
|
#HITBGSEC 2016 SG Conference Track D2 - Breaking Exploits - Shlomi Oberman & Ron Shina.srt
|
58.3 KB
|
#HITBGSEC 2016 SG Conference Track D2 - Fuzzing The Windows Kernel - Koh Yong Chuan.mp4
|
47.3 MB
|
#HITBGSEC 2016 SG Conference Track D2 - Look Mom! I Don t Use Shellcode - Moritz Jodeit.mp4
|
75.3 MB
|
#HITBGSEC 2016 SG Conference Track D2 - Look Mom! I Don t Use Shellcode - Moritz Jodeit.srt
|
61.0 KB
|
#HITBGSEC 2016 SG Conference Track D2 - iOS 10 Kernel Heap Revisited - Stefan Esser.mp4
|
105.5 MB
|
#HITBGSEC 2016 SG Conference Track D2 - iOS 10 Kernel Heap Revisited - Stefan Esser.srt
|
78.7 KB
|
#HITBGSEC 2016 SG KEYNOTE 1 - I Fight For The Users! The Prequel - Erin Jacobs.mp4
|
56.0 MB
|
#HITBGSEC 2016 SG KEYNOTE 1 - I Fight For The Users! The Prequel - Erin Jacobs.srt
|
52.0 KB
|
#HITBGSEC 2016 SG KEYNOTE 2 - Hacking The Pentagon - Katie Moussouris.mp4
|
81.8 MB
|
#HITBGSEC 2016 SG KEYNOTE 2 - Hacking The Pentagon - Katie Moussouris.srt
|
65.8 KB
|
#HITBGSEC Replicating a RSA SecurID Token Instance (RSA SecurID 2.0.4).mp4
|
598.5 KB
|
#HITBGSEC Replicating a VASCO DIGIPASS Token Instance (DIGIPASS DEMO for Android 4.10.0).mp4
|
471.5 KB
|
#HITBGSEC SG 2016 CommSec Track D1 - Reverse Engineering Swift Applications - Michael Gianarakis.mp4
|
43.6 MB
|
#HITBGSEC SG 2016 CommSec Track D2 - Forensic Analysis of Android Banking Apps - Rajchada Chanajitt.mp4
|
38.1 MB
|
/HITB 2017 - Amsterdam/
|
#HITB2017AMS - Closing Ceremony - HITB Core Team.mp4
|
117.9 MB
|
#HITB2017AMS - Closing Ceremony - HITB Core Team.srt
|
36.5 KB
|
#HITB2017AMS CLOSING KEYNOTE - The ECMA And The Chakra - Natalie Silvanovich.mp4
|
242.6 MB
|
#HITB2017AMS CLOSING KEYNOTE - The ECMA And The Chakra - Natalie Silvanovich.srt
|
89.1 KB
|
#HITB2017AMS COMMSEC D1 - A Passive Listing Ransomware Detector - Paulus Meessen and Don Mulders.mp4
|
67.3 MB
|
#HITB2017AMS COMMSEC D1 - A Passive Listing Ransomware Detector - Paulus Meessen and Don Mulders.srt
|
54.4 KB
|
#HITB2017AMS COMMSEC D1 - Breaking Apple's iCloud Keychain - Vladimir Katalov.mp4
|
82.8 MB
|
#HITB2017AMS COMMSEC D1 - Breaking Apple's iCloud Keychain - Vladimir Katalov.srt
|
83.0 KB
|
#HITB2017AMS COMMSEC D1 - Disarming EMET 5 52 - Niels Warnars.mp4
|
64.6 MB
|
#HITB2017AMS COMMSEC D1 - Exploiting Windows Automatic Wireless Association - George Chatzisofroniou.mp4
|
75.2 MB
|
#HITB2017AMS COMMSEC D1 - Exploiting Windows Automatic Wireless Association - George Chatzisofroniou.srt
|
62.4 KB
|
#HITB2017AMS COMMSEC D1 - Fault Injection Attacks On Secure Boot - Niek Timmers and Albert Spruyt.mp4
|
60.1 MB
|
#HITB2017AMS COMMSEC D1 - Fault Injection Attacks On Secure Boot - Niek Timmers and Albert Spruyt.srt
|
56.3 KB
|
#HITB2017AMS COMMSEC D1 - Low Cost Open Source Spectrum Monitoring - Dominic Spill.mp4
|
67.0 MB
|
#HITB2017AMS COMMSEC D1 - Low Cost Open Source Spectrum Monitoring - Dominic Spill.srt
|
68.7 KB
|
#HITB2017AMS COMMSEC D1 - Meet And Greet With The MacOs Malware Class Of 2016 - Patrick Wardle.mp4
|
62.7 MB
|
#HITB2017AMS COMMSEC D1 - Meet And Greet With The MacOs Malware Class Of 2016 - Patrick Wardle.srt
|
69.8 KB
|
#HITB2017AMS COMMSEC D1 - Pwning Banks How The Playground Evolved Over The Years - Miika Turkia.mp4
|
93.0 MB
|
#HITB2017AMS COMMSEC D1 - Pwning Banks How The Playground Evolved Over The Years - Miika Turkia.srt
|
69.1 KB
|
#HITB2017AMS COMMSEC D1 - So You Want To Hack Radios Matt Knight and Marc Newlin.mp4
|
119.4 MB
|
#HITB2017AMS COMMSEC D1 - So You Want To Hack Radios Matt Knight and Marc Newlin.srt
|
190.9 KB
|
#HITB2017AMS COMMSEC D2 - Intel DCI Secrets - Maxim Goryachy and Mark Ermolov.mp4
|
49.9 MB
|
#HITB2017AMS COMMSEC D2 - Pwning ARM Debug Components - Muhammad Abdul Wahab (2).mp4
|
55.0 MB
|
#HITB2017AMS COMMSEC D2 - Pwning ARM Debug Components - Muhammad Abdul Wahab (2).srt
|
71.2 KB
|
#HITB2017AMS COMMSEC D2 - Unauthorized Erlang A Demonstration - Don Bailey (2).mp4
|
49.4 MB
|
#HITB2017AMS COMMSEC D2 - Unauthorized Erlang A Demonstration - Don Bailey (2).srt
|
79.0 KB
|
#HITB2017AMS D1T1 - A New RISC - Don Bailey.mp4
|
260.5 MB
|
#HITB2017AMS D1T1 - A New RISC - Don Bailey.srt
|
115.2 KB
|
#HITB2017AMS D1T1 - Drammer The Making Of - Victor van der Veen.mp4
|
246.8 MB
|
#HITB2017AMS D1T1 - Drammer The Making Of - Victor van der Veen.srt
|
112.4 KB
|
#HITB2017AMS D1T1 - Hacking Customer Information Control System - Ayoub Elaassal.mp4
|
234.0 MB
|
#HITB2017AMS D1T1 - Hacking Customer Information Control System - Ayoub Elaassal.srt
|
124.6 KB
|
#HITB2017AMS D1T1 - Harnessing Intel Processor Trace On Windows For Vuln Discovery - Richard Johnson.mp4
|
213.5 MB
|
#HITB2017AMS D1T1 - Harnessing Intel Processor Trace On Windows For Vuln Discovery - Richard Johnson.srt
|
118.2 KB
|
#HITB2017AMS D1T1 - I Got 99 Trends And A # Is All Of Them! Steven Seeley and Roberto Suggi Liverani.mp4
|
494.9 MB
|
#HITB2017AMS D1T1 - I Got 99 Trends And A # Is All Of Them! Steven Seeley and Roberto Suggi Liverani.srt
|
147.7 KB
|
#HITB2017AMS D1T1 - We Broke All CSPs And You Won't Believe What Happened - Spagnuolo & Weichselbaum.mp4
|
231.6 MB
|
#HITB2017AMS D1T1 - We Broke All CSPs And You Won't Believe What Happened - Spagnuolo & Weichselbaum.srt
|
110.4 KB
|
#HITB2017AMS D1T2 - Can't Touch This Cloning Any Android HCE Contactless Card - Slawomir Jasek.mp4
|
333.4 MB
|
#HITB2017AMS D1T2 - Can't Touch This Cloning Any Android HCE Contactless Card - Slawomir Jasek.srt
|
104.2 KB
|
#HITB2017AMS D1T2 - Most Impressive A Guide To Key Impressioning Attacks - Jos Weyers.mp4
|
309.2 MB
|
#HITB2017AMS D1T2 - Most Impressive A Guide To Key Impressioning Attacks - Jos Weyers.srt
|
89.1 KB
|
#HITB2017AMS D1T2 - Shadow Box The Practical And Omnipotent Sandbox - Seunghun Han.mp4
|
228.2 MB
|
#HITB2017AMS D1T2 - Shadow Box The Practical And Omnipotent Sandbox - Seunghun Han.srt
|
70.1 KB
|
#HITB2017AMS D1T2 - Side Channel Attacks Against iOS Crypto Libraries And More - Najwa Aaraj.mp4
|
162.8 MB
|
#HITB2017AMS D1T2 - The Secret Of Chakracore 10 Ways To Go Beyond The Edge - Linan Hao and Long Liu.mp4
|
469.2 MB
|
#HITB2017AMS D2T1 - Bootstrapping Systems With Open Source Firmware - Trammell Hudson.mp4
|
200.4 MB
|
#HITB2017AMS D2T1 - Bootstrapping Systems With Open Source Firmware - Trammell Hudson.srt
|
71.4 KB
|
#HITB2017AMS D2T1 - Everybody Wants SOME Advance Same Origin Method Execution - Ben Hayak.srt
|
147.8 KB
|
#HITB2017AMS D2T1 - Hunting For Vulnerabilities In Signal - Markus Vervier.mp4
|
200.0 MB
|
#HITB2017AMS D2T1 - Hunting For Vulnerabilities In Signal - Markus Vervier.srt
|
71.2 KB
|
#HITB2017AMS D2T1 - Oversight Exposing Spies On MacOS - Patrick Wardle.mp4
|
427.8 MB
|
#HITB2017AMS D2T1 - Oversight Exposing Spies On MacOS - Patrick Wardle.srt
|
133.3 KB
|
#HITB2017AMS D2T1 - Vulnerabilities In Android Password Managers - Huber, Arzt & Rasthofer.mp4
|
190.8 MB
|
#HITB2017AMS D2T1 - Vulnerabilities In Android Password Managers - Huber, Arzt & Rasthofer.srt
|
85.5 KB
|
#HITB2017AMS D2T2 - Bypassing Memory Mitigations Using Data Only Exploitation Techniques - Bing Sun.mp4
|
345.9 MB
|
#HITB2017AMS D2T2 - Bypassing Memory Mitigations Using Data Only Exploitation Techniques - Bing Sun.srt
|
89.7 KB
|
#HITB2017AMS D2T2 - Chasing Cars Keyless Entry System Attacks - Yingtao Zeng, Qing Yang and Jun Li.mp4
|
277.1 MB
|
#HITB2017AMS D2T2 - Chasing Cars Keyless Entry System Attacks - Yingtao Zeng, Qing Yang and Jun Li.srt
|
97.2 KB
|
#HITB2017AMS D2T2 - Hacking Medical Devices And Healthcare Infrastructure - Anirudh Duggal.mp4
|
208.7 MB
|
#HITB2017AMS D2T2 - In Depth Analysis Of Multicast DNS And DNS Service Discovery - Antonios Atlasis.mp4
|
210.8 MB
|
#HITB2017AMS D2T2 - The Best Laid Schemes Attacking URL Schemes - Yu Hong.mp4
|
192.3 MB
|
#HITB2017AMS KEYNOTE 1 - Redefining Defense - Saumil Shah.mp4
|
222.5 MB
|
#HITB2017AMS KEYNOTE 1 - Redefining Defense - Saumil Shah.srt
|
83.2 KB
|
#HITB2017AMS KEYNOTE 2 - All Fall Down Interdependencies In The Cloud - Window Snyder.mp4
|
73.1 MB
|
#HITB2017AMS KEYNOTE 2 - All Fall Down Interdependencies In The Cloud - Window Snyder.srt
|
30.6 KB
|
/HITB 2017 - Singapore/
|
#HITBGSEC 2017 CLOSING KEYNOTE - A Spin Around The Block 13 Years Of Infosec Challenges - Kelly Lum.mp4
|
72.2 MB
|
#HITBGSEC 2017 CLOSING KEYNOTE - A Spin Around The Block 13 Years Of Infosec Challenges - Kelly Lum.srt
|
107.6 KB
|
#HITBGSEC 2017 CommSec D1 - Automotive Security Assessment Techniques And Tools - Keisuke Hirata.mp4
|
36.3 MB
|
#HITBGSEC 2017 CommSec D1 - Automotive Security Assessment Techniques And Tools - Keisuke Hirata.srt
|
52.4 KB
|
#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger.mp4
|
62.0 MB
|
#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger.srt
|
77.3 KB
|
#HITBGSEC 2017 CommSec D1 - Hacking Robots Before Skynet - Lucas Apa and Cesar Cerrudo.mp4
|
109.0 MB
|
#HITBGSEC 2017 CommSec D1 - Hadoop Safari Hunting For Vulnerabilities - T. Debize and M. Braik.mp4
|
82.8 MB
|
#HITBGSEC 2017 CommSec D1 - Hadoop Safari Hunting For Vulnerabilities - T. Debize and M. Braik.srt
|
113.8 KB
|
#HITBGSEC 2017 CommSec D1 - Insecurity In 2017 0 Days Are The Least Of Our Problems - Nick Biasini.mp4
|
102.0 MB
|
#HITBGSEC 2017 CommSec D1 - Insecurity In 2017 0 Days Are The Least Of Our Problems - Nick Biasini.srt
|
146.1 KB
|
#HITBGSEC 2017 CommSec D1 - The Original Elevat0r History Of A Private Jailbreak - Stefan Esser.mp4
|
87.5 MB
|
#HITBGSEC 2017 CommSec D1 - The Original Elevat0r History Of A Private Jailbreak - Stefan Esser.srt
|
114.1 KB
|
#HITBGSEC 2017 CommSec D1 - Threat Hunting 101 Become The Hunter - Hamza Beghal.mp4
|
43.4 MB
|
#HITBGSEC 2017 CommSec D1 - Threat Hunting 101 Become The Hunter - Hamza Beghal.srt
|
95.9 KB
|
#HITBGSEC 2017 CommSec D2 - 200+ Vulnerabilities In Android Phones - B. Guangdong & Z. Qing.mp4
|
45.7 MB
|
#HITBGSEC 2017 CommSec D2 - 200+ Vulnerabilities In Android Phones - B. Guangdong & Z. Qing.srt
|
46.3 KB
|
#HITBGSEC 2017 CommSec D2 - 2FAssassin Bypass 2FA, Stealing Private Keys, And More - Maxwell Koh.mp4
|
47.0 MB
|
#HITBGSEC 2017 CommSec D2 - 2FAssassin Bypass 2FA, Stealing Private Keys, And More - Maxwell Koh.srt
|
65.6 KB
|
#HITBGSEC 2017 CommSec D2 - Facebook The Deep & Dark Web For Threat Actors In Asia - Fadli Sidek.mp4
|
56.8 MB
|
#HITBGSEC 2017 CommSec D2 - Facebook The Deep & Dark Web For Threat Actors In Asia - Fadli Sidek.srt
|
91.9 KB
|
#HITBGSEC 2017 CommSec D2 - Growing Network Security Specialists For Our Enterprise - Xinhua Cai.mp4
|
29.7 MB
|
#HITBGSEC 2017 CommSec D2 - Growing Network Security Specialists For Our Enterprise - Xinhua Cai.srt
|
48.2 KB
|
#HITBGSEC 2017 CommSec D2 - Intelligence And Counterintelligence Techniques - J. Hesse & K. Ranjan.mp4
|
81.5 MB
|
#HITBGSEC 2017 CommSec D2 - Intelligence And Counterintelligence Techniques - J. Hesse & K. Ranjan.srt
|
127.2 KB
|
#HITBGSEC 2017 CommSec D2 - It’s Friday Evening Professor Moriarty - Nicolas Collery.mp4
|
57.9 MB
|
#HITBGSEC 2017 CommSec D2 - It’s Friday Evening Professor Moriarty - Nicolas Collery.srt
|
63.4 KB
|
#HITBGSEC 2017 CommSec D2 - Searching For A Needle In A Remote Haystack - Vitaly Kamluk & Wayne Lee.mp4
|
55.3 MB
|
#HITBGSEC 2017 CommSec D2 - Searching For A Needle In A Remote Haystack - Vitaly Kamluk & Wayne Lee.srt
|
80.7 KB
|
#HITBGSEC 2017 CommSec D2 - Stealing PLC Intellectual Property A Red Teaming Story - Matteo Beccaro.mp4
|
42.4 MB
|
#HITBGSEC 2017 CommSec D2 - Stealing PLC Intellectual Property A Red Teaming Story - Matteo Beccaro.srt
|
71.7 KB
|
#HITBGSEC 2017 CommSec D2 - Unstructured Data Is The New Gold ML + NLP Is The New Shiz - J. Geovedi.mp4
|
66.4 MB
|
#HITBGSEC 2017 CommSec D2 - Unstructured Data Is The New Gold ML + NLP Is The New Shiz - J. Geovedi.srt
|
92.1 KB
|
#HITBGSEC 2017 Conf D1 - A Year In The Red - Dominic Chell & Vincent Yiu.mp4
|
69.5 MB
|
#HITBGSEC 2017 Conf D1 - A Year In The Red - Dominic Chell & Vincent Yiu.srt
|
138.5 KB
|
#HITBGSEC 2017 Conf D1 - Get To The Money Hacking PoS And PoP Systems - D. Chastuhin & V. Egorov.mp4
|
84.4 MB
|
#HITBGSEC 2017 Conf D1 - Get To The Money Hacking PoS And PoP Systems - D. Chastuhin & V. Egorov.srt
|
103.3 KB
|
#HITBGSEC 2017 Conf D1 - How We Broke Intel Amt - A. Ermolov, D. Evdokimov & M. Malyutin.mp4
|
55.2 MB
|
#HITBGSEC 2017 Conf D1 - How We Broke Intel Amt - A. Ermolov, D. Evdokimov & M. Malyutin.srt
|
74.2 KB
|
#HITBGSEC 2017 Conf D1 - Spy Vs Spy A Modern Study Of Microphone Bugs - V. Valeros & S. Garcia.mp4
|
108.5 MB
|
#HITBGSEC 2017 Conf D1 - Spy Vs Spy A Modern Study Of Microphone Bugs - V. Valeros & S. Garcia.srt
|
144.7 KB
|
#HITBGSEC 2017 Conf D2 - Neuralfuzz Neural Networks For Fuzzing Web Apps - Ivan Novikov.mp4
|
90.8 MB
|
#HITBGSEC 2017 Conf D2 - Neuralfuzz Neural Networks For Fuzzing Web Apps - Ivan Novikov.srt
|
131.3 KB
|
#HITBGSEC 2017 Conf D2 - QEMU Attack Surface And Security Internals - Qiang Li & ZhiBin Hu.mp4
|
36.9 MB
|
#HITBGSEC 2017 Conf D2 - Radio Exploitation 101 - Matt Knight & Marc Newlin.mp4
|
94.0 MB
|
#HITBGSEC 2017 Conf D2 - Radio Exploitation 101 - Matt Knight & Marc Newlin.srt
|
153.8 KB
|
#HITBGSEC 2017 Conf D2 - Rootten Apples Vulnerability Heaven In The iOS Sandbox - Adam Donenfeld.mp4
|
89.5 MB
|
#HITBGSEC 2017 Conf D2 - Rootten Apples Vulnerability Heaven In The iOS Sandbox - Adam Donenfeld.srt
|
109.1 KB
|
#HITBGSEC 2017 Conf D2 - XFLTReaT A New Dimension In Tunnelling - Balazs Bucsay.mp4
|
94.7 MB
|
#HITBGSEC 2017 Conf D2 - XFLTReaT A New Dimension In Tunnelling - Balazs Bucsay.srt
|
133.8 KB
|
#HITBGSEC 2017 KEYNOTE 1 - Finding Vulns And Malware In Open Source Code At Scale - Mark Curphey.mp4
|
119.0 MB
|
#HITBGSEC 2017 KEYNOTE 1 - Finding Vulns And Malware In Open Source Code At Scale - Mark Curphey.srt
|
180.4 KB
|
#HITBGSEC 2017 KEYNOTE D2 - The State Of Cyber - George Kurtz.mp4
|
72.9 MB
|
#HITBGSEC 2017 KEYNOTE D2 - The State Of Cyber - George Kurtz.srt
|
146.0 KB
|
#HITBGSEC 2017 SG Conf D1 - A New Era Of SSRF - Exploiting Url Parsers - Orange Tsai.mp4
|
67.9 MB
|
#HITBGSEC 2017 SG Conf D1 - A New Era Of SSRF - Exploiting Url Parsers - Orange Tsai.srt
|
84.3 KB
|
#HITBGSEC 2017 Smart Cities Panel Discussion with M. Curphey, C. Cerrudo, E. Schwartz & M. Beccaro.mp4
|
97.7 MB
|
#HITBGSEC 2017 Smart Cities Panel Discussion with M. Curphey, C. Cerrudo, E. Schwartz & M. Beccaro.srt
|
188.8 KB
|
#HITBGSEC 2017 WELCOME ADDRESS - IoT - A Security Hole Without A Patch - Earl Carter.mp4
|
21.1 MB
|
#HITBGSEC 2017 WELCOME ADDRESS - IoT - A Security Hole Without A Patch - Earl Carter.srt
|
42.7 KB
|
/HITB 2018 - Amsterdam/
|
#HITB2018AMS CLOSING KEYNOTE - Security is What We Make of It - Blockchain and Beyond - Amber Baldet.en.transcribed.srt
|
163.3 KB
|
#HITB2018AMS CLOSING KEYNOTE - Security is What We Make of It - Blockchain and Beyond - Amber Baldet.mp4
|
93.5 MB
|
#HITB2018AMS CommSec D1 - A Deep Dive Into Malicious Documents - Josh Stroschein.en.transcribed.srt
|
82.1 KB
|
#HITB2018AMS CommSec D1 - A Deep Dive Into Malicious Documents - Josh Stroschein.mp4
|
71.8 MB
|
#HITB2018AMS CommSec D1 - An Isolated Data Center Security Policy Model Using SmartNICs - Ofir Arkin.en.transcribed.srt
|
136.3 KB
|
#HITB2018AMS CommSec D1 - An Isolated Data Center Security Policy Model Using SmartNICs - Ofir Arkin.mp4
|
133.3 MB
|
#HITB2018AMS CommSec D1 - Attacking IoT Speakers - Stephen Hilt.en.transcribed.srt
|
77.8 KB
|
#HITB2018AMS CommSec D1 - Attacking IoT Speakers - Stephen Hilt.mp4
|
64.9 MB
|
#HITB2018AMS CommSec D1 - Behaviors and Patterns of Rogue Hosting Providers - D. Mahjoub & S. Brown.en.transcribed.srt
|
112.2 KB
|
#HITB2018AMS CommSec D1 - Behaviors and Patterns of Rogue Hosting Providers - D. Mahjoub & S. Brown.mp4
|
73.5 MB
|
#HITB2018AMS CommSec D1 - Faster, Wider, Greater Modern Pentest Tricks - Thomas Debize.en.transcribed.srt
|
78.7 KB
|
#HITB2018AMS CommSec D1 - Faster, Wider, Greater Modern Pentest Tricks - Thomas Debize.mp4
|
105.5 MB
|
#HITB2018AMS CommSec D1 - How to Find and Exploit Bugs in IoT Devices - Kelvin Wong.en.transcribed.srt
|
51.2 KB
|
#HITB2018AMS CommSec D1 - How to Find and Exploit Bugs in IoT Devices - Kelvin Wong.mp4
|
64.8 MB
|
#HITB2018AMS CommSec D1 - Keynterceptor Press Any Key to Continue - Niels van Dijkhuizen.en.transcribed.srt
|
53.6 KB
|
#HITB2018AMS CommSec D1 - Keynterceptor Press Any Key to Continue - Niels van Dijkhuizen.mp4
|
56.2 MB
|
#HITB2018AMS CommSec D1 - Steganography Ante Portas - Steffen Wendzel.en.transcribed.srt
|
71.2 KB
|
#HITB2018AMS CommSec D1 - Steganography Ante Portas - Steffen Wendzel.mp4
|
150.7 MB
|
#HITB2018AMS CommSec D1 - The Life & Death of Kernel Object Abuse - Salf ElSherei & Ian Kronquist.en.transcribed.srt
|
112.4 KB
|
#HITB2018AMS CommSec D1 - The Life & Death of Kernel Object Abuse - Salf ElSherei & Ian Kronquist.mp4
|
175.8 MB
|
#HITB2018AMS CommSec D2 - Automatic Generation of ROP Chains - Ricardo. J. Rodríguez & Daniel Uroz.en.transcribed.srt
|
77.8 KB
|
#HITB2018AMS CommSec D2 - Automatic Generation of ROP Chains - Ricardo. J. Rodríguez & Daniel Uroz.mp4
|
94.6 MB
|
#HITB2018AMS CommSec D2 - Hacking a Hospital for Fun and Profit - Asaf Cohen & Ofir Kamil.en.transcribed.srt
|
70.7 KB
|
#HITB2018AMS CommSec D2 - Hacking a Hospital for Fun and Profit - Asaf Cohen & Ofir Kamil.mp4
|
79.5 MB
|
#HITB2018AMS CommSec D2 - Hiding Tasks via Hardware Task Switching - Kyeong Joo Jung.en.transcribed.srt
|
48.4 KB
|
#HITB2018AMS CommSec D2 - Hiding Tasks via Hardware Task Switching - Kyeong Joo Jung.mp4
|
62.0 MB
|
#HITB2018AMS CommSec D2 - ProdSec A Technical Approach - Jeremy Brown.en.transcribed.srt
|
107.8 KB
|
#HITB2018AMS CommSec D2 - ProdSec A Technical Approach - Jeremy Brown.mp4
|
80.2 MB
|
#HITB2018AMS CommSec D2 - PyREBox Making Dynamic Instrumentation Great Again - X. Ugarte-Pedrero.mp4
|
125.1 MB
|
#HITB2018AMS CommSec D2 - Smart Contract (In)Security - Ben Schmidt.en.transcribed.srt
|
59.9 KB
|
#HITB2018AMS CommSec D2 - Smart Contract (In)Security - Ben Schmidt.mp4
|
60.7 MB
|
#HITB2018AMS D1T1 - Abusing The Travel Industry - V. Kropotov, F. Yarochkin, M. Fuentes & L. Gu.en.transcribed.srt
|
90.9 KB
|
#HITB2018AMS D1T1 - Abusing The Travel Industry - V. Kropotov, F. Yarochkin, M. Fuentes & L. Gu.mp4
|
110.6 MB
|
#HITB2018AMS D1T1 - Brida When Burp Suite meets Frida - Federico Dotta & Piergiovanni Cipolloni.mp4
|
131.3 MB
|
#HITB2018AMS D1T1 - Covert Data Exfiltration Channel - Hongjian Cao, Kunzhe Chai & Jun Li.en.transcribed.srt
|
53.7 KB
|
#HITB2018AMS D1T1 - Covert Data Exfiltration Channel - Hongjian Cao, Kunzhe Chai & Jun Li.mp4
|
77.0 MB
|
#HITB2018AMS D1T1 - Fuzzing Javascript Engines for Fun and Pwnage - Areum Lee & Jeonghoon Shin.en.transcribed.srt
|
55.6 KB
|
#HITB2018AMS D1T1 - Fuzzing Javascript Engines for Fun and Pwnage - Areum Lee & Jeonghoon Shin.mp4
|
54.9 MB
|
#HITB2018AMS D1T1 - How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers - X. Bai & M. Zheng.en.transcribed.srt
|
85.5 KB
|
#HITB2018AMS D1T1 - How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers - X. Bai & M. Zheng.mp4
|
104.0 MB
|
#HITB2018AMS D1T1 - Real World Attacks Against Secure Elements - Don Bailey.en.transcribed.srt
|
158.9 KB
|
#HITB2018AMS D1T1 - Real World Attacks Against Secure Elements - Don Bailey.mp4
|
112.5 MB
|
#HITB2018AMS D1T2 - Applying Machine Learning to User Behavior Anomaly Analysis - Eugene Neyolov.en.transcribed.srt
|
126.0 KB
|
#HITB2018AMS D1T2 - Applying Machine Learning to User Behavior Anomaly Analysis - Eugene Neyolov.mp4
|
147.2 MB
|
#HITB2018AMS D1T2 - Attacking Microsoft’s .NET Framework Through CLR - Yu Hong & Shikang Xing.en.transcribed.srt
|
83.6 KB
|
#HITB2018AMS D1T2 - Attacking Microsoft’s .NET Framework Through CLR - Yu Hong & Shikang Xing.mp4
|
131.7 MB
|
#HITB2018AMS D1T2 - Pwning KNX & ZigBee Networks - HuiYu Wu, YuXiang Li & Yong Yang.en.transcribed.srt
|
82.0 KB
|
#HITB2018AMS D1T2 - Pwning KNX & ZigBee Networks - HuiYu Wu, YuXiang Li & Yong Yang.mp4
|
96.1 MB
|
#HITB2018AMS D1T2 - Rooting Android 8 with a Kernel Space Mirroring Attack - Yong Wang & Yang Song.en.transcribed.srt
|
81.7 KB
|
#HITB2018AMS D1T2 - Rooting Android 8 with a Kernel Space Mirroring Attack - Yong Wang & Yang Song.mp4
|
85.1 MB
|
#HITB2018AMS D1T2 - Smashing Ethereum Smart Contracts for Fun and ACTUAL Profit - Bernhard Mueller.mp4
|
105.2 MB
|
#HITB2018AMS D1T2 - Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) - Daniel Bohannon.en.transcribed.srt
|
212.6 KB
|
#HITB2018AMS D1T2 - Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) - Daniel Bohannon.mp4
|
139.1 MB
|
#HITB2018AMS D2T1 - Backdooring & Remotely Controlling Cars - Sheila A. Berta & Claudio Carraciolo.en.transcribed.srt
|
82.0 KB
|
#HITB2018AMS D2T1 - Backdooring & Remotely Controlling Cars - Sheila A. Berta & Claudio Carraciolo.mp4
|
91.0 MB
|
#HITB2018AMS D2T1 - Establishing Covert Channels By Abusing GSM AT Commands - A. Munoz & J. C. Saez.en.transcribed.srt
|
103.9 KB
|
#HITB2018AMS D2T1 - Establishing Covert Channels By Abusing GSM AT Commands - A. Munoz & J. C. Saez.mp4
|
107.9 MB
|
#HITB2018AMS D2T1 - Expanding Your WMI Lateral Movement Arsenal - Philip Tsukerman.en.transcribed.srt
|
89.6 KB
|
#HITB2018AMS D2T1 - Expanding Your WMI Lateral Movement Arsenal - Philip Tsukerman.mp4
|
77.0 MB
|
#HITB2018AMS D2T1 - Sandbox Evasion Using VBA Referencing - Aviv Grafi & Amit Dori.en.transcribed.srt
|
104.5 KB
|
#HITB2018AMS D2T1 - Sandbox Evasion Using VBA Referencing - Aviv Grafi & Amit Dori.mp4
|
63.1 MB
|
#HITB2018AMS D2T1 - Uncovering the Android Patch Gap - Karsten Nohl & Jakob Lell.en.transcribed.srt
|
134.1 KB
|
#HITB2018AMS D2T1 - Uncovering the Android Patch Gap - Karsten Nohl & Jakob Lell.mp4
|
113.9 MB
|
#HITB2018AMS D2T2 - A New Fuzzing Method for Android - Zhang Qing & Bai Guangdong.en.transcribed.srt
|
31.0 KB
|
#HITB2018AMS D2T2 - A New Fuzzing Method for Android - Zhang Qing & Bai Guangdong.mp4
|
36.8 MB
|
#HITB2018AMS D2T2 - Defense-in-Depth Techniques for Modern Web Apps - M. Spagnuolo & L. Weichselbaum.en.transcribed.srt
|
114.3 KB
|
#HITB2018AMS D2T2 - Defense-in-Depth Techniques for Modern Web Apps - M. Spagnuolo & L. Weichselbaum.mp4
|
95.8 MB
|
#HITB2018AMS D2T2 - Exposing Hidden Exploitable Behaviors Using EDF - Fernando Arnaboldi.en.transcribed.srt
|
135.4 KB
|
#HITB2018AMS D2T2 - Exposing Hidden Exploitable Behaviors Using EDF - Fernando Arnaboldi.mp4
|
110.5 MB
|
#HITB2018AMS D2T2 - Mallet Towards a Generic Intercepting Proxy - Rogan Dawes.en.transcribed.srt
|
126.8 KB
|
#HITB2018AMS D2T2 - Mallet Towards a Generic Intercepting Proxy - Rogan Dawes.mp4
|
113.3 MB
|
#HITB2018AMS D2T2 - Over The Edge Pwning The Windows Kernel - Rancho Han.en.transcribed.srt
|
56.7 KB
|
#HITB2018AMS D2T2 - Over The Edge Pwning The Windows Kernel - Rancho Han.mp4
|
72.7 MB
|
#HITB2018AMS KEYNOTE 1 The Future, The Past, and … Wait, Where the Hell are We Now - M. Marschalek.en.transcribed.srt
|
157.9 KB
|
#HITB2018AMS KEYNOTE 1 The Future, The Past, and … Wait, Where the Hell are We Now - M. Marschalek.mp4
|
120.5 MB
|
#HITB2018AMS KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio.en.transcribed.srt
|
120.3 KB
|
#HITB2018AMS KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio.mp4
|
87.5 MB
|
#HITB2018AMS Welcome Address Improving Incentives for Cybersecurity - Michel van Eeten.mp4
|
59.3 MB
|
/HITB 2018 - Dubai/
|
HITB2018DXB A Secure And Robust Wireless Comm System For Low-Latency Applications - Dr. H. Mukhtar.mp4
|
31.5 MB
|
HITB2018DXB Building Security Beyond The Genesis Block - Ryan Shepherd.en.transcribed.srt
|
92.2 KB
|
HITB2018DXB Building Security Beyond The Genesis Block - Ryan Shepherd.mp4
|
45.2 MB
|
HITB2018DXB Building Your Own Self Driving, Self Racing Car - Dhillon 'L33tdawg' Kannabhiran.en.transcribed.srt
|
49.1 KB
|
HITB2018DXB Building Your Own Self Driving, Self Racing Car - Dhillon 'L33tdawg' Kannabhiran.mp4
|
28.6 MB
|
HITB2018DXB CTF Prize Giving + Closing Ceremony + Locknote - HitB Crew.en.transcribed.srt
|
38.2 KB
|
HITB2018DXB CTF Prize Giving + Closing Ceremony + Locknote - HitB Crew.mp4
|
64.2 MB
|
HITB2018DXB Enhancing DL DGA Detection Models Using Separate Character Embedding - Vikash Yadav.en.transcribed.srt
|
96.1 KB
|
HITB2018DXB Enhancing DL DGA Detection Models Using Separate Character Embedding - Vikash Yadav.mp4
|
50.1 MB
|
HITB2018DXB Evolution of Security Threats To Telecommunications Infrastructures - Emmanuel Gadaix.en.transcribed.srt
|
72.8 KB
|
HITB2018DXB Evolution of Security Threats To Telecommunications Infrastructures - Emmanuel Gadaix.mp4
|
47.2 MB
|
HITB2018DXB HWallet The Simple Cryptocurrency Hardware Wallet - Nemanja Nikodijevic.en.transcribed.srt
|
53.5 KB
|
HITB2018DXB HWallet The Simple Cryptocurrency Hardware Wallet - Nemanja Nikodijevic.mp4
|
34.9 MB
|
HITB2018DXB Hacking Into Broadband And Broadcast TV Systems - C. Kasmi, P. Barre and T. Sabono.en.transcribed.srt
|
62.0 KB
|
HITB2018DXB Hacking Into Broadband And Broadcast TV Systems - C. Kasmi, P. Barre and T. Sabono.mp4
|
73.3 MB
|
HITB2018DXB Hacking The International RFQ Process killthebuzzwords - Dino Covotsos.en.transcribed.srt
|
93.6 KB
|
HITB2018DXB Hacking The International RFQ Process killthebuzzwords - Dino Covotsos.mp4
|
44.0 MB
|
HITB2018DXB Hacking Yachts Remotely IoT Hacking At Sea - Stephan Gerling.mp4
|
101.4 MB
|
HITB2018DXB Improved Blockchain Infrastructure With IoT - Dr Qassim Nasir and Dr Manar Abu Talib.en.transcribed.srt
|
55.0 KB
|
HITB2018DXB Improved Blockchain Infrastructure With IoT - Dr Qassim Nasir and Dr Manar Abu Talib.mp4
|
28.8 MB
|
HITB2018DXB Offensive Memory Forensics - Hugo Teso.en.transcribed.srt
|
150.2 KB
|
HITB2018DXB Offensive Memory Forensics - Hugo Teso.mp4
|
100.5 MB
|
HITB2018DXB System-level Threats Assumptions In Modern Product Security - Cristofaro Mune.en.transcribed.srt
|
98.5 KB
|
HITB2018DXB System-level Threats Assumptions In Modern Product Security - Cristofaro Mune.mp4
|
51.2 MB
|
HITB2018DXB Welcome Address - H.E. Yousuf Hamad Al Shaibani.mp4
|
4.1 MB
|
HITB2018DXB CLOSING KEYNOTE Blind Digital Signatures - Dr. Manar Abu Talib and Dr. Qassim Nasir.mp4
|
72.2 MB
|
HITB2018DXB D1T1 AI Model Security Reverse Engineering Machine Learning Models - Kang Li.en.transcribed.srt
|
142.0 KB
|
HITB2018DXB D1T1 AI Model Security Reverse Engineering Machine Learning Models - Kang Li.mp4
|
93.3 MB
|
HITB2018DXB D1T1 Hunting For Backdoors In IoT Firmware At Unprecedented Scale - John Toterhi.041883a1-6bc3-4f6d-bb6e-12ccd31fece4.part
|
15.1 MB
|
HITB2018DXB D1T1 Hunting For Backdoors In IoT Firmware At Unprecedented Scale - John Toterhi.en.transcribed.srt
|
117.1 KB
|
HITB2018DXB D1T1 Hunting For Backdoors In IoT Firmware At Unprecedented Scale - John Toterhi.mp4
|
61.1 MB
|
HITB2018DXB D1T1 Rooting Routers Using Symbolic Execution - Mathy Vanhoef.mp4
|
102.7 MB
|
HITB2018DXB D1T1 Spanish Fly Infecting Files On-The-Fly - Leonardo Nve.en.transcribed.srt
|
83.4 KB
|
HITB2018DXB D1T1 Spanish Fly Infecting Files On-The-Fly - Leonardo Nve.mp4
|
80.6 MB
|
HITB2018DXB D1T1 The Phantom Menace Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.31d15e5a-e3af-4294-bd59-c3009d56b097.part
|
35.7 MB
|
HITB2018DXB D1T1 The Phantom Menace Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.en.transcribed.srt
|
52.1 KB
|
HITB2018DXB D1T1 The Phantom Menace Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.mp4
|
78.3 MB
|
HITB2018DXB D1T1 Virtualizing IoT With Code Coverage Guided Fuzzing - KJ Lau and Nguyen Anh Quynh.en.transcribed.srt
|
163.1 KB
|
HITB2018DXB D1T1 Virtualizing IoT With Code Coverage Guided Fuzzing - KJ Lau and Nguyen Anh Quynh.mp4
|
121.3 MB
|
HITB2018DXB D1T2 Extracting Messages From iCloud - Vladimir Katalov.en.transcribed.srt
|
128.7 KB
|
HITB2018DXB D1T2 Extracting Messages From iCloud - Vladimir Katalov.mp4
|
103.6 MB
|
HITB2018DXB D1T2 Gold Digging Discovering Hidden Gems In APKs - Marc Schoenefeld.mp4
|
77.2 MB
|
HITB2018DXB D1T2 Hacking Telephone Systems For Fun & Profit - Himanshu Mehta and Sachin Wagh.mp4
|
65.7 MB
|
HITB2018DXB D1T2 IPv666 - Address Of The Beast - Marc Newlin and Chris Grayson.dcb71ea4-c3c7-4397-b1ec-72e79d530dbd.part
|
42.0 MB
|
HITB2018DXB D1T2 IPv666 - Address Of The Beast - Marc Newlin and Chris Grayson.en.transcribed.srt
|
166.9 KB
|
HITB2018DXB D1T2 IPv666 - Address Of The Beast - Marc Newlin and Chris Grayson.mp4
|
112.1 MB
|
HITB2018DXB D1T2 Intrusion-Detection On The HW Bus - Congyuan Xu,Wang Kang and Yang Bo.en.transcribed.srt
|
79.3 KB
|
HITB2018DXB D1T2 Intrusion-Detection On The HW Bus - Congyuan Xu,Wang Kang and Yang Bo.mp4
|
107.7 MB
|
HITB2018DXB D1T2 Multidimensional HW Attack And Defense Toolset - K. Chai, Jie Fu & Mingchuang Qin.en.transcribed.srt
|
63.6 KB
|
HITB2018DXB D1T2 Multidimensional HW Attack And Defense Toolset - K. Chai, Jie Fu & Mingchuang Qin.mp4
|
73.9 MB
|
HITB2018DXB D2T1 Attacking Industrial Wireless Mesh Networks - M. Van Ommeren and Erwin Paternotte.en.transcribed.srt
|
115.8 KB
|
HITB2018DXB D2T1 Attacking Industrial Wireless Mesh Networks - M. Van Ommeren and Erwin Paternotte.mp4
|
108.4 MB
|
HITB2018DXB D2T1 DHCP Is Hard - Felix Wilhelm.en.transcribed.srt
|
124.4 KB
|
HITB2018DXB D2T1 DHCP Is Hard - Felix Wilhelm.mp4
|
81.5 MB
|
HITB2018DXB D2T1 Glitch Chronicles Turning WebGL Into A Hammer - Pietro Frigo.en.transcribed.srt
|
148.9 KB
|
HITB2018DXB D2T1 Glitch Chronicles Turning WebGL Into A Hammer - Pietro Frigo.mp4
|
85.9 MB
|
HITB2018DXB D2T1 Horror On The Bus Hacking COMBUS - Kirils Solovjovs.en.transcribed.srt
|
125.2 KB
|
HITB2018DXB D2T1 Horror On The Bus Hacking COMBUS - Kirils Solovjovs.mp4
|
116.3 MB
|
HITB2018DXB D2T1 Vote Of No Confidence Second Factor Correctness - Victor Mateu.en.transcribed.srt
|
161.0 KB
|
HITB2018DXB D2T1 Vote Of No Confidence Second Factor Correctness - Victor Mateu.mp4
|
88.5 MB
|
HITB2018DXB D2T2 Auditable & Provable Privacy Of Smart Speakers - Wang Kang and Yang Bo.en.transcribed.srt
|
84.9 KB
|
HITB2018DXB D2T2 Auditable & Provable Privacy Of Smart Speakers - Wang Kang and Yang Bo.mp4
|
88.8 MB
|
HITB2018DXB D2T2 Blockchain, Public Chain and Contract Security - Li Jiafeng and Yang Changcheng.en.transcribed.srt
|
91.9 KB
|
HITB2018DXB D2T2 Blockchain, Public Chain and Contract Security - Li Jiafeng and Yang Changcheng.mp4
|
67.6 MB
|
HITB2018DXB D2T2 Capture This Real Time Packet Processing With FPGAs - Matteo Collura.en.transcribed.srt
|
144.4 KB
|
HITB2018DXB D2T2 Capture This Real Time Packet Processing With FPGAs - Matteo Collura.mp4
|
83.6 MB
|
HITB2018DXB D2T2 NTLM Relay Is Dead, Long Live NTLM Relay - Jianing Wang and Junyu Zhou.en.transcribed.srt
|
80.0 KB
|
HITB2018DXB D2T2 NTLM Relay Is Dead, Long Live NTLM Relay - Jianing Wang and Junyu Zhou.mp4
|
58.1 MB
|
HITB2018DXB D2T2 Using Machine-Learning To Investigate Web Campaigns At Large - Federico Maggi.en.transcribed.srt
|
133.8 KB
|
HITB2018DXB D2T2 Using Machine-Learning To Investigate Web Campaigns At Large - Federico Maggi.mp4
|
136.2 MB
|
HITB2018DXB KEYNOTE 1 Crouching Tiger, Sudden Keynote - Katie Moussouris.en.transcribed.srt
|
137.5 KB
|
HITB2018DXB KEYNOTE 1 Crouching Tiger, Sudden Keynote - Katie Moussouris.mp4
|
165.7 MB
|
HITB2018DXB KEYNOTE 2 Cyber Arms Race - Mikko Hypponen (2).en.transcribed.srt
|
107.4 KB
|
HITB2018DXB KEYNOTE 2 Cyber Arms Race - Mikko Hypponen (2).mp4
|
152.1 MB
|
HITB2018DXB KEYNOTE 2 Cyber Arms Race - Mikko Hypponen.en.transcribed.srt
|
107.4 KB
|
HITB2018DXB KEYNOTE 2 Cyber Arms Race - Mikko Hypponen.mp4
|
95.0 MB
|
/HITB 2018 - Singapore/
|
#HITBGEC 2018 COMMSEC Software Security Era Past, Present, And Future - Nafiez and Jaan Yeh.mp4
|
40.2 MB
|
#HITBGSEC 2018 Panel Discussion Zero Seconds To Midnight The 0-day Market.en.transcribed.srt
|
156.6 KB
|
#HITBGSEC 2018 Panel Discussion Zero Seconds To Midnight The 0-day Market.mp4
|
109.6 MB
|
#HITBGSEC 2018 - COMMSEC Welcome Address - Andrea Zapparoli Manzoni.en.transcribed.srt
|
22.1 KB
|
#HITBGSEC 2018 - COMMSEC Welcome Address - Andrea Zapparoli Manzoni.mp4
|
11.3 MB
|
#HITBGSEC 2018 CLOSING KEYNOTE Rethinking The Cyber Kill Chain - Alexis Lavi.en.transcribed.srt
|
58.5 KB
|
#HITBGSEC 2018 CLOSING KEYNOTE Rethinking The Cyber Kill Chain - Alexis Lavi.mp4
|
36.4 MB
|
#HITBGSEC 2018 COMMSEC Blockchain And Smart Contract Attack Vectors - Jorden Seet.en.transcribed.srt
|
100.9 KB
|
#HITBGSEC 2018 COMMSEC Blockchain And Smart Contract Attack Vectors - Jorden Seet.mp4
|
48.5 MB
|
#HITBGSEC 2018 COMMSEC Breaking Full Disk Encryption - Nicolas Collery and Vitaly Kamluk.en.transcribed.srt
|
86.2 KB
|
#HITBGSEC 2018 COMMSEC Breaking Full Disk Encryption - Nicolas Collery and Vitaly Kamluk.mp4
|
55.8 MB
|
#HITBGSEC 2018 COMMSEC Closing Remarks - Andrea Zapparoli Manzoni.en.transcribed.srt
|
14.8 KB
|
#HITBGSEC 2018 COMMSEC Closing Remarks - Andrea Zapparoli Manzoni.mp4
|
9.8 MB
|
#HITBGSEC 2018 COMMSEC Cognitive Automation With Machine Learning In Cybersecurity - Rishi Kant.en.transcribed.srt
|
54.6 KB
|
#HITBGSEC 2018 COMMSEC Cognitive Automation With Machine Learning In Cybersecurity - Rishi Kant.mp4
|
38.9 MB
|
#HITBGSEC 2018 COMMSEC Generic And Static Detection Of Mobile Malware Using ML - Minh Tran.en.transcribed.srt
|
67.2 KB
|
#HITBGSEC 2018 COMMSEC Generic And Static Detection Of Mobile Malware Using ML - Minh Tran.mp4
|
28.9 MB
|
#HITBGSEC 2018 COMMSEC Hacking Mobile Games Closing The Gap - Nicholas Lim.en.transcribed.srt
|
82.2 KB
|
#HITBGSEC 2018 COMMSEC Hacking Mobile Games Closing The Gap - Nicholas Lim.mp4
|
41.7 MB
|
#HITBGSEC 2018 COMMSEC Internet Of Things Battle Of The Bots - Rommel D. Joven.en.transcribed.srt
|
62.9 KB
|
#HITBGSEC 2018 COMMSEC Internet Of Things Battle Of The Bots - Rommel D. Joven.mp4
|
29.6 MB
|
#HITBGSEC 2018 COMMSEC KLara Your New Friend - Dan Demeter.en.transcribed.srt
|
68.4 KB
|
#HITBGSEC 2018 COMMSEC KLara Your New Friend - Dan Demeter.mp4
|
47.9 MB
|
#HITBGSEC 2018 COMMSEC Learning How To Smurf With Honeypots - Emil Tan.en.transcribed.srt
|
78.3 KB
|
#HITBGSEC 2018 COMMSEC Learning How To Smurf With Honeypots - Emil Tan.mp4
|
45.6 MB
|
#HITBGSEC 2018 COMMSEC Monitoring Native Execution In WoW64 Apps - Y. Shafir and A. Carlsbad.en.transcribed.srt
|
130.0 KB
|
#HITBGSEC 2018 COMMSEC Monitoring Native Execution In WoW64 Apps - Y. Shafir and A. Carlsbad.mp4
|
64.0 MB
|
#HITBGSEC 2018 COMMSEC SayaKenaHack Breach Notification In Malaysia - Keith Rozario.en.transcribed.srt
|
93.4 KB
|
#HITBGSEC 2018 COMMSEC SayaKenaHack Breach Notification In Malaysia - Keith Rozario.mp4
|
45.4 MB
|
#HITBGSEC 2018 COMMSEC Securing ICS SCADA Defense In Depth - Mike Rebultan.en.transcribed.srt
|
39.1 KB
|
#HITBGSEC 2018 COMMSEC Securing ICS SCADA Defense In Depth - Mike Rebultan.mp4
|
33.6 MB
|
#HITBGSEC 2018 COMMSEC Surprise Rant 2.0 - Joernchen.en.transcribed.srt
|
34.1 KB
|
#HITBGSEC 2018 COMMSEC Surprise Rant 2.0 - Joernchen.mp4
|
21.0 MB
|
#HITBGSEC 2018 COMMSEC The Trails Of WINDSHIFT APT - Taha Karim.en.transcribed.srt
|
130.7 KB
|
#HITBGSEC 2018 COMMSEC The Trails Of WINDSHIFT APT - Taha Karim.mp4
|
81.7 MB
|
#HITBGSEC 2018 COMMSEC Threat Impact Analyser For IoT - Simon Eng and Lim Eng Woei.en.transcribed.srt
|
75.4 KB
|
#HITBGSEC 2018 COMMSEC Threat Impact Analyser For IoT - Simon Eng and Lim Eng Woei.mp4
|
47.3 MB
|
#HITBGSEC 2018 COMMSEC Using ML To Identify Security Issues In Open-Source Libraries - A. Sharma.en.transcribed.srt
|
78.0 KB
|
#HITBGSEC 2018 COMMSEC Using ML To Identify Security Issues In Open-Source Libraries - A. Sharma.mp4
|
28.2 MB
|
#HITBGSEC 2018 COMMSEC - Demystifying The Definitions Of Dark - Fadli. B. Sidek.en.transcribed.srt
|
69.1 KB
|
#HITBGSEC 2018 COMMSEC - Demystifying The Definitions Of Dark - Fadli. B. Sidek.mp4
|
40.0 MB
|
#HITBGSEC 2018 D1 A First Look Into The Security Of The Apple Pencil And Smartkeyboard - S. Esser.en.transcribed.srt
|
138.3 KB
|
#HITBGSEC 2018 D1 A First Look Into The Security Of The Apple Pencil And Smartkeyboard - S. Esser.mp4
|
72.3 MB
|
#HITBGSEC 2018 D1 A Year Of Purple - Ryan Shepherd.en.transcribed.srt
|
216.2 KB
|
#HITBGSEC 2018 D1 A Year Of Purple - Ryan Shepherd.mp4
|
84.3 MB
|
#HITBGSEC 2018 D1 Exploiting Automation In LTE Mobile Networks - R. Borgaonkar and A. Shaik.en.transcribed.srt
|
131.7 KB
|
#HITBGSEC 2018 D1 Exploiting Automation In LTE Mobile Networks - R. Borgaonkar and A. Shaik.mp4
|
46.7 MB
|
#HITBGSEC 2018 D1 File Structures Another Binary Exploitation Technique - An-Jie Yang (Angelboy).en.transcribed.srt
|
79.1 KB
|
#HITBGSEC 2018 D1 File Structures Another Binary Exploitation Technique - An-Jie Yang (Angelboy).mp4
|
44.2 MB
|
#HITBGSEC 2018 D1 God Mode Unlocked Hardware Backdoors In x86 CPUs - Christopher Domas.en.transcribed.srt
|
178.9 KB
|
#HITBGSEC 2018 D1 God Mode Unlocked Hardware Backdoors In x86 CPUs - Christopher Domas.mp4
|
59.1 MB
|
#HITBGSEC 2018 D1 Owning Electronic Locks Without Leaving A Trace - Tomi Tuominen and Timo Hirvonen.en.transcribed.srt
|
121.3 KB
|
#HITBGSEC 2018 D1 Owning Electronic Locks Without Leaving A Trace - Tomi Tuominen and Timo Hirvonen.mp4
|
71.6 MB
|
#HITBGSEC 2018 D1 Turning Memory Errors Into Code Execution With Client-Side Compilers - R. Gawlik.mp4
|
34.0 MB
|
#HITBGSEC 2018 D2 Hacking BLE Bicycle Locks For Fun And (A Small) Profit - Vincent Tan.en.transcribed.srt
|
74.4 KB
|
#HITBGSEC 2018 D2 Hacking BLE Bicycle Locks For Fun And (A Small) Profit - Vincent Tan.mp4
|
35.4 MB
|
#HITBGSEC 2018 D2 NFC Payments The Art Of Relay And Replay Attacks - Salvador Mendoza.en.transcribed.srt
|
82.0 KB
|
#HITBGSEC 2018 D2 NFC Payments The Art Of Relay And Replay Attacks - Salvador Mendoza.mp4
|
54.4 MB
|
#HITBGSEC 2018 D2 The Road To iOS Sandbox Escape - Rani Idan.en.transcribed.srt
|
89.1 KB
|
#HITBGSEC 2018 D2 The Road To iOS Sandbox Escape - Rani Idan.mp4
|
42.4 MB
|
#HITBGSEC 2018 D2 Traversing The Kill-Chain The New Shiny In 2018 - Vincent Yiu.en.transcribed.srt
|
156.7 KB
|
#HITBGSEC 2018 D2 Traversing The Kill-Chain The New Shiny In 2018 - Vincent Yiu.mp4
|
70.9 MB
|
#HITBGSEC 2018 D2 Viewer Discretion Advised (De)Coding An iOS Vulnerability - Adam Donenfeld.en.transcribed.srt
|
149.2 KB
|
#HITBGSEC 2018 D2 Viewer Discretion Advised (De)Coding An iOS Vulnerability - Adam Donenfeld.mp4
|
64.0 MB
|
#HITBGSEC 2018 KEYNOTE 1 (In)Security Is Eating The World - Michael Coates.en.transcribed.srt
|
130.6 KB
|
#HITBGSEC 2018 KEYNOTE 1 (In)Security Is Eating The World - Michael Coates.mp4
|
41.6 MB
|
#HITBGSEC 2018 KEYNOTE 2 OK Computer Machine Learning In Cybersecurity - Alexander Polyakov.en.transcribed.srt
|
3.9 KB
|
#HITBGSEC 2018 KEYNOTE 2 OK Computer Machine Learning In Cybersecurity - Alexander Polyakov.mp4
|
2.7 MB
|
#HITBGSEC 2018 LOCK NOTE - Philippe Viola.en.transcribed.srt
|
20.8 KB
|
#HITBGSEC 2018 LOCK NOTE - Philippe Viola.mp4
|
15.5 MB
|
#HITBGSec 2018 COMMSEC RedPhishing Wi-Fi, Phishing And Red Teaming - Matteo Beccaro.en.transcribed.srt
|
41.6 KB
|
#HITBGSec 2018 COMMSEC RedPhishing Wi-Fi, Phishing And Red Teaming - Matteo Beccaro.mp4
|
21.8 MB
|
/HITB 2019 - Amsterdam/
|
#HITB2019AMS CLOSING The Beginning Of The End A Return To The Abyss For A Quick Look - R. Thieme.en.transcribed.srt
|
105.9 KB
|
#HITB2019AMS CLOSING The Beginning Of The End A Return To The Abyss For A Quick Look - R. Thieme.mp4
|
92.2 MB
|
#HITB2019AMS Closing Ceremony & CTF Prize Giving Ceremony.en.transcribed.srt
|
23.9 KB
|
#HITB2019AMS Closing Ceremony & CTF Prize Giving Ceremony.mp4
|
114.2 MB
|
#HITB2019AMS D1T1 - A Successful Mess Between Hardening And Mitigation - Weichselbaum & Spagnuolo.en.transcribed.srt
|
97.0 KB
|
#HITB2019AMS D1T1 - A Successful Mess Between Hardening And Mitigation - Weichselbaum & Spagnuolo.mp4
|
321.5 MB
|
#HITB2019AMS D1T1 - Deobfuscate UEFI BIOS Malware And Virtualized Packers - Alexandre Borges.en.transcribed.srt
|
65.9 KB
|
#HITB2019AMS D1T1 - Deobfuscate UEFI BIOS Malware And Virtualized Packers - Alexandre Borges.mp4
|
372.3 MB
|
#HITB2019AMS D1T1 - Finding Vulnerabilities In iOS MacOS Networking Code - Kevin Backhouse.en.transcribed.srt
|
73.3 KB
|
#HITB2019AMS D1T1 - Finding Vulnerabilities In iOS MacOS Networking Code - Kevin Backhouse.mp4
|
241.9 MB
|
#HITB2019AMS D1T1 - Make ARM Shellcode Great Again - Saumil Shah.mp4
|
271.0 MB
|
#HITB2019AMS D1T1 - Pwning Centrally-Controlled Smart Homes - Sanghyun Park and Seongjoon Cho.mp4
|
123.0 MB
|
#HITB2019AMS D1T1 - TOCTOU Attacks Against Secure Boot And BootGuard - Trammell Hudson & Peter Bosch.en.transcribed.srt
|
58.0 KB
|
#HITB2019AMS D1T1 - TOCTOU Attacks Against Secure Boot And BootGuard - Trammell Hudson & Peter Bosch.mp4
|
194.8 MB
|
#HITB2019AMS D1T1 - The Birdman Hacking Cospas-Sarsat Satellites - Hao Jingli.en.transcribed.srt
|
48.7 KB
|
#HITB2019AMS D1T1 - The Birdman Hacking Cospas-Sarsat Satellites - Hao Jingli.mp4
|
173.7 MB
|
#HITB2019AMS D1T2 - Automated Discovery Of Logical Priv. Esc. Bugs In Win10 - Wenxu Wu and Shi Qin.en.transcribed.srt
|
53.9 KB
|
#HITB2019AMS D1T2 - Automated Discovery Of Logical Priv. Esc. Bugs In Win10 - Wenxu Wu and Shi Qin.mp4
|
353.4 MB
|
#HITB2019AMS D1T2 - Duplicating Black Box Machine Learning Models - Rewanth Cool and Nikhil Joshi.mp4
|
220.2 MB
|
#HITB2019AMS D1T2 - For The Win The Art Of The Windows Kernel Fuzzing - Guangming Liu.en.transcribed.srt
|
38.5 KB
|
#HITB2019AMS D1T2 - For The Win The Art Of The Windows Kernel Fuzzing - Guangming Liu.mp4
|
298.9 MB
|
#HITB2019AMS D1T2 - H(ack)DMI Pwning HDMI For Fun And Profit - Jeonghoon Shin and Changhyeon Moon.mp4
|
230.0 MB
|
#HITB2019AMS D1T2 - Hidden Agendas Bypassing GSMA Recommendations On SS7 Networks - Kirill Puzankov.en.transcribed.srt
|
72.9 KB
|
#HITB2019AMS D1T2 - Hidden Agendas Bypassing GSMA Recommendations On SS7 Networks - Kirill Puzankov.mp4
|
336.3 MB
|
#HITB2019AMS D1T2 - Hourglass Fuzz A Quick Bug Hunting Method - M. Li, T. Han, L. Jiang and L. Wu.en.transcribed.srt
|
81.1 KB
|
#HITB2019AMS D1T2 - Hourglass Fuzz A Quick Bug Hunting Method - M. Li, T. Han, L. Jiang and L. Wu.mp4
|
293.2 MB
|
#HITB2019AMS D1T2 - Researching New Attack Interfaces On iOS And OSX - Lilang Wu and Moony Li.en.transcribed.srt
|
61.2 KB
|
#HITB2019AMS D1T2 - Researching New Attack Interfaces On iOS And OSX - Lilang Wu and Moony Li.mp4
|
299.4 MB
|
#HITB2019AMS D1T2 - fn_fuzzy Fast Multiple Binary Diffing Triage With IDA - Takahiro Haruyama.mp4
|
153.6 MB
|
#HITB2019AMS D1T3 - Attacking GSM - Alarms, Smart Homes, Smart Watches And More - Alex Kolchanov.mp4
|
238.0 MB
|
#HITB2019AMS D1T3 - How To Dump, Parse, And Analyze i.MX Flash Memory Chips - Damien Cauquil.en.transcribed.srt
|
69.5 KB
|
#HITB2019AMS D1T3 - How To Dump, Parse, And Analyze i.MX Flash Memory Chips - Damien Cauquil.mp4
|
54.1 MB
|
#HITB2019AMS D1T3 - Overcoming Fear Reversing With Radare2 - Arnau Gamez Montolio.en.transcribed.srt
|
183.4 KB
|
#HITB2019AMS D1T3 - Overcoming Fear Reversing With Radare2 - Arnau Gamez Montolio.mp4
|
516.1 MB
|
#HITB2019AMS D2T1 - Attacking Industrial Remote Controllers - Marco Balduzzi and Federico Maggi.en.transcribed.srt
|
85.6 KB
|
#HITB2019AMS D2T1 - Attacking Industrial Remote Controllers - Marco Balduzzi and Federico Maggi.mp4
|
340.3 MB
|
#HITB2019AMS D2T1 - Compiler Bugs And Bug Compilers - Marion Marschalek.en.transcribed.srt
|
121.6 KB
|
#HITB2019AMS D2T1 - Compiler Bugs And Bug Compilers - Marion Marschalek.mp4
|
238.4 MB
|
#HITB2019AMS D2T1 - Muraena The Unexpected Phish - Michele Orru and Giuseppe Trotta.en.transcribed.srt
|
65.4 KB
|
#HITB2019AMS D2T1 - Muraena The Unexpected Phish - Michele Orru and Giuseppe Trotta.mp4
|
221.5 MB
|
#HITB2019AMS D2T1 - Sneaking Past Device Guard - Philip Tsukerman.en.transcribed.srt
|
77.4 KB
|
#HITB2019AMS D2T1 - Sneaking Past Device Guard - Philip Tsukerman.mp4
|
276.1 MB
|
#HITB2019AMS D2T2 - Binder The Bridge To Root - Hongli Han and Mingjian Zhou.en.transcribed.srt
|
38.6 KB
|
#HITB2019AMS D2T2 - Binder The Bridge To Root - Hongli Han and Mingjian Zhou.mp4
|
151.9 MB
|
#HITB2019AMS D2T2 - Improving Unicode Attacks With Deep Learning - Muñoz, Boza & Escribano.mp4
|
63.7 MB
|
#HITB2019AMS D2T2 - ModJack Hijacking The MacOS Kernel - Zhi Zhou.en.transcribed.srt
|
70.7 KB
|
#HITB2019AMS D2T2 - ModJack Hijacking The MacOS Kernel - Zhi Zhou.mp4
|
361.1 MB
|
#HITB2019AMS D2T2 - Panic On The Streets Of Amsterdam PanicXNU 3.0 - Juwei Lin and Junzhi Lu.en.transcribed.srt
|
57.9 KB
|
#HITB2019AMS D2T2 - Panic On The Streets Of Amsterdam PanicXNU 3.0 - Juwei Lin and Junzhi Lu.mp4
|
288.6 MB
|
#HITB2019AMS D2T2 - Reversing Cryptographic Primitives Using Quantum Computing - Renaud Lifchitz.en.transcribed.srt
|
76.4 KB
|
#HITB2019AMS D2T2 - Reversing Cryptographic Primitives Using Quantum Computing - Renaud Lifchitz.mp4
|
426.2 MB
|
#HITB2019AMS KEYNOTE 2 - Securing Journalists - Runa Sandvik.en.transcribed.srt
|
72.8 KB
|
#HITB2019AMS KEYNOTE 2 - Securing Journalists - Runa Sandvik.mp4
|
140.5 MB
|
#HITB2019AMS KEYNOTE The End Is The Beginning Is The End Ten Years In The NL Box - D. Kannabhiran.en.transcribed.srt
|
77.1 KB
|
#HITB2019AMS KEYNOTE The End Is The Beginning Is The End Ten Years In The NL Box - D. Kannabhiran.mp4
|
181.3 MB
|
#HITB2019AMS LOCKNOTE - HITB+CyberWeek Announcement - Dhillon 'L33tdawg' Kannabhiran.en.transcribed.srt
|
22.3 KB
|
#HITB2019AMS LOCKNOTE - HITB+CyberWeek Announcement - Dhillon 'L33tdawg' Kannabhiran.mp4
|
62.6 MB
|
#HITB2019AMS PRECONF PREVIEW - The Beginning of the End A Return to the Abyss for a Quick Look.en.transcribed.srt
|
4.2 KB
|
#HITB2019AMS PRECONF PREVIEW - The Beginning of the End A Return to the Abyss for a Quick Look.mp4
|
8.6 MB
|
#HITB2019AMS PRECONF PREVIEW - The End Is The Beginning Is The End Ten Years In The NL Box.en.transcribed.srt
|
0.9 KB
|
#HITB2019AMS PRECONF PREVIEW - The End Is The Beginning Is The End Ten Years In The NL Box.mp4
|
1.7 MB
|
#HITBHaxpo D1 - Hacking LTE Public Warning Systems - Weiguang Li.en.transcribed.srt
|
24.1 KB
|
#HITBHaxpo D1 - Hacking LTE Public Warning Systems - Weiguang Li.mp4
|
70.1 MB
|
#HITBHaxpo D1 - Hacking The 0day Market - Andrea Zapparoli Manzoni.en.transcribed.srt
|
44.3 KB
|
#HITBHaxpo D1 - Hacking The 0day Market - Andrea Zapparoli Manzoni.mp4
|
73.5 MB
|
#HITBHaxpo D1 - Social Networks Can We Fix Them - Joel Hernandez.en.transcribed.srt
|
29.3 KB
|
#HITBHaxpo D1 - Social Networks Can We Fix Them - Joel Hernandez.mp4
|
106.5 MB
|
#HITBHaxpo D1 - V1 Bounty Building A Coordinated Bug Disclosure Bridge For The EU - Benjamin Kunz.mp4
|
199.7 MB
|
#HITBHaxpo D1 - WiCy Monitoring 802.11AC Networks At Scale - Vivek Ramachandran.mp4
|
72.7 MB
|
#HITBHaxpo D2 - Attacking Encrypted VOIP Protocols - Ivica Stipovic.en.transcribed.srt
|
39.8 KB
|
#HITBHaxpo D2 - Attacking Encrypted VOIP Protocols - Ivica Stipovic.mp4
|
85.6 MB
|
#HITBHaxpo D2 - Demystifying IoT OT Hacks With SDR - Harshit Agrawal & Himanshu Mehta.en.transcribed.srt
|
57.1 KB
|
#HITBHaxpo D2 - Demystifying IoT OT Hacks With SDR - Harshit Agrawal & Himanshu Mehta.mp4
|
18.7 MB
|
#HITBHaxpo D2 - I Own Your Building (Management System) - Gjoko Krstic.en.transcribed.srt
|
62.7 KB
|
#HITBHaxpo D2 - I Own Your Building (Management System) - Gjoko Krstic.mp4
|
129.6 MB
|
#HITBHaxpo D2 - Might As Well JUMP Exploit Development For Java Serialization - Jameel Nabbo.en.transcribed.srt
|
30.9 KB
|
#HITBHaxpo D2 - Might As Well JUMP Exploit Development For Java Serialization - Jameel Nabbo.mp4
|
109.5 MB
|
#HITBHaxpo D2 - PatrOwl - The Red Flavour Of SOC Automation And Orchestration - Nicolas Mattiocco.mp4
|
86.3 MB
|
#HITBHaxpo D2 - Reverse Engineering Custom ASICs By Exploiting Supply-Chain Leaks - Thomas Weber.en.transcribed.srt
|
35.9 KB
|
#HITBHaxpo D2 - Reverse Engineering Custom ASICs By Exploiting Supply-Chain Leaks - Thomas Weber.mp4
|
155.7 MB
|
#HITBHaxpo D2 - Reversing Mobile Malware - Abdullah Joseph.en.transcribed.srt
|
54.3 KB
|
#HITBHaxpo D2 - Reversing Mobile Malware - Abdullah Joseph.mp4
|
184.4 MB
|
#HITBHaxpo D2 - Rise Of The WarPi - Kevin McPeake.en.transcribed.srt
|
56.7 KB
|
#HITBHaxpo D2 - Rise Of The WarPi - Kevin McPeake.mp4
|
111.4 MB
|
#HITBHaxpo D2 - Secure And Scalable Anomaly-Based Network Intrusion Detection - Philipp Mieden.en.transcribed.srt
|
54.5 KB
|
#HITBHaxpo D2 - Secure And Scalable Anomaly-Based Network Intrusion Detection - Philipp Mieden.mp4
|
163.7 MB
|
/
|
Hack in the Box thank you.txt
|
0.8 KB
|
hitb logo.png
|
29.6 KB
|
Total files 1070
|