FileMood

Download Hack In The Box

Hack In The Box

Name

Hack In The Box

 DOWNLOAD Copy Link

Total Size

73.3 GB

Total Files

1070

Last Seen

2024-07-19 23:12

Hash

9BF10AED93A61383C8354242A1226411A1B33757

/HITB 2003 - Malyasia/

bt1.mp4

143.2 MB

bt2.mp4

91.4 MB

bt3.mp4

73.3 MB

bt4.mp4

85.4 MB

bt5.mp4

84.5 MB

bt6.mp4

40.3 MB

panel.mp4

166.3 MB

tt1.mp4

144.5 MB

tt2.mp4

115.6 MB

tt3.mp4

96.2 MB

tt4.mp4

119.1 MB

tt5.mp4

128.3 MB

tt6.mp4

157.1 MB

tt7.mp4

185.6 MB

tt8.mp4

100.9 MB

tt9.mp4

164.8 MB

/proceedings/

hitb04-adam-gowdiak.pdf

56.4 MB

hitb04-captain-crunch-01.pdf

41.7 KB

hitb04-captain-crunch-02.pdf

38.6 KB

hitb04-chew-keong-tan.pdf

9.0 MB

hitb04-emmanuel-gadaix.pdf

43.8 MB

hitb04-fyodor-meder.pdf

880.4 KB

hitb04-gareth-davies.pdf

589.7 KB

hitb04-grugq.pdf

1.1 MB

hitb04-jose-nazario.pdf

458.4 KB

hitb04-kamal-hilmi.tgz

657.1 KB

hitb04-roberto-fabio.pdf

2.1 MB

hitb04-shreeraj-shah.pdf

583.6 KB

hitb04-sk-chong.pdf

988.5 KB

hitb04-sukhdev-singh.pdf

13.8 MB

hitb04-teo-sze-siong.zip

364.7 KB

hitb04-theo-deraadt.zip

2.7 MB

hitb04-toh-swee-hoe.pdf

6.7 MB

/videos/

hitb2004-adam-gowdiak.mp4

203.1 MB

hitb2004-emmanuel-gadaix.mp4

197.0 MB

hitb2004-fyodor-and-meder.mp4

95.4 MB

hitb2004-gareth-davies.mp4

63.9 MB

hitb2004-grugq.mp4

101.2 MB

hitb2004-jorge-sebastiao.mp4

71.0 MB

hitb2004-jose-nazario.mp4

120.3 MB

hitb2004-keynote-1-theo-de-raadt.mp4

101.2 MB

hitb2004-panel-discussion.mp4

111.3 MB

hitb2004-roberto-and-fabio.mp4

145.2 MB

hitb2004-shreeraj-shah.mp4

144.2 MB

hitb2004-sk-chong.mp4

173.1 MB

hitb2004-sukdev-singh.mp4

76.0 MB

hitb2004-suresh-ramasamy.mp4

67.1 MB

hitb2004-teo-sze-siong.mp4

74.3 MB

hitb2004-toh-swee-hoe.mp4

127.7 MB

/proceedings/

BT-Anthony-Zboralski-Social-Engineering.pdf

1.1 MB

BT-Fabrice-Marie-Hacking-Internet-Banking-Applications.pdf

1.2 MB

BT-Raoul-Chiesa-X25-Security.pdf

1.1 MB

BT-Roberto-Preatoni-Fabio-Ghioni-Corp-vs-Corp.ppt

7.5 MB

BT-Tim-Pritlove-Blinkenlights-Arcade-Project.pdf

5.3 MB

HITB.gif

14.4 KB

Keynote-Mikko-Hypponen-Mobile-Malware.pdf

3.6 MB

Keynote-Tony-Chor-IE-Security-Past-Present-and-Future.ppt

5.1 MB

Mark Schoenefeld - Java and Secure Programming.pdf

3.7 MB

TT-Dave-Aitel-Nematodes.zip

63.3 KB

TT-Fyodor-Yarochkin-Meder-Kydyraliev-STIFware-Evolution.ppt

491.0 KB

TT-Jim-Geovedi-Hotspot-Security.pdf

789.6 KB

TT-Joanna-Rutkowska-HITB-Virginity-Verifier.ppt

540.7 KB

TT-Jose-Nazario-Analyzing-all-that-data.pdf

806.3 KB

TT-Nish-Bhalla-Defects-Overview.pdf

614.9 KB

TT-Roelof-Temmingh-State-of-the-art.ppt

2.6 MB

TT-San-Hacking-Windows-CE.ppt

900.1 KB

TT-Shreeraj-Shah-Webhacking-Kungfu.pdf

294.0 KB

TT-The-Grugq-VoIPPhreaking.ppt

137.2 KB

/video/

AnalyzingCode.mp4

116.7 MB

AssesingSrvSec.mp4

161.9 MB

BeneficialWorms.mp4

184.8 MB

BuildSecOperCenter.mp4

142.3 MB

CCC.mp4

156.4 MB

CyberSkirmishes.mp4

90.5 MB

HITBSecConf2005 Malaysia _ Fyodor Y.mp4

81.2 MB

HITBSecConf2005 Malaysia _ Roelof T.mp4

87.3 MB

HITBSecConf2005 Malaysia _ Fabrice M.mp4

87.1 MB

HITBSecConf2005 Malaysia _ Jim Geove.mp4

50.7 MB

HITBSecConf2005 Malaysia _ Joanna Ru.mp4

87.0 MB

HITBSecConf2005 Malaysia _ Marc Scho.mp4

87.1 MB

HITBSecConf2005 Malaysia _ Raoul Chi.mp4

98.0 MB

HITBSecConf2005 Malaysia _ Roberto P.mp4

80.0 MB

HITBSecConf2005 Malaysia _ Rohyt Bel.mp4

53.1 MB

HITBSecConf2005 Malaysia _ The Grugq.mp4

99.6 MB

HckInternetBankingApp.mp4

160.7 MB

HckingWinCE.mp4

137.8 MB

IE-Security.mp4

256.9 MB

Java&SecProgramming.mp4

161.0 MB

MobileMalware.mp4

216.9 MB

ModernEspionage_all.mp4

222.8 MB

RealWorldAttacks.mp4

129.2 MB

STIF-wareEvol.mp4

170.5 MB

SocialEngineeringFundam.mp4

148.4 MB

StiftingHaystacks.mp4

140.5 MB

VoIPhreaking.mp4

176.0 MB

WHckingKungFU.mp4

144.8 MB

wifiHotspotSec.mp4

94.9 MB

windowsMalwareDetection.mp4

161.0 MB

x25SecurityWwwww.mp4

204.3 MB

/HITB 2006 - Malaysia/

HITBSecConf2006 Malaysia - Mark Curp.mp4

59.1 MB

HITBSecConf2006 Malaysia - Mark Curphey & John Viega - Keynote.mp4

59.1 MB

HITBSecConf2006 Malaysia _ Ching Ti.mp4

73.2 MB

HITBSecConf2006 Malaysia _ Ching Tim Meng - X.805 Standard.mp4

73.2 MB

HITBSecConf2006 Malaysia _ Michael Davis - Client Honeypots - Its not only ...(2).mp4

45.6 MB

HITBSecConf2006 Malaysia _ Michael Davis - Client Honeypots - Its not only ....mp4

45.6 MB

HITBSecConf2006 Malaysia _ Michael.mp4

45.6 MB

HITBSecConf2006 Malaysia _ Anthony Z.mp4

79.7 MB

HITBSecConf2006 Malaysia _ Anthony Zboralski & Dave McKay - Hacking Trust.mp4

79.7 MB

HITBSecConf2006 Malaysia _ CTF Prize Giving & Charity Auction.mp4

75.2 MB

HITBSecConf2006 Malaysia _ Carlos Sarraute & Javier Burroni - Neural Networks.mp4

53.2 MB

HITBSecConf2006 Malaysia _ Douglas M.mp4

72.1 MB

HITBSecConf2006 Malaysia _ Douglas MacIver - Pen Testing Windows Vista BitLocker.mp4

72.1 MB

HITBSecConf2006 Malaysia _ Fabrice M.mp4

83.6 MB

HITBSecConf2006 Malaysia _ Fabrice Marie - Application Intrusion Prevention....mp4

83.6 MB

HITBSecConf2006 Malaysia _ Fyodor Yarochkin & Meder Kydyraliev - YAWATT.mp4

48.1 MB

HITBSecConf2006 Malaysia _ Jim Geove.mp4

68.4 MB

HITBSecConf2006 Malaysia _ Jim Geovedi & Raditya Iryandi - Hacking VSAT.mp4

68.4 MB

HITBSecConf2006 Malaysia _ Joanna Rutkowska - Subverting Vista Kernel for Fun...mp4

87.8 MB

HITBSecConf2006 Malaysia _ Jonathan Limbo - The world through the eyes of a .....mp4

36.8 MB

HITBSecConf2006 Malaysia _ Lisa Thal.mp4

48.2 MB

HITBSecConf2006 Malaysia _ Lisa Thalheim - Visualization of Source Code.mp4

48.2 MB

HITBSecConf2006 Malaysia _ Marc Scho.mp4

88.8 MB

HITBSecConf2006 Malaysia _ Marc Schonefeld - Pentesting Java_J2EE.mp4

88.8 MB

HITBSecConf2006 Malaysia _ Nguyen An.mp4

68.7 MB

HITBSecConf2006 Malaysia _ Nguyen Anh Quynh - Invisible Honeypot Monitoring.mp4

68.7 MB

HITBSecConf2006 Malaysia _ Nish Balla - Finding Secrets in ISAPI.mp4

56.4 MB

HITBSecConf2006 Malaysia _ Paul Boeh.mp4

47.0 MB

HITBSecConf2006 Malaysia _ Paul Boehm - Taming Bugs.mp4

47.0 MB

HITBSecConf2006 Malaysia _ Philippe Biondi & Arnaud Ebalard - Scapy and IPv6.mp4

78.9 MB

HITBSecConf2006 Malaysia _ Philippe.mp4

78.9 MB

HITBSecConf2006 Malaysia _ Raoul Chi.mp4

56.2 MB

HITBSecConf2006 Malaysia _ Raoul Chiesa - Hacker's Profiling Project (HPP).mp4

56.2 MB

HITBSecConf2006 Malaysia _ Roberto P.mp4

59.5 MB

HITBSecConf2006 Malaysia _ Roberto Preatoni & Fabio Ghioni - The Biggest Brother.mp4

59.5 MB

HITBSecConf2006 Malaysia _ Rohyt Bel.mp4

67.6 MB

HITBSecConf2006 Malaysia _ Rohyt Belani - Smashing the stack for profit - period.mp4

67.6 MB

HITBSecConf2006 Malaysia _ Saumil Sh.mp4

69.3 MB

HITBSecConf2006 Malaysia _ Saumil Shah - Writing Metasploit Plugins.mp4

69.3 MB

HITBSecConf2006 Malaysia _ The Grugq - VoIPhreaking_ SIPhallis Unveiled.mp4

78.2 MB

HITBSecConf2006 Malaysia _ The Grugq.mp4

78.2 MB

HITBSecConf2006 Malaysia _ Thorsten Holz - Playing with Botnets.mp4

59.7 MB

HITBSecConf2006 Malaysia _ Thorsten.mp4

59.7 MB

HITBSecConf2006 Malaysia _ Van Hause.mp4

75.7 MB

HITBSecConf2006 Malaysia _ Van Hauser - Attacking the IPv6 Protocol Suite.mp4

75.7 MB

HITBSecConf2006 Malaysia _ Wes Brown - MOSREF(2).mp4

78.4 MB

HITBSecConf2006 Malaysia _ Wes Brown - MOSREF.mp4

78.4 MB

HITBSecConf2006 Malaysia _ Wes Brown.mp4

78.4 MB

HITBSecConf2006 Malaysia _ Window Sn.mp4

61.3 MB

HITBSecConf2006 Malaysia _ Window Snyder - Firefox Security.mp4

61.3 MB

HITBSecConf2006 Malaysia _ Yen Min C.mp4

77.1 MB

HITBSecConf2006 Malaysia _ Yen Min Cheng - Triple Play_ Triple Threats_.mp4

77.1 MB

/HITB 2007 - Malaysia/

CTF Prize Giving and Charity Auction.mov

484.6 MB

D1T1 - Andrew Cushman - State of Security.mov

244.4 MB

D1T1 - Grugq - Meta Anti Forensics - The Hash Hacking Harness.mov

92.9 MB

D1T1 - Marc Weber Tobias and TOOOL USA - High Security Locks.mov

163.1 MB

D1T1 - Martin Johns - Hacking the Intranet with a Webpage.mov

92.5 MB

D1T1 - Michael Thumann and Dror John Roecher - Hacking Cisco NAC.mov

232.6 MB

D1T2 - Andrea Barisani and Daniele Bianco - Injecting RDS-TMC.mov

265.1 MB

D1T2 - Frank Yuan Fan - Advanced Web Application and Database Threat Analysis with MatriXay.mov

85.6 MB

D1T2 - Raffael Marty - Insider Threat Visualization.mov

100.9 MB

D1T2 - Raoul Chiesa and Mayhem - Hacking SCADA.mov

80.9 MB

D1T2 - Roberto Preatoni - WabiSabiLabi - The Exploit Marketplace.mov

203.7 MB

D1T2 - Stefano Zanero - Anomaly Based Intrusion Detection.mov

165.1 MB

D2T1 - Alexander Kornbrust - Hacking Hardend and Secured Oracle Servers.mov

152.4 MB

D2T1 - Billy Rios and Nathan McFeters - Slipping Past the Firewall.mov

165.1 MB

D2T1 - Felix FX Lindner - Attack Surface of Modern Applications.mov

110.9 MB

D2T1 - Shreeraj Shah - Hacking AJAX and Web Services.mov

123.0 MB

D2T1 - Starbug - Hacking Biometric Passports.mov

113.7 MB

D2T1 - Window Snyder - Tools and Strategies for Securing a Large Development Project.mp4

121.0 MB

D2T2 - Dino Covotsos - Hacking the Bluetooth Stack for Fun Fame and Profit.mov

430.1 KB

D2T2 - Domingo Montanaro and Rodrigo Branco - Computer Forensics Challenge and Anti-Forensics Techniques.mov

450.6 KB

D2T2 - Fetri Miftach and Jim Geovedi - Hacking Trust aka Enterprise Hacking.mov

466.9 KB

D2T2 - Jose Nazario - Googling for Malware and Bugs.mov

495.6 KB

D2T2 - Luiz Eduardo - Protocol Fuzzing.mov

221.4 MB

D2T2 - Sarb Sembhi - An End to End Analysis of Securing Networked CCTV Systems.mov

265.7 MB

KEYNOTE 1 - Lance Spitzner - Honeypots - Past Present and Future.mp4

175.4 MB

KEYNOTE 2 - Mikko Hypponen - Online Crime and Crime Online.mp4

178.9 MB

KEYNOTE 3 - Mark Phiber Optik Abene.mov

2.3 MB

KEYNOTE 4 - Emmanuel Goldstein.mov

2.3 MB

/HITB 2008 - Dubai/

D1T1 - Ero Carrera - Malware Behavior Tools Scripting and Adavanced Analysis.zip

2.3 MB

D1T1 - Jim Geovedi - Hijacking VSAT Connections.zip

1.9 MB

D1T1 - Michael Thumann - Hacking Second Life.zip

106.7 MB

D1T1 - Shreeraj Shah - Securing Next Generation Applications - Scan Detect and Mitigate.zip

408.8 KB

D1T2 - Alessio Penasilico - VoIP INsecurities - Italians Do It Better.zip

12.9 MB

D1T2 - Jamie Butler - Computer Forensics and Incident Response.zip

172.8 KB

D1T2 - Meling Mudin and Lee Chin Sheng - Defensive Network Security.pdf

1.0 MB

D1T2 - Skyper - Cracking the GSM A5-1 Encryption in Seconds.zip

3.2 MB

D2T1 - Adrian Pastor - Cracking Into Embeded Devices and Beyond.zip

40.1 MB

D2T1 - Cesar Cerrudo - Token Kidnapping.zip

174.8 KB

D2T1 - Daniel Ingevaldson - Virtualization != Security.zip

10.6 MB

D2T1 - Dino Covotsos - Hacking the Bluetooth Stack for Fun Fame and Mayhem.zip

60.6 MB

D2T1 - Petko Petkov - For My Next Trick - Client Side Hacking.zip

7.5 MB

D2T1 Hacking the bluetooth stack.mpg

15.3 MB

D2T2 - Alexander Kornbrust - Practical Oracle Forensics.zip

1.3 MB

D2T2 - Benjamin Hagen and Walter Goulet - Real World Attacks Against 3G Networks Using Subscriber Devices.zip

385.0 KB

D2T2 - Domingo Montanaro - In-depth Anti-Forensics - Challenges of Steganography and Discovering Hidden Data.zip

1.5 MB

D2T2 - Raoul Chiesa and Alessio Pennasillico - Penetration Testing SCADA.zip

7.7 MB

D2T2 - Rodrigo Rubira Branco - Hacking The Cell Architecture.zip

1.5 MB

DAY 2 - KEYNOTE - Jeremiah Grossman.zip

5.6 MB

/HITB 2008 - Malaysia/

CTF Prize Giving & Charity Auction.mp4

339.5 MB

Day1-Keynote-1.JeremiahGrossman-The Art Of Click Jacking.mp4

210.3 MB

Day1-Keynote-2.MarcusRanum-Cyberwar Is Bullshit.mp4

211.1 MB

Day1-Track1-DinoDaiZovi-Mac OS X Exploitation.mp4

218.1 MB

Day1-Track1-Ero Carrera - Analysis and Visualization of Common Packers.mp4

211.6 MB

Day1-Track1-HernanOchoa-Pass The Hass Toolkit for Windows.mp4

198.1 MB

Day1-Track1-Jim Geovedi & Raditya Iryandi - Hacking a Bird in the Sky 2.0.mp4

139.2 MB

Day1-Track1-Julian Ho - MoocherHunting - Real-Time Geo-Location Unauthorized WiFi Users.mp4

190.6 MB

Day1-Track1-Peter Silberman - Full Process Reconsitution from Memory.mp4

197.1 MB

Day1-Track1-ThomasVarghese-Delivering Identity Management 2.0 by Leveraging OPSS.mp4

173.9 MB

Day1-Track2-Alexander Tereskin - Bluepilling the Xen Hypervisor.mp4

178.9 MB

Day1-Track2-Eric Lawrence - Internet Explorer 8 - Trustworthy Engineering and Browsing.mp4

230.4 MB

Day1-Track2-Jonathan Squire - A Fox in the Hen House - UPnP IGD.mp4

208.4 MB

Day1-Track2-Paul Craig - Hacking Internet Kiosks.mp4

230.1 MB

Day1-Track2-Roberto Preatoni - Time for a free hardware foundation.mp4

194.5 MB

Day1-Track2-Saumil Shah - Browser Exploits - A New Model For Browser Security.mp4

207.9 MB

Day1-Track2-The Grugq - How The Leopard Hides His Spots - OS X Anti-Forensics Techniques.mp4

201.0 MB

Day2-Keynote.The Pirate Bay - Dissolving an Industry as a Hobby.mp4

308.1 MB

Day2-Track1-Charl Van Der Walt - Pushing the Camel Through the Eye of a Needle.mp4

240.6 MB

Day2-Track1-Charlie Miller - iPwning the iPhone.mp4

217.9 MB

Day2-Track1-Ilfak Guilfanov - Decompilers and Beyond.mp4

216.6 MB

Day2-Track1-Kris Kaspersky - Remote Code Execution Through Intel CPU Bugs.mp4

123.0 MB

Day2-Track1-Petko D Petkov - Client-Side Security.mp4

146.7 MB

Day2-Track2-AR - Next Generation Reverse Shell.mp4

236.5 MB

Day2-Track2-Adrian Pagvac Pastor - Cracking into Embedded Devices and Beyond.mp4

206.8 MB

Day2-Track2-Matthew Geiger - How to Build Your Own Password Cracker with a VM.mp4

195.2 MB

Day2-Track2-Shreeraj Shah - Top 10 Web 2.0 Attacks.mp4

236.9 MB

/HITB 2009 - Malaysia/

Alexander Gazet & Yoann Guilot - Defeating Software Protection with Metasm.mp4

118.3 MB

Announcement of CTF Winners and Final HITB Charity Auction.mp4

189.1 MB

Bruno Goncalves - Hacking From The Restroom.mp4

111.6 MB

CTF.mp4

3.0 MB

Dimitrious Petroulos - Having Fun With ATMs and HSMs.mp4

135.7 MB

Ed Skoudis - The Bad Guys Are Winning. So Now What.mp4

315.9 MB

Frederic Raynal, Guillaume Deluge, Damien Aumaitre - PDF Origami Strikes Back.mp4

117.1 MB

Fyodor Yarochkin and The Grugq - From Russia With Love.exe.mp4

168.3 MB

Harron Meer - Clobbering The Cloud.mp4

111.4 MB

Job De Haas - Side Channel Analysis on Embedded Systems.mp4

145.1 MB

Joe Grand - Hardware Is The New Software.mp4

124.5 MB

Julian Assage - Publishing the Unpublished.mp4

158.0 MB

Julien Tinnes, Chris Evans - Security In-Depth for Linux Software.mp4

122.6 MB

Kuza55 - Implementing a Blind TCPIP Hijacking Tool.mp4

97.4 MB

Lucas Adamski - Freeing Sisyphus, Declaratively Address Web Security Issue.mp4

92.5 MB

MARES - APRS,HAM Radio.mp4

142.7 MB

Mark Dowd - Attacking Interoperability.mp4

115.9 MB

Meling Mudin & CS Lee - Network Forensics.mp4

179.6 MB

Nguyen Anh Quyuh - eKimono, A Malware Scanner for Virtual Machines.mp4

137.9 MB

Nishad Herath - How Low Will Malware Go.mp4

117.1 MB

Paul Theriault - Browser Ghosting Attacks.mp4

73.5 MB

Rop Gonggip - Modern Day Robin Hoods.mp4

166.6 MB

Saumil Shah - How To Own The World, One Desktop At A Time.mp4

135.2 MB

Sheran Gunasekera - Bugs and Kisses, Spying on Blackberry Users for Fun.mp4

134.9 MB

Steve Anson - Detecting Computer Intrusions.mp4

94.9 MB

The Secret History Of Hacking.DivxMp3.mp4

97.3 MB

Travis Ormandy - Making Software Dumber.mp4

69.1 MB

ctf-clip1.mp4

6.6 MB

/HITB 2010 - Malaysia/

HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 1.mp4

11.7 MB

HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 1.srt

9.0 KB

HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 2.mp4

13.7 MB

HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 2.srt

8.0 KB

HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 3.mp4

18.5 MB

HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 3.srt

11.1 KB

HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 4.mp4

13.7 MB

HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 4.srt

7.3 KB

HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 5.mp4

11.1 MB

HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 5.srt

7.2 KB

HITB2010KUL Keynote 2 - Taking Back the DNS Part 1.mp4

11.7 MB

HITB2010KUL Keynote 2 - Taking Back the DNS Part 2.mp4

11.8 MB

HITB2010KUL Keynote 2 - Taking Back the DNS Part 3.mp4

18.4 MB

HITB2010KUL Keynote 2 - Taking Back the DNS Part 4.mp4

21.9 MB

HITB2010KUL Keynote 2 - Taking Back the DNS Part 5.mp4

17.2 MB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 1.mp4

13.7 MB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 1.srt

8.6 KB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 10.mp4

17.3 MB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 10.srt

10.2 KB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 2.mp4

13.7 MB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 3.mp4

16.8 MB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 3.srt

11.0 KB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 4.mp4

13.7 MB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 4.srt

8.9 KB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 5.mp4

11.8 MB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 5.srt

9.5 KB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 6.mp4

16.8 MB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 7.mp4

13.3 MB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 8.mp4

13.3 MB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 8.srt

8.5 KB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 9.mp4

16.4 MB

HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 9.srt

11.0 KB

/HITB 2011 - Amsterdam/

Hackers Op De Gracht.mp4

32.8 MB

/HITB 2011 - Malaysia/

D1 LABS - VoIP Attacking CUCM.pdf

2.8 MB

D1 SIGINT - Adnan Mohd Shukor - Fun With Javascript DeObfuscation.pdf

4.2 MB

D1 SIGINT - Elger Stitch Jonker - Building the Hackerspace.pdf

8.8 MB

D1 SIGINT - Jurre van Bergen and Youri van der Zwart - Abusing RFID.pdf

790.1 KB

D1 SIGINT - Muhammad Najmi Ahmad Zabidi - Compiling Features for Malcious Binaries.pdf

420.2 KB

D1 SIGINT - Raoul Chiesa - Cyber Weapons in 2011.pdf

7.4 MB

D1T1 - Alex Kirk - Mobile Malware Analysis.pdf

1.9 MB

D1T1 - Andrea Barisani and Daniele Bianco - EMV Protocol and POS Physical Analysis.pdf

2.1 MB

D1T1 - Elena K and Joffrey C - Webshells - A Framework for Pentesting.pdf

5.4 MB

D1T1 - Jonathan Brossard - Post Memory Corruption Analysis.pdf

284.6 KB

D1T1 - Mahmud Ab Rahman - Reverse Engineering Android Malware.pdf

9.7 MB

D1T1 - Marco Balduzzi - Attacking the Privacy of Social Network Users.pdf

6.7 MB

D1T1 - Mariano Nunez - Attacks Against SAP Web Applications.pdf

1.4 MB

D1T1 - Riley Hassell - Exploiting Androids for Fun and Profit.pdf

9.4 MB

D1T1 - Stefan Esser - Antid0te 2.0 - ASLR in iOS.pdf

5.0 MB

D1T2 - Alexander Polyakov and Dimitry Chastuhin - SAPocalypse Now.pdf

15.9 MB

D1T2 - Asia Slowinka - Excavating Data Structures from Stripped Binaries.pdf

902.7 KB

D1T2 - Claudio Criscione - MetaXSSploit - Bringing XSS to Pentesting.pdf

3.2 MB

D1T2 - Don Bailey - GoodFUN - The GoodFET.pdf

991.1 KB

D1T2 - Guillaume Prigent - Really Open Source Information Gathering.pdf

5.6 MB

D1T2 - Jim Geovedi - Satellite Telephony Security.pdf

5.7 MB

D1T2 - Laurent Oudot - Extracting Senstive Data from Your iPhone.pdf

14.6 MB

D1T2 - Laurent Weber - All your Base Stations Are Belong To Us.pdf

320.0 KB

D1T2 - The Grugq - Smashing the Slack for Fun and Profit.pdf

14.7 MB

D1T2 - Thomas Caplin - Silverlight - A New Way to Surf .Net Holes.pdf

1.5 MB

D1T2 - biatch0 and RuFI0 - Pwning a 4G Device for the LuLz.pdf

3.7 MB

D1T3 - Barry van Kampen - DIY Video Surveillance.pdf

915.7 KB

D1T3 - Itzhak Zuk Avraham - Popping Shell On Android Devices.pdf

1.3 MB

D1T3 - Jimmy Shah - Mobile App Moolah.pdf

1.7 MB

D1T3 - Mitja Kolsek - Remote Binary Planting.pdf

4.4 MB

D2 LABS - Daniel Mende and Jim Geovedi - Practical 3G-4G Attacks.pdf

2.3 MB

D2 SIGINT - Jim Manico - Ghost of XSS Past Present and Future.pdf

2.2 MB

D2 SIGINT - Keith Lee - iPhone Espionage.pdf

5.1 MB

D2 SIGINT - Martin Knobloch - Secure Your Software Using OWASP.pdf

1.6 MB

D2 SIGINT - Nur Muhammed Kamil - MyKotakPasir.pdf

1.2 MB

D2T1 - Andreas Weigenstein - SQL Injection with ABAP.pdf

1.3 MB

D2T1 - Andrew Gavin - Stealing Sensitive Data from Thousands of Systems.pdf

65.9 KB

D2T1 - Daniele Bianco and Adam Laurie - Credit Card Skimming and PIN Harvesting in an EMV World.pdf

3.6 MB

D2T1 - Hendrik Scholz - Air Travel Hacking.pdf

5.7 MB

D2T1 - Itzik Kotler - Let Me Stuxnet You.pdf

542.6 KB

D2T1 - Ivan Ristic - A Study of What Really Breaks SSL.pdf

3.2 MB

D2T1 - Marc Blanchou and Mathew Solnik - Blackbox Android.pdf

3.7 MB

D2T1 - Ravi B Kevin R and Nico G - Femtocells.pdf

6.2 MB

D2T1 - Stefan Esser - iPhone Exploitation - One ROPe to Bind Them All.pdf

8.6 MB

D2T2 - D. Mende & Enno Rey - Attacking 3G and 4G Networks.pdf

2.4 MB

D2T2 - Jim Geovedi and Raoul Chiesa - Hacking a Bird in the Sky.pdf

18.1 MB

D2T2 - KaiJern Lau - Malware Sandboxing the Xandora Way.pdf

16.2 MB

D2T2 - Paul Sebastian Ziegler - Stenographic AVI FIlesystems.pdf

3.1 MB

D2T2 - Philippe Langlois - Attacking the GPRS Roaming Exchange.pdf

13.5 MB

D2T2 - Rosario Valotta - Cookie Jacking.pdf

2.6 MB

D2T2 - Shreeraj Shah - Next Generation Web Attacks.pdf

752.9 KB

D2T2 - Travis Goodspeed - Remotely Exploiting Layer One.pdf

318.5 KB

D2T3 - Aditya K Sood - Spying on SpyEye.pdf

2.8 MB

D2T3 - Bert Hubert - DNSSEC - The Good The Bad and The Very Bad.pdf

407.0 KB

D2T3 - Guillaume Delugre - Reverse Engineering Broadcom NetExtreme Firmware.pdf

1.3 MB

D2T3 - Maarten Oosterink - Attacking Critical Infrastructure.pdf

2.5 MB

D2T3 - Travis Goodspeed - Building a Promiscious nRF24L01 Packet Sniffer.pdf

32.2 MB

HackWEEKDAY - Arzumy.pdf

250.1 KB

KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.pdf

1.6 MB

/.../D1T3 - Didier Stevens - Malicious PDF Analysis Lab/

HITB2011AMS - PDF Chapter.pdf

272.0 KB

HITB2011AMS - Slides.pdf

42.4 KB

HITB2011AMS - Solutions.txt

2.7 KB

/.../D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities/

D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities.zip

50.6 MB

/HITB 2012 - Amsterdam/

#HITB2012AMS - KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line (2).srt

89.7 KB

#HITB2012AMS - KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line.mp4

164.7 MB

#HITB2012AMS - KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line.srt

89.7 KB

#HITB2012AMS CLOSING KEYNOTE - Ms jaya Baloo - Identity, Privacy and Security.mp4

178.1 MB

#HITB2012AMS D1T1 - Arnauld Mascret - Whistling Over the Wire.mp4

159.3 MB

#HITB2012AMS D1T1 - Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis (2).srt

66.3 KB

#HITB2012AMS D1T1 - Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis.mp4

152.7 MB

#HITB2012AMS D1T1 - Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis.srt

66.3 KB

#HITB2012AMS D1T1 - Ivo Pooters - Turning Android Inside Out (2).srt

72.1 KB

#HITB2012AMS D1T1 - Ivo Pooters - Turning Android Inside Out.mp4

150.9 MB

#HITB2012AMS D1T1 - Ivo Pooters - Turning Android Inside Out.srt

72.1 KB

#HITB2012AMS D1T1 - Juan Pablo Echtegoyen - Attacking the SAP Solution Manager (2).srt

64.2 KB

#HITB2012AMS D1T1 - Juan Pablo Echtegoyen - Attacking the SAP Solution Manager.mp4

180.5 MB

#HITB2012AMS D1T1 - Juan Pablo Echtegoyen - Attacking the SAP Solution Manager.srt

64.2 KB

#HITB2012AMS D1T1 - Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012 (2).srt

76.4 KB

#HITB2012AMS D1T1 - Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012.mp4

166.1 MB

#HITB2012AMS D1T1 - Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012.srt

76.4 KB

#HITB2012AMS D1T2 - Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV (2).srt

95.9 KB

#HITB2012AMS D1T2 - Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV.mp4

244.2 MB

#HITB2012AMS D1T2 - Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV.srt

95.9 KB

#HITB2012AMS D1T2 - Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets (2).srt

76.8 KB

#HITB2012AMS D1T2 - Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets.mp4

168.4 MB

#HITB2012AMS D1T2 - Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets.srt

76.8 KB

#HITB2012AMS D1T2 - Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE (2).srt

68.7 KB

#HITB2012AMS D1T2 - Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE.mp4

214.8 MB

#HITB2012AMS D1T2 - Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE.srt

68.7 KB

#HITB2012AMS D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks (2).srt

60.5 KB

#HITB2012AMS D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks.mp4

123.9 MB

#HITB2012AMS D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks.srt

60.5 KB

#HITB2012AMS D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT (2).srt

44.2 KB

#HITB2012AMS D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT.mp4

124.4 MB

#HITB2012AMS D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT.srt

44.2 KB

#HITB2012AMS D2T1 - A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities (2).srt

107.2 KB

#HITB2012AMS D2T1 - A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities.mp4

192.1 MB

#HITB2012AMS D2T1 - A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities.srt

107.2 KB

#HITB2012AMS D2T1 - Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond (2).srt

82.9 KB

#HITB2012AMS D2T1 - Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond.mp4

124.7 MB

#HITB2012AMS D2T1 - Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond.srt

82.9 KB

#HITB2012AMS D2T1 - Dr Marco Balduzzi - SatanCloud (2).srt

68.0 KB

#HITB2012AMS D2T1 - Dr Marco Balduzzi - SatanCloud.mp4

139.4 MB

#HITB2012AMS D2T1 - Dr Marco Balduzzi - SatanCloud.srt

68.0 KB

#HITB2012AMS D2T1 - Georgia Weidman - Bypassing the Android Permission Model (2).srt

84.4 KB

#HITB2012AMS D2T1 - Georgia Weidman - Bypassing the Android Permission Model.mp4

199.6 MB

#HITB2012AMS D2T1 - Georgia Weidman - Bypassing the Android Permission Model.srt

84.4 KB

#HITB2012AMS D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services (2).srt

75.6 KB

#HITB2012AMS D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services.mp4

178.6 MB

#HITB2012AMS D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services.srt

75.6 KB

#HITB2012AMS D2T2 - Dream Team - Part 1 - Corona for iOS 5.0.1 (2).srt

59.7 KB

#HITB2012AMS D2T2 - Dream Team - Part 1 - Corona for iOS 5.0.1.mp4

201.7 MB

#HITB2012AMS D2T2 - Dream Team - Part 1 - Corona for iOS 5.0.1.srt

59.7 KB

#HITB2012AMS D2T2 - Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing) (2).srt

68.7 KB

#HITB2012AMS D2T2 - Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing).mp4

190.1 MB

#HITB2012AMS D2T2 - Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing).srt

68.7 KB

#HITB2012AMS D2T2 - Nicolas Gregoire - Attacking XML Preprocessing (2).srt

62.3 KB

#HITB2012AMS D2T2 - Nicolas Gregoire - Attacking XML Preprocessing.mp4

162.2 MB

#HITB2012AMS D2T2 - Nicolas Gregoire - Attacking XML Preprocessing.srt

62.3 KB

#HITB2012AMS D2T2 - Rahul Sasi - CXML VXML IVR Pentesting for Auditors.mp4

130.5 MB

#HITB2012AMS D2T2 - Steven Seeley - Ghost in the Windows 7 Allocator (2).srt

81.6 KB

#HITB2012AMS D2T2 - Steven Seeley - Ghost in the Windows 7 Allocator.mp4

158.9 MB

#HITB2012AMS D2T2 - Steven Seeley - Ghost in the Windows 7 Allocator.srt

81.6 KB

#HITB2012AMS DAY 1 SPECIAL CLOSING - Rop Gonggrijp (2).srt

46.2 KB

#HITB2012AMS DAY 1 SPECIAL CLOSING - Rop Gonggrijp.mp4

114.4 MB

#HITB2012AMS DAY 1 SPECIAL CLOSING - Rop Gonggrijp.srt

46.2 KB

#HITB2012AMS KEYNOTE 2 - Bruce Schneier - Trust Security and Society (2).srt

72.4 KB

#HITB2012AMS KEYNOTE 2 - Bruce Schneier - Trust Security and Society.mp4

159.8 MB

#HITB2012AMS KEYNOTE 2 - Bruce Schneier - Trust Security and Society.srt

72.4 KB

Hackers Op De Gracht.mp4

96.8 MB

/HITB 2012 - Malaysia/

#HITB2012KUL D1T1 - A. Barisani & D. Bianco - Practical Exploitation of Embedded Systems.mp4

205.9 MB

#HITB2012KUL D1T1 - A. Barisani & D. Bianco - Practical Exploitation of Embedded Systems.srt

84.4 KB

#HITB2012KUL D1T1 - Chris Wysopal - Data Mining a Mountain of Vulnerabilities.mp4

226.1 MB

#HITB2012KUL D1T1 - Chris Wysopal - Data Mining a Mountain of Vulnerabilities.srt

89.2 KB

#HITB2012KUL D1T1 - Lucas Adamski - Mozilla Apps, Firefox OS and You.mp4

216.5 MB

#HITB2012KUL D1T1 - Lucas Adamski - Mozilla Apps, Firefox OS and You.srt

72.9 KB

#HITB2012KUL D1T1 - P. Langlois & E. Gadaix - Why Telcos Keep Getting Hacked.mp4

264.3 MB

#HITB2012KUL D1T1 - P. Langlois & E. Gadaix - Why Telcos Keep Getting Hacked.srt

94.8 KB

#HITB2012KUL D1T1 - Petko D. Petkov - A Short History of the JavaScript Security Arsenal.mp4

253.4 MB

#HITB2012KUL D1T1 - Petko D. Petkov - A Short History of the JavaScript Security Arsenal.srt

90.2 KB

#HITB2012KUL D1T2 - Don Bailey - Hackers the Movie A Retrospective.mp4

189.2 MB

#HITB2012KUL D1T2 - Don Bailey - Hackers the Movie A Retrospective.srt

79.5 KB

#HITB2012KUL D1T2 - Haroon Meer - You and Your Research.mp4

158.1 MB

#HITB2012KUL D1T2 - Haroon Meer - You and Your Research.srt

72.7 KB

#HITB2012KUL D1T2 - Marc Van Hauser Heuse - IPv6 Insecurity Revolutions.mp4

271.7 MB

#HITB2012KUL D1T2 - Marc Van Hauser Heuse - IPv6 Insecurity Revolutions.srt

92.0 KB

#HITB2012KUL D1T2 - Mark Dowd & Tarjei Mandt - iOS 6 Security.mp4

194.4 MB

#HITB2012KUL D1T2 - Mark Dowd & Tarjei Mandt - iOS 6 Security.srt

81.3 KB

#HITB2012KUL D1T2 - Meder Kydyraliev - Defibrilating Web Security.mp4

209.2 MB

#HITB2012KUL D1T2 - Meder Kydyraliev - Defibrilating Web Security.srt

80.0 KB

#HITB2012KUL D1T2 - Wes Brown - Supercomputing, Malware and Correlation.mp4

165.0 MB

#HITB2012KUL D1T2 - Wes Brown - Supercomputing, Malware and Correlation.srt

49.3 KB

#HITB2012KUL D1T3 - John Captain Crunch Draper - A Historical Look at the Phreaking Scene.mp4

180.4 MB

#HITB2012KUL D1T3 - John Captain Crunch Draper - A Historical Look at the Phreaking Scene.srt

75.5 KB

#HITB2012KUL D1T3 - Paul Sebastian Ziegler - Hacking in The Far East.mp4

201.0 MB

#HITB2012KUL D1T3 - Paul Sebastian Ziegler - Hacking in The Far East.srt

97.0 KB

#HITB2012KUL D1T3 - The Grugq - OPSEC Because Jail is for wuftpd.mp4

216.6 MB

#HITB2012KUL D1T3 - The Grugq - OPSEC Because Jail is for wuftpd.srt

91.7 KB

#HITB2012KUL D2 PANEL DISCUSSION iOS OS X Security.mp4

182.7 MB

#HITB2012KUL D2 PANEL DISCUSSION iOS OS X Security.srt

75.8 KB

#HITB2012KUL D2T1 - Chris Evans - Element 1337 in the Periodic Table Pwnium.mp4

179.0 MB

#HITB2012KUL D2T1 - Chris Evans - Element 1337 in the Periodic Table Pwnium.srt

75.4 KB

#HITB2012KUL D2T1 - Katie Moussouris - How to Get Along With Vendors Without Really Trying.mp4

192.4 MB

#HITB2012KUL D2T1 - Katie Moussouris - How to Get Along With Vendors Without Really Trying.srt

92.1 KB

#HITB2012KUL D2T1 - Ollie Whitehouse - Finding the Weak Link in Binaries.mp4

165.9 MB

#HITB2012KUL D2T1 - Ollie Whitehouse - Finding the Weak Link in Binaries.srt

59.5 KB

#HITB2012KUL D2T1 - Paul Vixie - Silo Busting in Information Security The ISC SIE Approach.mp4

256.5 MB

#HITB2012KUL D2T1 - Paul Vixie - Silo Busting in Information Security The ISC SIE Approach.srt

85.3 KB

#HITB2012KUL D2T1 - Rodrigo Rubira Branco - Study of Malware Obfuscation Techniques.mp4

238.1 MB

#HITB2012KUL D2T1 - Rodrigo Rubira Branco - Study of Malware Obfuscation Techniques.srt

89.4 KB

#HITB2012KUL D2T1 - Shreeraj Shah - XSS & CSRF Strike Back -- Powered by HTML5.mp4

216.8 MB

#HITB2012KUL D2T1 - Shreeraj Shah - XSS & CSRF Strike Back -- Powered by HTML5.srt

80.6 KB

#HITB2012KUL D2T2 - Fyodor Yarochkin - Messing Up the Kids Playground.mp4

267.2 MB

#HITB2012KUL D2T2 - Fyodor Yarochkin - Messing Up the Kids Playground.srt

93.5 KB

#HITB2012KUL D2T2 - Jeremiah Grossman - Why Web Security is Fundamentally Broken.mp4

192.3 MB

#HITB2012KUL D2T2 - Jeremiah Grossman - Why Web Security is Fundamentally Broken.srt

73.4 KB

#HITB2012KUL D2T2 - John Viega - Crypto for the Public Cloud.mp4

180.5 MB

#HITB2012KUL D2T2 - John Viega - Crypto for the Public Cloud.srt

71.2 KB

#HITB2012KUL D2T2 - Saumil Shah - Innovative Approaches to Exploit Delivery.mp4

219.9 MB

#HITB2012KUL D2T2 - Saumil Shah - Innovative Approaches to Exploit Delivery.srt

66.6 KB

#HITB2012KUL D2T3 - OPEN BOTTLE - Security Industry Panel Discussion.mp4

439.2 MB

#HITB2012KUL D2T3 - Emmanuel Gadaix - Something MEGA.mp4

143.5 MB

#HITB2012KUL D2T3 - Emmanuel Gadaix - Something MEGA.srt

56.1 KB

#HITB2012KUL D2T3 - Felix FX Lindner - Hacking Huawei VRP.mp4

164.7 MB

#HITB2012KUL D2T3 - Felix FX Lindner - Hacking Huawei VRP.srt

51.8 KB

#HITB2012KUL D2T3 - Mikko Hypponen - Behind Enemy Lines.mp4

244.4 MB

#HITB2012KUL D2T3 - Mikko Hypponen - Behind Enemy Lines.srt

80.7 KB

#HITB2012KUL D2T3 - Stefano Zanero - Scalable Malware Analysis.mp4

282.4 MB

#HITB2012KUL D2T3 - Stefano Zanero - Scalable Malware Analysis.srt

75.1 KB

/HITB 2013 - Amsterdam/

#HITB2013AMS CLOSING KEYNOTE Winn Schwartau - The History of the Future of InfoSec.mp4

230.5 MB

#HITB2013AMS CLOSING KEYNOTE Winn Schwartau - The History of the Future of InfoSec.srt

90.8 KB

#HITB2013AMS Coverage on RSI Telegiornale (Italian).mp4

6.1 MB

#HITB2013AMS D1T1 Hugo Teso - Aircraft Hacking Practical Aero Series.mp4

189.5 MB

#HITB2013AMS D1T1 Hugo Teso - Aircraft Hacking Practical Aero Series.srt

97.5 KB

#HITB2013AMS D1T1 P Uhley and K Raman - Security Response in the Age of Mass Customized Attacks.mp4

220.3 MB

#HITB2013AMS D1T1 P Uhley and K Raman - Security Response in the Age of Mass Customized Attacks.srt

108.8 KB

#HITB2013AMS D1T1 Petko D Petkov - Defeating the Intercepting Web Proxy.mp4

231.8 MB

#HITB2013AMS D1T1 Petko D Petkov - Defeating the Intercepting Web Proxy.srt

100.7 KB

#HITB2013AMS D1T1 Sergey Bratus and Julian Bangert - Page Fault Liberation Army.mp4

262.4 MB

#HITB2013AMS D1T1 Sergey Bratus and Julian Bangert - Page Fault Liberation Army.srt

90.4 KB

#HITB2013AMS D1T1 Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.mp4

238.6 MB

#HITB2013AMS D1T1 Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.srt

85.8 KB

#HITB2013AMS D1T1 V. Vorontsov and A. Golovko - SSRF PWNs - New Techniques and Stories.mp4

168.8 MB

#HITB2013AMS D1T1 V. Vorontsov and A. Golovko - SSRF PWNs - New Techniques and Stories.srt

59.5 KB

#HITB2013AMS D1T2 Daniel Mende - Paparazzi over IP.mp4

166.2 MB

#HITB2013AMS D1T2 Daniel Mende - Paparazzi over IP.srt

70.1 KB

#HITB2013AMS D1T2 Nicolas Seriot - Abusing Twitter s API and OAuth Implementation.mp4

150.4 MB

#HITB2013AMS D1T2 Nicolas Seriot - Abusing Twitter s API and OAuth Implementation.srt

52.4 KB

#HITB2013AMS D1T2 Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in MS Windows Kernel.mp4

175.7 MB

#HITB2013AMS D1T2 Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in MS Windows Kernel.srt

49.2 KB

#HITB2013AMS D1T2 Philippe Langlois - LTE Pwnage - Hacking Core Network Elements.mp4

229.3 MB

#HITB2013AMS D1T2 Philippe Langlois - LTE Pwnage - Hacking Core Network Elements.srt

75.5 KB

#HITB2013AMS D1T2 Tal Zeltzer - Analysis to Remote Root 0day in a SSL-VPN Appliance.mp4

184.0 MB

#HITB2013AMS D1T2 Tal Zeltzer - Analysis to Remote Root 0day in a SSL-VPN Appliance.srt

56.0 KB

#HITB2013AMS D1T2 Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.mp4

168.5 MB

#HITB2013AMS D1T2 Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.srt

59.4 KB

#HITB2013AMS D2T1 Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.mp4

120.3 MB

#HITB2013AMS D2T1 Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.srt

40.4 KB

#HITB2013AMS D2T1 Evad3rs - Swiping Through Modern Security Features.mp4

198.1 MB

#HITB2013AMS D2T1 Evad3rs - Swiping Through Modern Security Features.srt

87.7 KB

#HITB2013AMS D2T1 Peter Geissler and Steven Ketelaar - How I Met Your Modem.mp4

173.4 MB

#HITB2013AMS D2T1 Peter Geissler and Steven Ketelaar - How I Met Your Modem.srt

71.3 KB

#HITB2013AMS D2T1 S. Shekyan and A. Harutyunyan - Turning Your Surveillance Camera Against You.mp4

162.8 MB

#HITB2013AMS D2T1 S. Shekyan and A. Harutyunyan - Turning Your Surveillance Camera Against You.srt

56.3 KB

#HITB2013AMS D2T1 Sebastien Kaczmarek - Dreamboot - A UEFI Bootkit.mp4

246.4 MB

#HITB2013AMS D2T1 Sebastien Kaczmarek - Dreamboot - A UEFI Bootkit.srt

64.8 KB

#HITB2013AMS D2T2 Chilik Tamir - iNalyzer No More Blackbox iOS Analysis.mp4

234.6 MB

#HITB2013AMS D2T2 Dan Tentler - System Shock - The Shodan Computer Search Engine.mp4

168.9 MB

#HITB2013AMS D2T2 Ofer Shezaf - The Infosec Risks of Charging Electric Cars.mp4

213.1 MB

#HITB2013AMS D2T2 Ofer Shezaf - The Infosec Risks of Charging Electric Cars.srt

77.8 KB

#HITB2013AMS D2T2 Petukhov, Noseevich and Gamayunov - Breaking Certified Crypto in Banking Apps.mp4

178.7 MB

#HITB2013AMS D2T2 Petukhov, Noseevich and Gamayunov - Breaking Certified Crypto in Banking Apps.srt

52.6 KB

#HITB2013AMS D2T2 Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.mp4

128.0 MB

#HITB2013AMS D2T2 Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.srt

56.4 KB

#HITB2013AMS Evad3rs Press Briefing - 11th April 2013.mp4

115.5 MB

#HITB2013AMS Evad3rs Press Briefing - 11th April 2013.srt

18.8 KB

#HITB2013AMS KEYNOTE 1 E. Schwartz - Embracing the Uncertainty of Attacks with Big Data Analytics.mp4

234.2 MB

#HITB2013AMS KEYNOTE 1 E. Schwartz - Embracing the Uncertainty of Attacks with Big Data Analytics.srt

95.1 KB

#HITB2013AMS KEYNOTE 2 Bob Lord - Rethinking the Front Lines.mp4

229.3 MB

#HITB2013AMS KEYNOTE 2 Bob Lord - Rethinking the Front Lines.srt

98.8 KB

/presentations/

D1-LAB-Sniffing-the-Airwaves-with-RTL-SDR.pdf

6.2 MB

D1T1-AIS-Exposed-New-Vulnerabilities-and-Attacks.pdf

4.5 MB

D1T1-Compromise-as-a-Service-Our-PleAZURE.pdf

8.2 MB

D1T1-Escaping-IE11-Enhanced-Protected-Mode.pdf

2.3 MB

D1T1-Hacking-Your-Cable-TV-Network-Die-Hard-Style.pdf

39.2 MB

D1T1-The-NSA-Playset.pdf

10.4 MB

D1T1-Vulnerabilities-Exposed-at-the-Protocol-Level-in-TN3270-based-Applications.pdf

17.3 MB

D1T2-Bypassing-Endpoint-Security-for-Fun-and-Profit.pdf

28.2 MB

D1T2-More-Ways-to-Defeat-Secure-Boot.pdf

7.3 MB

D1T2-REboot-Bootkits-Revisited.pdf

924.3 KB

D1T2-State-of-the-Art-Exploring-the-New-Android-KitKat-Runtime.pdf

641.8 KB

D1T3-Exploiting-NoSQL-Like-Never-Before.pdf

2.5 MB

D1T3-XSSing-Your-Way-to-Shell.pdf

5.0 MB

D2-LAB-Attack-Surface-Intelligence-of-Source-Code.pdf

12.5 MB

D2T1-Alices-Adventures-in-Smart-Building-Land.pdf

7.2 MB

D2T1-Exploiting-Passbook-to-Fly-for-Free.pdf

19.8 MB

D2T1-G-Jacking-AppEngine-based-Applications.pdf

784.7 KB

D2T1-GRX-and-a-Spy-Agency.pdf

7.7 MB

D2T1-Why-Port-Scans-are-for-Pussies.pdf

2.4 MB

D2T2-Bitcoin-Forensics-Fact-or-Fiction.pdf

24.7 MB

D2T2-Breaking-Cloud-Isolation.pdf

1.1 MB

D2T2-Exploring-and-Exploiting-iOS-Web-Browsers.pdf

2.8 MB

D2T2-Shellcodes-for-ARM-Your-Pills-Dont-Work-on-Me-x86.pdf

4.3 MB

D2T2-The-InSecurity-of-Pull-Printing-Solutions.pdf

4.2 MB

D2T3-Exploit-Development-for-New-Platforms-Based-on-64-bits.pdf

74.1 KB

D2T3-Format-Reverser-of-Data-Objects.pdf

23.0 MB

D2T3-Using-Javascript-Security-Features-to-Kill-Itself.pdf

2.0 MB

/HITB 2014 - Malaysia/

#HITB2014KUL CLOSING KEYNOTE - Richard Thieme.mp4

238.0 MB

#HITB2014KUL CLOSING KEYNOTE - Richard Thieme.srt

81.4 KB

/HITB 2016 - Amsterdam/

#HITB2016AMS - D2T1 - Forging a Wireless Time Signal to Attack NTP Servers - Y. Zheng & H. Shan.mp4

69.0 MB

#HITB2016AMS - The Women In Cyber Security Woman Of The Year 2016 Award Ceremony.mp4

75.1 MB

#HITB2016AMS CLOSING KEYNOTE - Hardware Side Channels in Virtualized Environments - Sophia D Antoine.mp4

73.1 MB

#HITB2016AMS CommSec Track - CLOSING COMMENTS - Martin Knobloch.mp4

4.1 MB

#HITB2016AMS CommSec Track D1 - Applying Regulatory Data to IoT RF Reverse Engineering - Marc Newlin.mp4

93.8 MB

#HITB2016AMS CommSec Track D1 - Don t Feed The Hippos - Martin Knobloch.mp4

40.2 MB

#HITB2016AMS CommSec Track D1 - Exploiting GLIBC Hacking Everything - Gal De Leon and Nadav Markus.mp4

96.4 MB

#HITB2016AMS CommSec Track D1 - Pentesting Chatops - Melanie Rieback.mp4

71.1 MB

#HITB2016AMS CommSec Track D1 - Unformation In The Era Of Hyperconnectivity - Elisabeth De Leeuw.mp4

41.9 MB

#HITB2016AMS CommSec Track D2 - Anatomy Of An APT Attack - Paul Mason.mp4

60.7 MB

#HITB2016AMS CommSec Track D2 - Facebook Presents Capture The Flag - Paul Marinescu.mp4

41.2 MB

#HITB2016AMS CommSec Track D2 - Hack In The Class - Barry Fish van Kampen.mp4

36.8 MB

#HITB2016AMS CommSec Track D2 - Inspeckage Android Package Inspector - Antonio Martins.mp4

52.7 MB

#HITB2016AMS CommSec Track D2 - Park This! Yet Another Parking Meter Talk - Paul Moreno.mp4

48.0 MB

#HITB2016AMS CommSec Track D2 - Where Malware Meets Murphy - Mattijs Van Ommeren.mp4

47.8 MB

#HITB2016AMS D1T1 - Escape From The Docker KVM QEMU Machine - Shengping Wang and Xu Liu.mp4

51.1 MB

#HITB2016AMS D1T1 - Exploit Kits Hunting The Hunters - Nick Biasini.mp4

90.8 MB

#HITB2016AMS D1T1 - TeLeScope Peering Into The Depths Of TLS Traffic In Real Time - Radu Caragea.mp4

85.9 MB

#HITB2016AMS D1T1 - Using The Observer Effect And Cyber Feng Shui - Jacob Torrey.mp4

82.8 MB

#HITB2016AMS D1T1 - Virtualization System Vulnerability Discovery Framework - Tang Qinghao.mp4

74.2 MB

#HITB2016AMS D1T1 Forcing A Targeted LTE Cellphone Into An Eavesdropping Network - Lin Huang.mp4

65.3 MB

#HITB2016AMS D1T2 - Adaptive Android Kernel Live Patching - Tim Xia and Yulong Zhang.mp4

72.5 MB

#HITB2016AMS D1T2 - CSP Oddities - Michele Spagnuolo and Lukas Weichselbaum.mp4

107.1 MB

#HITB2016AMS D1T2 - Hardsploit Project - Yann Allain and Julien Moinard.mp4

107.1 MB

#HITB2016AMS D1T2 - IRON HID Create Your Own Bad USB Device - Seunghun Han.mp4

69.7 MB

#HITB2016AMS D1T2 - Kernel Exploit Hunting And Mitigation - Broderick Aquilino and Wayne Low.mp4

83.3 MB

#HITB2016AMS D1T2 - Sandjacking Profiting From iOS Malware - Chilik Tamir.mp4

109.6 MB

#HITB2016AMS D2T1 - Attacking Next Generation Firewalls Breaking PAN OS - Felix Wilhelm.mp4

97.6 MB

#HITB2016AMS D2T1 - CANsee An Automobile Intrusion Detection System - Jun Li.mp4

108.0 MB

#HITB2016AMS D2T1 - Cache Side Channel Attacks CPU Design As A Security Problem - Anders Fogh.mp4

91.2 MB

#HITB2016AMS D2T1 - In Plain Sight The Perfect Exfiltration Technique - Itzik Kotler and Amit Klein.mp4

103.9 MB

#HITB2016AMS D2T2 - Advanced Exploitation Xen Hypervisor VM Escape - Shangcong Luan.mp4

72.7 MB

#HITB2016AMS D2T2 - Breaking Naive ESSID WPA2 Key Generation Algorithms - Peter Blasty Geissler.mp4

92.9 MB

#HITB2016AMS D2T2 - Go Speed Tracer Guided Fuzzing - Richard Johnson.mp4

111.9 MB

#HITB2016AMS D2T2 - New Methods For Exploiting ORM Injections - Mikhail Egorov and Sergey Soldatov.mp4

98.5 MB

#HITB2016AMS D2T2 - Perf From Profiling To Kernel Exploiting - Wish Wu.mp4

61.9 MB

#HITB2016AMS KEYNOTE 1 - Beyond FBI vs Apple What s Next For The Crypto Wars - John Adams.mp4

41.7 MB

#HITB2016AMS KEYNOTE 2 - The Future Has Arrived And It s Effin Hilarious - Adam Laurie.mp4

101.8 MB

#HITB2016AMS WELCOME ADDRESS - Patricia M Zorko.mp4

21.4 MB

/HITB 2016 - Singapore/

#HITBGSEC 2016 SG CLOSING KEYNOTE - Hacking in Song - Fabienne Serriere.mp4

77.6 MB

#HITBGSEC 2016 SG CLOSING KEYNOTE - Hacking in Song - Fabienne Serriere.srt

27.3 KB

#HITBGSEC 2016 SG CommSec Track D1 - Data Driven Software Security - Sweety Chauhan.mp4

125.9 MB

#HITBGSEC 2016 SG CommSec Track D1- Halcyon - An IDE for Faster NSE Development - Sanoop Thomas.mp4

38.5 MB

#HITBGSEC 2016 SG CommSec Track D2 - Copy-paste Vulnerabilities - Vanessa Henderson.mp4

30.5 MB

#HITBGSEC 2016 SG CommSec Track D2 - Fake President Fraud Defrauded - Florian Lukavsky.mp4

39.8 MB

#HITBGSEC 2016 SG CommSec Track D2 - IoT Honeypots - Tan Kean Siong.mp4

52.2 MB

#HITBGSEC 2016 SG CommSec Track D2 - Local Privilege Escalation in 2016 - Paul Craig.mp4

39.7 MB

#HITBGSEC 2016 SG CommSec Track D2 - Vulnerabilities and Ethics - Alfonso De Gregorio.mp4

49.7 MB

#HITBGSEC 2016 SG Conference Track D1 - A Next Generation Assembler Framework - Nguyen Anh Quynh.mp4

101.6 MB

#HITBGSEC 2016 SG Conference Track D1 - Attacking NVidia s Tegra Platform - Peter Pi.mp4

52.5 MB

#HITBGSEC 2016 SG Conference Track D1 - Attacking NVidia s Tegra Platform - Peter Pi.srt

24.1 KB

#HITBGSEC 2016 SG Conference Track D1 - Attacking Software Tokens - Bernhard Mueller.mp4

66.4 MB

#HITBGSEC 2016 SG Conference Track D1 - Stumping The Mobile Chipset - A. Donenfeld & Y. Mordekhay.mp4

73.1 MB

#HITBGSEC 2016 SG Conference Track D1 - Stumping The Mobile Chipset - A. Donenfeld & Y. Mordekhay.srt

51.4 KB

#HITBGSEC 2016 SG Conference Track D1 - The Apple Sandbox Deeper Into The Quagmire - Jonathan Levin.mp4

118.4 MB

#HITBGSEC 2016 SG Conference Track D1 - The Apple Sandbox Deeper Into The Quagmire - Jonathan Levin.srt

86.8 KB

#HITBGSEC 2016 SG Conference Track D1 - Trust No One - O. Kochetova & A. Osipov.mp4

65.7 MB

#HITBGSEC 2016 SG Conference Track D2 - (Ab)using Smart Cities - Matteo Beccaro & Matteo Collura.mp4

64.6 MB

#HITBGSEC 2016 SG Conference Track D2 - (Ab)using Smart Cities - Matteo Beccaro & Matteo Collura.srt

39.8 KB

#HITBGSEC 2016 SG Conference Track D2 - Breaking Exploits - Shlomi Oberman & Ron Shina.mp4

88.3 MB

#HITBGSEC 2016 SG Conference Track D2 - Breaking Exploits - Shlomi Oberman & Ron Shina.srt

58.3 KB

#HITBGSEC 2016 SG Conference Track D2 - Fuzzing The Windows Kernel - Koh Yong Chuan.mp4

47.3 MB

#HITBGSEC 2016 SG Conference Track D2 - Look Mom! I Don t Use Shellcode - Moritz Jodeit.mp4

75.3 MB

#HITBGSEC 2016 SG Conference Track D2 - Look Mom! I Don t Use Shellcode - Moritz Jodeit.srt

61.0 KB

#HITBGSEC 2016 SG Conference Track D2 - iOS 10 Kernel Heap Revisited - Stefan Esser.mp4

105.5 MB

#HITBGSEC 2016 SG Conference Track D2 - iOS 10 Kernel Heap Revisited - Stefan Esser.srt

78.7 KB

#HITBGSEC 2016 SG KEYNOTE 1 - I Fight For The Users! The Prequel - Erin Jacobs.mp4

56.0 MB

#HITBGSEC 2016 SG KEYNOTE 1 - I Fight For The Users! The Prequel - Erin Jacobs.srt

52.0 KB

#HITBGSEC 2016 SG KEYNOTE 2 - Hacking The Pentagon - Katie Moussouris.mp4

81.8 MB

#HITBGSEC 2016 SG KEYNOTE 2 - Hacking The Pentagon - Katie Moussouris.srt

65.8 KB

#HITBGSEC Replicating a RSA SecurID Token Instance (RSA SecurID 2.0.4).mp4

598.5 KB

#HITBGSEC Replicating a VASCO DIGIPASS Token Instance (DIGIPASS DEMO for Android 4.10.0).mp4

471.5 KB

#HITBGSEC SG 2016 CommSec Track D1 - Reverse Engineering Swift Applications - Michael Gianarakis.mp4

43.6 MB

#HITBGSEC SG 2016 CommSec Track D2 - Forensic Analysis of Android Banking Apps - Rajchada Chanajitt.mp4

38.1 MB

/HITB 2017 - Amsterdam/

#HITB2017AMS - Closing Ceremony - HITB Core Team.mp4

117.9 MB

#HITB2017AMS - Closing Ceremony - HITB Core Team.srt

36.5 KB

#HITB2017AMS CLOSING KEYNOTE - The ECMA And The Chakra - Natalie Silvanovich.mp4

242.6 MB

#HITB2017AMS CLOSING KEYNOTE - The ECMA And The Chakra - Natalie Silvanovich.srt

89.1 KB

#HITB2017AMS COMMSEC D1 - A Passive Listing Ransomware Detector - Paulus Meessen and Don Mulders.mp4

67.3 MB

#HITB2017AMS COMMSEC D1 - A Passive Listing Ransomware Detector - Paulus Meessen and Don Mulders.srt

54.4 KB

#HITB2017AMS COMMSEC D1 - Breaking Apple's iCloud Keychain - Vladimir Katalov.mp4

82.8 MB

#HITB2017AMS COMMSEC D1 - Breaking Apple's iCloud Keychain - Vladimir Katalov.srt

83.0 KB

#HITB2017AMS COMMSEC D1 - Disarming EMET 5 52 - Niels Warnars.mp4

64.6 MB

#HITB2017AMS COMMSEC D1 - Exploiting Windows Automatic Wireless Association - George Chatzisofroniou.mp4

75.2 MB

#HITB2017AMS COMMSEC D1 - Exploiting Windows Automatic Wireless Association - George Chatzisofroniou.srt

62.4 KB

#HITB2017AMS COMMSEC D1 - Fault Injection Attacks On Secure Boot - Niek Timmers and Albert Spruyt.mp4

60.1 MB

#HITB2017AMS COMMSEC D1 - Fault Injection Attacks On Secure Boot - Niek Timmers and Albert Spruyt.srt

56.3 KB

#HITB2017AMS COMMSEC D1 - Low Cost Open Source Spectrum Monitoring - Dominic Spill.mp4

67.0 MB

#HITB2017AMS COMMSEC D1 - Low Cost Open Source Spectrum Monitoring - Dominic Spill.srt

68.7 KB

#HITB2017AMS COMMSEC D1 - Meet And Greet With The MacOs Malware Class Of 2016 - Patrick Wardle.mp4

62.7 MB

#HITB2017AMS COMMSEC D1 - Meet And Greet With The MacOs Malware Class Of 2016 - Patrick Wardle.srt

69.8 KB

#HITB2017AMS COMMSEC D1 - Pwning Banks How The Playground Evolved Over The Years - Miika Turkia.mp4

93.0 MB

#HITB2017AMS COMMSEC D1 - Pwning Banks How The Playground Evolved Over The Years - Miika Turkia.srt

69.1 KB

#HITB2017AMS COMMSEC D1 - So You Want To Hack Radios Matt Knight and Marc Newlin.mp4

119.4 MB

#HITB2017AMS COMMSEC D1 - So You Want To Hack Radios Matt Knight and Marc Newlin.srt

190.9 KB

#HITB2017AMS COMMSEC D2 - Intel DCI Secrets - Maxim Goryachy and Mark Ermolov.mp4

49.9 MB

#HITB2017AMS COMMSEC D2 - Pwning ARM Debug Components - Muhammad Abdul Wahab (2).mp4

55.0 MB

#HITB2017AMS COMMSEC D2 - Pwning ARM Debug Components - Muhammad Abdul Wahab (2).srt

71.2 KB

#HITB2017AMS COMMSEC D2 - Unauthorized Erlang A Demonstration - Don Bailey (2).mp4

49.4 MB

#HITB2017AMS COMMSEC D2 - Unauthorized Erlang A Demonstration - Don Bailey (2).srt

79.0 KB

#HITB2017AMS D1T1 - A New RISC - Don Bailey.mp4

260.5 MB

#HITB2017AMS D1T1 - A New RISC - Don Bailey.srt

115.2 KB

#HITB2017AMS D1T1 - Drammer The Making Of - Victor van der Veen.mp4

246.8 MB

#HITB2017AMS D1T1 - Drammer The Making Of - Victor van der Veen.srt

112.4 KB

#HITB2017AMS D1T1 - Hacking Customer Information Control System - Ayoub Elaassal.mp4

234.0 MB

#HITB2017AMS D1T1 - Hacking Customer Information Control System - Ayoub Elaassal.srt

124.6 KB

#HITB2017AMS D1T1 - Harnessing Intel Processor Trace On Windows For Vuln Discovery - Richard Johnson.mp4

213.5 MB

#HITB2017AMS D1T1 - Harnessing Intel Processor Trace On Windows For Vuln Discovery - Richard Johnson.srt

118.2 KB

#HITB2017AMS D1T1 - I Got 99 Trends And A # Is All Of Them! Steven Seeley and Roberto Suggi Liverani.mp4

494.9 MB

#HITB2017AMS D1T1 - I Got 99 Trends And A # Is All Of Them! Steven Seeley and Roberto Suggi Liverani.srt

147.7 KB

#HITB2017AMS D1T1 - We Broke All CSPs And You Won't Believe What Happened - Spagnuolo & Weichselbaum.mp4

231.6 MB

#HITB2017AMS D1T1 - We Broke All CSPs And You Won't Believe What Happened - Spagnuolo & Weichselbaum.srt

110.4 KB

#HITB2017AMS D1T2 - Can't Touch This Cloning Any Android HCE Contactless Card - Slawomir Jasek.mp4

333.4 MB

#HITB2017AMS D1T2 - Can't Touch This Cloning Any Android HCE Contactless Card - Slawomir Jasek.srt

104.2 KB

#HITB2017AMS D1T2 - Most Impressive A Guide To Key Impressioning Attacks - Jos Weyers.mp4

309.2 MB

#HITB2017AMS D1T2 - Most Impressive A Guide To Key Impressioning Attacks - Jos Weyers.srt

89.1 KB

#HITB2017AMS D1T2 - Shadow Box The Practical And Omnipotent Sandbox - Seunghun Han.mp4

228.2 MB

#HITB2017AMS D1T2 - Shadow Box The Practical And Omnipotent Sandbox - Seunghun Han.srt

70.1 KB

#HITB2017AMS D1T2 - Side Channel Attacks Against iOS Crypto Libraries And More - Najwa Aaraj.mp4

162.8 MB

#HITB2017AMS D1T2 - The Secret Of Chakracore 10 Ways To Go Beyond The Edge - Linan Hao and Long Liu.mp4

469.2 MB

#HITB2017AMS D2T1 - Bootstrapping Systems With Open Source Firmware - Trammell Hudson.mp4

200.4 MB

#HITB2017AMS D2T1 - Bootstrapping Systems With Open Source Firmware - Trammell Hudson.srt

71.4 KB

#HITB2017AMS D2T1 - Everybody Wants SOME Advance Same Origin Method Execution - Ben Hayak.srt

147.8 KB

#HITB2017AMS D2T1 - Hunting For Vulnerabilities In Signal - Markus Vervier.mp4

200.0 MB

#HITB2017AMS D2T1 - Hunting For Vulnerabilities In Signal - Markus Vervier.srt

71.2 KB

#HITB2017AMS D2T1 - Oversight Exposing Spies On MacOS - Patrick Wardle.mp4

427.8 MB

#HITB2017AMS D2T1 - Oversight Exposing Spies On MacOS - Patrick Wardle.srt

133.3 KB

#HITB2017AMS D2T1 - Vulnerabilities In Android Password Managers - Huber, Arzt & Rasthofer.mp4

190.8 MB

#HITB2017AMS D2T1 - Vulnerabilities In Android Password Managers - Huber, Arzt & Rasthofer.srt

85.5 KB

#HITB2017AMS D2T2 - Bypassing Memory Mitigations Using Data Only Exploitation Techniques - Bing Sun.mp4

345.9 MB

#HITB2017AMS D2T2 - Bypassing Memory Mitigations Using Data Only Exploitation Techniques - Bing Sun.srt

89.7 KB

#HITB2017AMS D2T2 - Chasing Cars Keyless Entry System Attacks - Yingtao Zeng, Qing Yang and Jun Li.mp4

277.1 MB

#HITB2017AMS D2T2 - Chasing Cars Keyless Entry System Attacks - Yingtao Zeng, Qing Yang and Jun Li.srt

97.2 KB

#HITB2017AMS D2T2 - Hacking Medical Devices And Healthcare Infrastructure - Anirudh Duggal.mp4

208.7 MB

#HITB2017AMS D2T2 - In Depth Analysis Of Multicast DNS And DNS Service Discovery - Antonios Atlasis.mp4

210.8 MB

#HITB2017AMS D2T2 - The Best Laid Schemes Attacking URL Schemes - Yu Hong.mp4

192.3 MB

#HITB2017AMS KEYNOTE 1 - Redefining Defense - Saumil Shah.mp4

222.5 MB

#HITB2017AMS KEYNOTE 1 - Redefining Defense - Saumil Shah.srt

83.2 KB

#HITB2017AMS KEYNOTE 2 - All Fall Down Interdependencies In The Cloud - Window Snyder.mp4

73.1 MB

#HITB2017AMS KEYNOTE 2 - All Fall Down Interdependencies In The Cloud - Window Snyder.srt

30.6 KB

/HITB 2017 - Singapore/

#HITBGSEC 2017 CLOSING KEYNOTE - A Spin Around The Block 13 Years Of Infosec Challenges - Kelly Lum.mp4

72.2 MB

#HITBGSEC 2017 CLOSING KEYNOTE - A Spin Around The Block 13 Years Of Infosec Challenges - Kelly Lum.srt

107.6 KB

#HITBGSEC 2017 CommSec D1 - Automotive Security Assessment Techniques And Tools - Keisuke Hirata.mp4

36.3 MB

#HITBGSEC 2017 CommSec D1 - Automotive Security Assessment Techniques And Tools - Keisuke Hirata.srt

52.4 KB

#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger.mp4

62.0 MB

#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger.srt

77.3 KB

#HITBGSEC 2017 CommSec D1 - Hacking Robots Before Skynet - Lucas Apa and Cesar Cerrudo.mp4

109.0 MB

#HITBGSEC 2017 CommSec D1 - Hadoop Safari Hunting For Vulnerabilities - T. Debize and M. Braik.mp4

82.8 MB

#HITBGSEC 2017 CommSec D1 - Hadoop Safari Hunting For Vulnerabilities - T. Debize and M. Braik.srt

113.8 KB

#HITBGSEC 2017 CommSec D1 - Insecurity In 2017 0 Days Are The Least Of Our Problems - Nick Biasini.mp4

102.0 MB

#HITBGSEC 2017 CommSec D1 - Insecurity In 2017 0 Days Are The Least Of Our Problems - Nick Biasini.srt

146.1 KB

#HITBGSEC 2017 CommSec D1 - The Original Elevat0r History Of A Private Jailbreak - Stefan Esser.mp4

87.5 MB

#HITBGSEC 2017 CommSec D1 - The Original Elevat0r History Of A Private Jailbreak - Stefan Esser.srt

114.1 KB

#HITBGSEC 2017 CommSec D1 - Threat Hunting 101 Become The Hunter - Hamza Beghal.mp4

43.4 MB

#HITBGSEC 2017 CommSec D1 - Threat Hunting 101 Become The Hunter - Hamza Beghal.srt

95.9 KB

#HITBGSEC 2017 CommSec D2 - 200+ Vulnerabilities In Android Phones - B. Guangdong & Z. Qing.mp4

45.7 MB

#HITBGSEC 2017 CommSec D2 - 200+ Vulnerabilities In Android Phones - B. Guangdong & Z. Qing.srt

46.3 KB

#HITBGSEC 2017 CommSec D2 - 2FAssassin Bypass 2FA, Stealing Private Keys, And More - Maxwell Koh.mp4

47.0 MB

#HITBGSEC 2017 CommSec D2 - 2FAssassin Bypass 2FA, Stealing Private Keys, And More - Maxwell Koh.srt

65.6 KB

#HITBGSEC 2017 CommSec D2 - Facebook The Deep & Dark Web For Threat Actors In Asia - Fadli Sidek.mp4

56.8 MB

#HITBGSEC 2017 CommSec D2 - Facebook The Deep & Dark Web For Threat Actors In Asia - Fadli Sidek.srt

91.9 KB

#HITBGSEC 2017 CommSec D2 - Growing Network Security Specialists For Our Enterprise - Xinhua Cai.mp4

29.7 MB

#HITBGSEC 2017 CommSec D2 - Growing Network Security Specialists For Our Enterprise - Xinhua Cai.srt

48.2 KB

#HITBGSEC 2017 CommSec D2 - Intelligence And Counterintelligence Techniques - J. Hesse & K. Ranjan.mp4

81.5 MB

#HITBGSEC 2017 CommSec D2 - Intelligence And Counterintelligence Techniques - J. Hesse & K. Ranjan.srt

127.2 KB

#HITBGSEC 2017 CommSec D2 - It’s Friday Evening Professor Moriarty - Nicolas Collery.mp4

57.9 MB

#HITBGSEC 2017 CommSec D2 - It’s Friday Evening Professor Moriarty - Nicolas Collery.srt

63.4 KB

#HITBGSEC 2017 CommSec D2 - Searching For A Needle In A Remote Haystack - Vitaly Kamluk & Wayne Lee.mp4

55.3 MB

#HITBGSEC 2017 CommSec D2 - Searching For A Needle In A Remote Haystack - Vitaly Kamluk & Wayne Lee.srt

80.7 KB

#HITBGSEC 2017 CommSec D2 - Stealing PLC Intellectual Property A Red Teaming Story - Matteo Beccaro.mp4

42.4 MB

#HITBGSEC 2017 CommSec D2 - Stealing PLC Intellectual Property A Red Teaming Story - Matteo Beccaro.srt

71.7 KB

#HITBGSEC 2017 CommSec D2 - Unstructured Data Is The New Gold ML + NLP Is The New Shiz - J. Geovedi.mp4

66.4 MB

#HITBGSEC 2017 CommSec D2 - Unstructured Data Is The New Gold ML + NLP Is The New Shiz - J. Geovedi.srt

92.1 KB

#HITBGSEC 2017 Conf D1 - A Year In The Red - Dominic Chell & Vincent Yiu.mp4

69.5 MB

#HITBGSEC 2017 Conf D1 - A Year In The Red - Dominic Chell & Vincent Yiu.srt

138.5 KB

#HITBGSEC 2017 Conf D1 - Get To The Money Hacking PoS And PoP Systems - D. Chastuhin & V. Egorov.mp4

84.4 MB

#HITBGSEC 2017 Conf D1 - Get To The Money Hacking PoS And PoP Systems - D. Chastuhin & V. Egorov.srt

103.3 KB

#HITBGSEC 2017 Conf D1 - How We Broke Intel Amt - A. Ermolov, D. Evdokimov & M. Malyutin.mp4

55.2 MB

#HITBGSEC 2017 Conf D1 - How We Broke Intel Amt - A. Ermolov, D. Evdokimov & M. Malyutin.srt

74.2 KB

#HITBGSEC 2017 Conf D1 - Spy Vs Spy A Modern Study Of Microphone Bugs - V. Valeros & S. Garcia.mp4

108.5 MB

#HITBGSEC 2017 Conf D1 - Spy Vs Spy A Modern Study Of Microphone Bugs - V. Valeros & S. Garcia.srt

144.7 KB

#HITBGSEC 2017 Conf D2 - Neuralfuzz Neural Networks For Fuzzing Web Apps - Ivan Novikov.mp4

90.8 MB

#HITBGSEC 2017 Conf D2 - Neuralfuzz Neural Networks For Fuzzing Web Apps - Ivan Novikov.srt

131.3 KB

#HITBGSEC 2017 Conf D2 - QEMU Attack Surface And Security Internals - Qiang Li & ZhiBin Hu.mp4

36.9 MB

#HITBGSEC 2017 Conf D2 - Radio Exploitation 101 - Matt Knight & Marc Newlin.mp4

94.0 MB

#HITBGSEC 2017 Conf D2 - Radio Exploitation 101 - Matt Knight & Marc Newlin.srt

153.8 KB

#HITBGSEC 2017 Conf D2 - Rootten Apples Vulnerability Heaven In The iOS Sandbox - Adam Donenfeld.mp4

89.5 MB

#HITBGSEC 2017 Conf D2 - Rootten Apples Vulnerability Heaven In The iOS Sandbox - Adam Donenfeld.srt

109.1 KB

#HITBGSEC 2017 Conf D2 - XFLTReaT A New Dimension In Tunnelling - Balazs Bucsay.mp4

94.7 MB

#HITBGSEC 2017 Conf D2 - XFLTReaT A New Dimension In Tunnelling - Balazs Bucsay.srt

133.8 KB

#HITBGSEC 2017 KEYNOTE 1 - Finding Vulns And Malware In Open Source Code At Scale - Mark Curphey.mp4

119.0 MB

#HITBGSEC 2017 KEYNOTE 1 - Finding Vulns And Malware In Open Source Code At Scale - Mark Curphey.srt

180.4 KB

#HITBGSEC 2017 KEYNOTE D2 - The State Of Cyber - George Kurtz.mp4

72.9 MB

#HITBGSEC 2017 KEYNOTE D2 - The State Of Cyber - George Kurtz.srt

146.0 KB

#HITBGSEC 2017 SG Conf D1 - A New Era Of SSRF - Exploiting Url Parsers - Orange Tsai.mp4

67.9 MB

#HITBGSEC 2017 SG Conf D1 - A New Era Of SSRF - Exploiting Url Parsers - Orange Tsai.srt

84.3 KB

#HITBGSEC 2017 Smart Cities Panel Discussion with M. Curphey, C. Cerrudo, E. Schwartz & M. Beccaro.mp4

97.7 MB

#HITBGSEC 2017 Smart Cities Panel Discussion with M. Curphey, C. Cerrudo, E. Schwartz & M. Beccaro.srt

188.8 KB

#HITBGSEC 2017 WELCOME ADDRESS - IoT - A Security Hole Without A Patch - Earl Carter.mp4

21.1 MB

#HITBGSEC 2017 WELCOME ADDRESS - IoT - A Security Hole Without A Patch - Earl Carter.srt

42.7 KB

/HITB 2018 - Amsterdam/

#HITB2018AMS CLOSING KEYNOTE - Security is What We Make of It - Blockchain and Beyond - Amber Baldet.en.transcribed.srt

163.3 KB

#HITB2018AMS CLOSING KEYNOTE - Security is What We Make of It - Blockchain and Beyond - Amber Baldet.mp4

93.5 MB

#HITB2018AMS CommSec D1 - A Deep Dive Into Malicious Documents - Josh Stroschein.en.transcribed.srt

82.1 KB

#HITB2018AMS CommSec D1 - A Deep Dive Into Malicious Documents - Josh Stroschein.mp4

71.8 MB

#HITB2018AMS CommSec D1 - An Isolated Data Center Security Policy Model Using SmartNICs - Ofir Arkin.en.transcribed.srt

136.3 KB

#HITB2018AMS CommSec D1 - An Isolated Data Center Security Policy Model Using SmartNICs - Ofir Arkin.mp4

133.3 MB

#HITB2018AMS CommSec D1 - Attacking IoT Speakers - Stephen Hilt.en.transcribed.srt

77.8 KB

#HITB2018AMS CommSec D1 - Attacking IoT Speakers - Stephen Hilt.mp4

64.9 MB

#HITB2018AMS CommSec D1 - Behaviors and Patterns of Rogue Hosting Providers - D. Mahjoub & S. Brown.en.transcribed.srt

112.2 KB

#HITB2018AMS CommSec D1 - Behaviors and Patterns of Rogue Hosting Providers - D. Mahjoub & S. Brown.mp4

73.5 MB

#HITB2018AMS CommSec D1 - Faster, Wider, Greater Modern Pentest Tricks - Thomas Debize.en.transcribed.srt

78.7 KB

#HITB2018AMS CommSec D1 - Faster, Wider, Greater Modern Pentest Tricks - Thomas Debize.mp4

105.5 MB

#HITB2018AMS CommSec D1 - How to Find and Exploit Bugs in IoT Devices - Kelvin Wong.en.transcribed.srt

51.2 KB

#HITB2018AMS CommSec D1 - How to Find and Exploit Bugs in IoT Devices - Kelvin Wong.mp4

64.8 MB

#HITB2018AMS CommSec D1 - Keynterceptor Press Any Key to Continue - Niels van Dijkhuizen.en.transcribed.srt

53.6 KB

#HITB2018AMS CommSec D1 - Keynterceptor Press Any Key to Continue - Niels van Dijkhuizen.mp4

56.2 MB

#HITB2018AMS CommSec D1 - Steganography Ante Portas - Steffen Wendzel.en.transcribed.srt

71.2 KB

#HITB2018AMS CommSec D1 - Steganography Ante Portas - Steffen Wendzel.mp4

150.7 MB

#HITB2018AMS CommSec D1 - The Life & Death of Kernel Object Abuse - Salf ElSherei & Ian Kronquist.en.transcribed.srt

112.4 KB

#HITB2018AMS CommSec D1 - The Life & Death of Kernel Object Abuse - Salf ElSherei & Ian Kronquist.mp4

175.8 MB

#HITB2018AMS CommSec D2 - Automatic Generation of ROP Chains - Ricardo. J. Rodríguez & Daniel Uroz.en.transcribed.srt

77.8 KB

#HITB2018AMS CommSec D2 - Automatic Generation of ROP Chains - Ricardo. J. Rodríguez & Daniel Uroz.mp4

94.6 MB

#HITB2018AMS CommSec D2 - Hacking a Hospital for Fun and Profit - Asaf Cohen & Ofir Kamil.en.transcribed.srt

70.7 KB

#HITB2018AMS CommSec D2 - Hacking a Hospital for Fun and Profit - Asaf Cohen & Ofir Kamil.mp4

79.5 MB

#HITB2018AMS CommSec D2 - Hiding Tasks via Hardware Task Switching - Kyeong Joo Jung.en.transcribed.srt

48.4 KB

#HITB2018AMS CommSec D2 - Hiding Tasks via Hardware Task Switching - Kyeong Joo Jung.mp4

62.0 MB

#HITB2018AMS CommSec D2 - ProdSec A Technical Approach - Jeremy Brown.en.transcribed.srt

107.8 KB

#HITB2018AMS CommSec D2 - ProdSec A Technical Approach - Jeremy Brown.mp4

80.2 MB

#HITB2018AMS CommSec D2 - PyREBox Making Dynamic Instrumentation Great Again - X. Ugarte-Pedrero.mp4

125.1 MB

#HITB2018AMS CommSec D2 - Smart Contract (In)Security - Ben Schmidt.en.transcribed.srt

59.9 KB

#HITB2018AMS CommSec D2 - Smart Contract (In)Security - Ben Schmidt.mp4

60.7 MB

#HITB2018AMS D1T1 - Abusing The Travel Industry - V. Kropotov, F. Yarochkin, M. Fuentes & L. Gu.en.transcribed.srt

90.9 KB

#HITB2018AMS D1T1 - Abusing The Travel Industry - V. Kropotov, F. Yarochkin, M. Fuentes & L. Gu.mp4

110.6 MB

#HITB2018AMS D1T1 - Brida When Burp Suite meets Frida - Federico Dotta & Piergiovanni Cipolloni.mp4

131.3 MB

#HITB2018AMS D1T1 - Covert Data Exfiltration Channel - Hongjian Cao, Kunzhe Chai & Jun Li.en.transcribed.srt

53.7 KB

#HITB2018AMS D1T1 - Covert Data Exfiltration Channel - Hongjian Cao, Kunzhe Chai & Jun Li.mp4

77.0 MB

#HITB2018AMS D1T1 - Fuzzing Javascript Engines for Fun and Pwnage - Areum Lee & Jeonghoon Shin.en.transcribed.srt

55.6 KB

#HITB2018AMS D1T1 - Fuzzing Javascript Engines for Fun and Pwnage - Areum Lee & Jeonghoon Shin.mp4

54.9 MB

#HITB2018AMS D1T1 - How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers - X. Bai & M. Zheng.en.transcribed.srt

85.5 KB

#HITB2018AMS D1T1 - How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers - X. Bai & M. Zheng.mp4

104.0 MB

#HITB2018AMS D1T1 - Real World Attacks Against Secure Elements - Don Bailey.en.transcribed.srt

158.9 KB

#HITB2018AMS D1T1 - Real World Attacks Against Secure Elements - Don Bailey.mp4

112.5 MB

#HITB2018AMS D1T2 - Applying Machine Learning to User Behavior Anomaly Analysis - Eugene Neyolov.en.transcribed.srt

126.0 KB

#HITB2018AMS D1T2 - Applying Machine Learning to User Behavior Anomaly Analysis - Eugene Neyolov.mp4

147.2 MB

#HITB2018AMS D1T2 - Attacking Microsoft’s .NET Framework Through CLR - Yu Hong & Shikang Xing.en.transcribed.srt

83.6 KB

#HITB2018AMS D1T2 - Attacking Microsoft’s .NET Framework Through CLR - Yu Hong & Shikang Xing.mp4

131.7 MB

#HITB2018AMS D1T2 - Pwning KNX & ZigBee Networks - HuiYu Wu, YuXiang Li & Yong Yang.en.transcribed.srt

82.0 KB

#HITB2018AMS D1T2 - Pwning KNX & ZigBee Networks - HuiYu Wu, YuXiang Li & Yong Yang.mp4

96.1 MB

#HITB2018AMS D1T2 - Rooting Android 8 with a Kernel Space Mirroring Attack - Yong Wang & Yang Song.en.transcribed.srt

81.7 KB

#HITB2018AMS D1T2 - Rooting Android 8 with a Kernel Space Mirroring Attack - Yong Wang & Yang Song.mp4

85.1 MB

#HITB2018AMS D1T2 - Smashing Ethereum Smart Contracts for Fun and ACTUAL Profit - Bernhard Mueller.mp4

105.2 MB

#HITB2018AMS D1T2 - Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) - Daniel Bohannon.en.transcribed.srt

212.6 KB

#HITB2018AMS D1T2 - Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) - Daniel Bohannon.mp4

139.1 MB

#HITB2018AMS D2T1 - Backdooring & Remotely Controlling Cars - Sheila A. Berta & Claudio Carraciolo.en.transcribed.srt

82.0 KB

#HITB2018AMS D2T1 - Backdooring & Remotely Controlling Cars - Sheila A. Berta & Claudio Carraciolo.mp4

91.0 MB

#HITB2018AMS D2T1 - Establishing Covert Channels By Abusing GSM AT Commands - A. Munoz & J. C. Saez.en.transcribed.srt

103.9 KB

#HITB2018AMS D2T1 - Establishing Covert Channels By Abusing GSM AT Commands - A. Munoz & J. C. Saez.mp4

107.9 MB

#HITB2018AMS D2T1 - Expanding Your WMI Lateral Movement Arsenal - Philip Tsukerman.en.transcribed.srt

89.6 KB

#HITB2018AMS D2T1 - Expanding Your WMI Lateral Movement Arsenal - Philip Tsukerman.mp4

77.0 MB

#HITB2018AMS D2T1 - Sandbox Evasion Using VBA Referencing - Aviv Grafi & Amit Dori.en.transcribed.srt

104.5 KB

#HITB2018AMS D2T1 - Sandbox Evasion Using VBA Referencing - Aviv Grafi & Amit Dori.mp4

63.1 MB

#HITB2018AMS D2T1 - Uncovering the Android Patch Gap - Karsten Nohl & Jakob Lell.en.transcribed.srt

134.1 KB

#HITB2018AMS D2T1 - Uncovering the Android Patch Gap - Karsten Nohl & Jakob Lell.mp4

113.9 MB

#HITB2018AMS D2T2 - A New Fuzzing Method for Android - Zhang Qing & Bai Guangdong.en.transcribed.srt

31.0 KB

#HITB2018AMS D2T2 - A New Fuzzing Method for Android - Zhang Qing & Bai Guangdong.mp4

36.8 MB

#HITB2018AMS D2T2 - Defense-in-Depth Techniques for Modern Web Apps - M. Spagnuolo & L. Weichselbaum.en.transcribed.srt

114.3 KB

#HITB2018AMS D2T2 - Defense-in-Depth Techniques for Modern Web Apps - M. Spagnuolo & L. Weichselbaum.mp4

95.8 MB

#HITB2018AMS D2T2 - Exposing Hidden Exploitable Behaviors Using EDF - Fernando Arnaboldi.en.transcribed.srt

135.4 KB

#HITB2018AMS D2T2 - Exposing Hidden Exploitable Behaviors Using EDF - Fernando Arnaboldi.mp4

110.5 MB

#HITB2018AMS D2T2 - Mallet Towards a Generic Intercepting Proxy - Rogan Dawes.en.transcribed.srt

126.8 KB

#HITB2018AMS D2T2 - Mallet Towards a Generic Intercepting Proxy - Rogan Dawes.mp4

113.3 MB

#HITB2018AMS D2T2 - Over The Edge Pwning The Windows Kernel - Rancho Han.en.transcribed.srt

56.7 KB

#HITB2018AMS D2T2 - Over The Edge Pwning The Windows Kernel - Rancho Han.mp4

72.7 MB

#HITB2018AMS KEYNOTE 1 The Future, The Past, and … Wait, Where the Hell are We Now - M. Marschalek.en.transcribed.srt

157.9 KB

#HITB2018AMS KEYNOTE 1 The Future, The Past, and … Wait, Where the Hell are We Now - M. Marschalek.mp4

120.5 MB

#HITB2018AMS KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio.en.transcribed.srt

120.3 KB

#HITB2018AMS KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio.mp4

87.5 MB

#HITB2018AMS Welcome Address Improving Incentives for Cybersecurity - Michel van Eeten.mp4

59.3 MB

/HITB 2018 - Dubai/

HITB2018DXB A Secure And Robust Wireless Comm System For Low-Latency Applications - Dr. H. Mukhtar.mp4

31.5 MB

HITB2018DXB Building Security Beyond The Genesis Block - Ryan Shepherd.en.transcribed.srt

92.2 KB

HITB2018DXB Building Security Beyond The Genesis Block - Ryan Shepherd.mp4

45.2 MB

HITB2018DXB Building Your Own Self Driving, Self Racing Car - Dhillon 'L33tdawg' Kannabhiran.en.transcribed.srt

49.1 KB

HITB2018DXB Building Your Own Self Driving, Self Racing Car - Dhillon 'L33tdawg' Kannabhiran.mp4

28.6 MB

HITB2018DXB CTF Prize Giving + Closing Ceremony + Locknote - HitB Crew.en.transcribed.srt

38.2 KB

HITB2018DXB CTF Prize Giving + Closing Ceremony + Locknote - HitB Crew.mp4

64.2 MB

HITB2018DXB Enhancing DL DGA Detection Models Using Separate Character Embedding - Vikash Yadav.en.transcribed.srt

96.1 KB

HITB2018DXB Enhancing DL DGA Detection Models Using Separate Character Embedding - Vikash Yadav.mp4

50.1 MB

HITB2018DXB Evolution of Security Threats To Telecommunications Infrastructures - Emmanuel Gadaix.en.transcribed.srt

72.8 KB

HITB2018DXB Evolution of Security Threats To Telecommunications Infrastructures - Emmanuel Gadaix.mp4

47.2 MB

HITB2018DXB HWallet The Simple Cryptocurrency Hardware Wallet - Nemanja Nikodijevic.en.transcribed.srt

53.5 KB

HITB2018DXB HWallet The Simple Cryptocurrency Hardware Wallet - Nemanja Nikodijevic.mp4

34.9 MB

HITB2018DXB Hacking Into Broadband And Broadcast TV Systems - C. Kasmi, P. Barre and T. Sabono.en.transcribed.srt

62.0 KB

HITB2018DXB Hacking Into Broadband And Broadcast TV Systems - C. Kasmi, P. Barre and T. Sabono.mp4

73.3 MB

HITB2018DXB Hacking The International RFQ Process killthebuzzwords - Dino Covotsos.en.transcribed.srt

93.6 KB

HITB2018DXB Hacking The International RFQ Process killthebuzzwords - Dino Covotsos.mp4

44.0 MB

HITB2018DXB Hacking Yachts Remotely IoT Hacking At Sea - Stephan Gerling.mp4

101.4 MB

HITB2018DXB Improved Blockchain Infrastructure With IoT - Dr Qassim Nasir and Dr Manar Abu Talib.en.transcribed.srt

55.0 KB

HITB2018DXB Improved Blockchain Infrastructure With IoT - Dr Qassim Nasir and Dr Manar Abu Talib.mp4

28.8 MB

HITB2018DXB Offensive Memory Forensics - Hugo Teso.en.transcribed.srt

150.2 KB

HITB2018DXB Offensive Memory Forensics - Hugo Teso.mp4

100.5 MB

HITB2018DXB System-level Threats Assumptions In Modern Product Security - Cristofaro Mune.en.transcribed.srt

98.5 KB

HITB2018DXB System-level Threats Assumptions In Modern Product Security - Cristofaro Mune.mp4

51.2 MB

HITB2018DXB Welcome Address - H.E. Yousuf Hamad Al Shaibani.mp4

4.1 MB

HITB2018DXB CLOSING KEYNOTE Blind Digital Signatures - Dr. Manar Abu Talib and Dr. Qassim Nasir.mp4

72.2 MB

HITB2018DXB D1T1 AI Model Security Reverse Engineering Machine Learning Models - Kang Li.en.transcribed.srt

142.0 KB

HITB2018DXB D1T1 AI Model Security Reverse Engineering Machine Learning Models - Kang Li.mp4

93.3 MB

HITB2018DXB D1T1 Hunting For Backdoors In IoT Firmware At Unprecedented Scale - John Toterhi.041883a1-6bc3-4f6d-bb6e-12ccd31fece4.part

15.1 MB

HITB2018DXB D1T1 Hunting For Backdoors In IoT Firmware At Unprecedented Scale - John Toterhi.en.transcribed.srt

117.1 KB

HITB2018DXB D1T1 Hunting For Backdoors In IoT Firmware At Unprecedented Scale - John Toterhi.mp4

61.1 MB

HITB2018DXB D1T1 Rooting Routers Using Symbolic Execution - Mathy Vanhoef.mp4

102.7 MB

HITB2018DXB D1T1 Spanish Fly Infecting Files On-The-Fly - Leonardo Nve.en.transcribed.srt

83.4 KB

HITB2018DXB D1T1 Spanish Fly Infecting Files On-The-Fly - Leonardo Nve.mp4

80.6 MB

HITB2018DXB D1T1 The Phantom Menace Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.31d15e5a-e3af-4294-bd59-c3009d56b097.part

35.7 MB

HITB2018DXB D1T1 The Phantom Menace Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.en.transcribed.srt

52.1 KB

HITB2018DXB D1T1 The Phantom Menace Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.mp4

78.3 MB

HITB2018DXB D1T1 Virtualizing IoT With Code Coverage Guided Fuzzing - KJ Lau and Nguyen Anh Quynh.en.transcribed.srt

163.1 KB

HITB2018DXB D1T1 Virtualizing IoT With Code Coverage Guided Fuzzing - KJ Lau and Nguyen Anh Quynh.mp4

121.3 MB

HITB2018DXB D1T2 Extracting Messages From iCloud - Vladimir Katalov.en.transcribed.srt

128.7 KB

HITB2018DXB D1T2 Extracting Messages From iCloud - Vladimir Katalov.mp4

103.6 MB

HITB2018DXB D1T2 Gold Digging Discovering Hidden Gems In APKs - Marc Schoenefeld.mp4

77.2 MB

HITB2018DXB D1T2 Hacking Telephone Systems For Fun & Profit - Himanshu Mehta and Sachin Wagh.mp4

65.7 MB

HITB2018DXB D1T2 IPv666 - Address Of The Beast - Marc Newlin and Chris Grayson.dcb71ea4-c3c7-4397-b1ec-72e79d530dbd.part

42.0 MB

HITB2018DXB D1T2 IPv666 - Address Of The Beast - Marc Newlin and Chris Grayson.en.transcribed.srt

166.9 KB

HITB2018DXB D1T2 IPv666 - Address Of The Beast - Marc Newlin and Chris Grayson.mp4

112.1 MB

HITB2018DXB D1T2 Intrusion-Detection On The HW Bus - Congyuan Xu,Wang Kang and Yang Bo.en.transcribed.srt

79.3 KB

HITB2018DXB D1T2 Intrusion-Detection On The HW Bus - Congyuan Xu,Wang Kang and Yang Bo.mp4

107.7 MB

HITB2018DXB D1T2 Multidimensional HW Attack And Defense Toolset - K. Chai, Jie Fu & Mingchuang Qin.en.transcribed.srt

63.6 KB

HITB2018DXB D1T2 Multidimensional HW Attack And Defense Toolset - K. Chai, Jie Fu & Mingchuang Qin.mp4

73.9 MB

HITB2018DXB D2T1 Attacking Industrial Wireless Mesh Networks - M. Van Ommeren and Erwin Paternotte.en.transcribed.srt

115.8 KB

HITB2018DXB D2T1 Attacking Industrial Wireless Mesh Networks - M. Van Ommeren and Erwin Paternotte.mp4

108.4 MB

HITB2018DXB D2T1 DHCP Is Hard - Felix Wilhelm.en.transcribed.srt

124.4 KB

HITB2018DXB D2T1 DHCP Is Hard - Felix Wilhelm.mp4

81.5 MB

HITB2018DXB D2T1 Glitch Chronicles Turning WebGL Into A Hammer - Pietro Frigo.en.transcribed.srt

148.9 KB

HITB2018DXB D2T1 Glitch Chronicles Turning WebGL Into A Hammer - Pietro Frigo.mp4

85.9 MB

HITB2018DXB D2T1 Horror On The Bus Hacking COMBUS - Kirils Solovjovs.en.transcribed.srt

125.2 KB

HITB2018DXB D2T1 Horror On The Bus Hacking COMBUS - Kirils Solovjovs.mp4

116.3 MB

HITB2018DXB D2T1 Vote Of No Confidence Second Factor Correctness - Victor Mateu.en.transcribed.srt

161.0 KB

HITB2018DXB D2T1 Vote Of No Confidence Second Factor Correctness - Victor Mateu.mp4

88.5 MB

HITB2018DXB D2T2 Auditable & Provable Privacy Of Smart Speakers - Wang Kang and Yang Bo.en.transcribed.srt

84.9 KB

HITB2018DXB D2T2 Auditable & Provable Privacy Of Smart Speakers - Wang Kang and Yang Bo.mp4

88.8 MB

HITB2018DXB D2T2 Blockchain, Public Chain and Contract Security - Li Jiafeng and Yang Changcheng.en.transcribed.srt

91.9 KB

HITB2018DXB D2T2 Blockchain, Public Chain and Contract Security - Li Jiafeng and Yang Changcheng.mp4

67.6 MB

HITB2018DXB D2T2 Capture This Real Time Packet Processing With FPGAs - Matteo Collura.en.transcribed.srt

144.4 KB

HITB2018DXB D2T2 Capture This Real Time Packet Processing With FPGAs - Matteo Collura.mp4

83.6 MB

HITB2018DXB D2T2 NTLM Relay Is Dead, Long Live NTLM Relay - Jianing Wang and Junyu Zhou.en.transcribed.srt

80.0 KB

HITB2018DXB D2T2 NTLM Relay Is Dead, Long Live NTLM Relay - Jianing Wang and Junyu Zhou.mp4

58.1 MB

HITB2018DXB D2T2 Using Machine-Learning To Investigate Web Campaigns At Large - Federico Maggi.en.transcribed.srt

133.8 KB

HITB2018DXB D2T2 Using Machine-Learning To Investigate Web Campaigns At Large - Federico Maggi.mp4

136.2 MB

HITB2018DXB KEYNOTE 1 Crouching Tiger, Sudden Keynote - Katie Moussouris.en.transcribed.srt

137.5 KB

HITB2018DXB KEYNOTE 1 Crouching Tiger, Sudden Keynote - Katie Moussouris.mp4

165.7 MB

HITB2018DXB KEYNOTE 2 Cyber Arms Race - Mikko Hypponen (2).en.transcribed.srt

107.4 KB

HITB2018DXB KEYNOTE 2 Cyber Arms Race - Mikko Hypponen (2).mp4

152.1 MB

HITB2018DXB KEYNOTE 2 Cyber Arms Race - Mikko Hypponen.en.transcribed.srt

107.4 KB

HITB2018DXB KEYNOTE 2 Cyber Arms Race - Mikko Hypponen.mp4

95.0 MB

/HITB 2018 - Singapore/

#HITBGEC 2018 COMMSEC Software Security Era Past, Present, And Future - Nafiez and Jaan Yeh.mp4

40.2 MB

#HITBGSEC 2018 Panel Discussion Zero Seconds To Midnight The 0-day Market.en.transcribed.srt

156.6 KB

#HITBGSEC 2018 Panel Discussion Zero Seconds To Midnight The 0-day Market.mp4

109.6 MB

#HITBGSEC 2018 - COMMSEC Welcome Address - Andrea Zapparoli Manzoni.en.transcribed.srt

22.1 KB

#HITBGSEC 2018 - COMMSEC Welcome Address - Andrea Zapparoli Manzoni.mp4

11.3 MB

#HITBGSEC 2018 CLOSING KEYNOTE Rethinking The Cyber Kill Chain - Alexis Lavi.en.transcribed.srt

58.5 KB

#HITBGSEC 2018 CLOSING KEYNOTE Rethinking The Cyber Kill Chain - Alexis Lavi.mp4

36.4 MB

#HITBGSEC 2018 COMMSEC Blockchain And Smart Contract Attack Vectors - Jorden Seet.en.transcribed.srt

100.9 KB

#HITBGSEC 2018 COMMSEC Blockchain And Smart Contract Attack Vectors - Jorden Seet.mp4

48.5 MB

#HITBGSEC 2018 COMMSEC Breaking Full Disk Encryption - Nicolas Collery and Vitaly Kamluk.en.transcribed.srt

86.2 KB

#HITBGSEC 2018 COMMSEC Breaking Full Disk Encryption - Nicolas Collery and Vitaly Kamluk.mp4

55.8 MB

#HITBGSEC 2018 COMMSEC Closing Remarks - Andrea Zapparoli Manzoni.en.transcribed.srt

14.8 KB

#HITBGSEC 2018 COMMSEC Closing Remarks - Andrea Zapparoli Manzoni.mp4

9.8 MB

#HITBGSEC 2018 COMMSEC Cognitive Automation With Machine Learning In Cybersecurity - Rishi Kant.en.transcribed.srt

54.6 KB

#HITBGSEC 2018 COMMSEC Cognitive Automation With Machine Learning In Cybersecurity - Rishi Kant.mp4

38.9 MB

#HITBGSEC 2018 COMMSEC Generic And Static Detection Of Mobile Malware Using ML - Minh Tran.en.transcribed.srt

67.2 KB

#HITBGSEC 2018 COMMSEC Generic And Static Detection Of Mobile Malware Using ML - Minh Tran.mp4

28.9 MB

#HITBGSEC 2018 COMMSEC Hacking Mobile Games Closing The Gap - Nicholas Lim.en.transcribed.srt

82.2 KB

#HITBGSEC 2018 COMMSEC Hacking Mobile Games Closing The Gap - Nicholas Lim.mp4

41.7 MB

#HITBGSEC 2018 COMMSEC Internet Of Things Battle Of The Bots - Rommel D. Joven.en.transcribed.srt

62.9 KB

#HITBGSEC 2018 COMMSEC Internet Of Things Battle Of The Bots - Rommel D. Joven.mp4

29.6 MB

#HITBGSEC 2018 COMMSEC KLara Your New Friend - Dan Demeter.en.transcribed.srt

68.4 KB

#HITBGSEC 2018 COMMSEC KLara Your New Friend - Dan Demeter.mp4

47.9 MB

#HITBGSEC 2018 COMMSEC Learning How To Smurf With Honeypots - Emil Tan.en.transcribed.srt

78.3 KB

#HITBGSEC 2018 COMMSEC Learning How To Smurf With Honeypots - Emil Tan.mp4

45.6 MB

#HITBGSEC 2018 COMMSEC Monitoring Native Execution In WoW64 Apps - Y. Shafir and A. Carlsbad.en.transcribed.srt

130.0 KB

#HITBGSEC 2018 COMMSEC Monitoring Native Execution In WoW64 Apps - Y. Shafir and A. Carlsbad.mp4

64.0 MB

#HITBGSEC 2018 COMMSEC SayaKenaHack Breach Notification In Malaysia - Keith Rozario.en.transcribed.srt

93.4 KB

#HITBGSEC 2018 COMMSEC SayaKenaHack Breach Notification In Malaysia - Keith Rozario.mp4

45.4 MB

#HITBGSEC 2018 COMMSEC Securing ICS SCADA Defense In Depth - Mike Rebultan.en.transcribed.srt

39.1 KB

#HITBGSEC 2018 COMMSEC Securing ICS SCADA Defense In Depth - Mike Rebultan.mp4

33.6 MB

#HITBGSEC 2018 COMMSEC Surprise Rant 2.0 - Joernchen.en.transcribed.srt

34.1 KB

#HITBGSEC 2018 COMMSEC Surprise Rant 2.0 - Joernchen.mp4

21.0 MB

#HITBGSEC 2018 COMMSEC The Trails Of WINDSHIFT APT - Taha Karim.en.transcribed.srt

130.7 KB

#HITBGSEC 2018 COMMSEC The Trails Of WINDSHIFT APT - Taha Karim.mp4

81.7 MB

#HITBGSEC 2018 COMMSEC Threat Impact Analyser For IoT - Simon Eng and Lim Eng Woei.en.transcribed.srt

75.4 KB

#HITBGSEC 2018 COMMSEC Threat Impact Analyser For IoT - Simon Eng and Lim Eng Woei.mp4

47.3 MB

#HITBGSEC 2018 COMMSEC Using ML To Identify Security Issues In Open-Source Libraries - A. Sharma.en.transcribed.srt

78.0 KB

#HITBGSEC 2018 COMMSEC Using ML To Identify Security Issues In Open-Source Libraries - A. Sharma.mp4

28.2 MB

#HITBGSEC 2018 COMMSEC - Demystifying The Definitions Of Dark - Fadli. B. Sidek.en.transcribed.srt

69.1 KB

#HITBGSEC 2018 COMMSEC - Demystifying The Definitions Of Dark - Fadli. B. Sidek.mp4

40.0 MB

#HITBGSEC 2018 D1 A First Look Into The Security Of The Apple Pencil And Smartkeyboard - S. Esser.en.transcribed.srt

138.3 KB

#HITBGSEC 2018 D1 A First Look Into The Security Of The Apple Pencil And Smartkeyboard - S. Esser.mp4

72.3 MB

#HITBGSEC 2018 D1 A Year Of Purple - Ryan Shepherd.en.transcribed.srt

216.2 KB

#HITBGSEC 2018 D1 A Year Of Purple - Ryan Shepherd.mp4

84.3 MB

#HITBGSEC 2018 D1 Exploiting Automation In LTE Mobile Networks - R. Borgaonkar and A. Shaik.en.transcribed.srt

131.7 KB

#HITBGSEC 2018 D1 Exploiting Automation In LTE Mobile Networks - R. Borgaonkar and A. Shaik.mp4

46.7 MB

#HITBGSEC 2018 D1 File Structures Another Binary Exploitation Technique - An-Jie Yang (Angelboy).en.transcribed.srt

79.1 KB

#HITBGSEC 2018 D1 File Structures Another Binary Exploitation Technique - An-Jie Yang (Angelboy).mp4

44.2 MB

#HITBGSEC 2018 D1 God Mode Unlocked Hardware Backdoors In x86 CPUs - Christopher Domas.en.transcribed.srt

178.9 KB

#HITBGSEC 2018 D1 God Mode Unlocked Hardware Backdoors In x86 CPUs - Christopher Domas.mp4

59.1 MB

#HITBGSEC 2018 D1 Owning Electronic Locks Without Leaving A Trace - Tomi Tuominen and Timo Hirvonen.en.transcribed.srt

121.3 KB

#HITBGSEC 2018 D1 Owning Electronic Locks Without Leaving A Trace - Tomi Tuominen and Timo Hirvonen.mp4

71.6 MB

#HITBGSEC 2018 D1 Turning Memory Errors Into Code Execution With Client-Side Compilers - R. Gawlik.mp4

34.0 MB

#HITBGSEC 2018 D2 Hacking BLE Bicycle Locks For Fun And (A Small) Profit - Vincent Tan.en.transcribed.srt

74.4 KB

#HITBGSEC 2018 D2 Hacking BLE Bicycle Locks For Fun And (A Small) Profit - Vincent Tan.mp4

35.4 MB

#HITBGSEC 2018 D2 NFC Payments The Art Of Relay And Replay Attacks - Salvador Mendoza.en.transcribed.srt

82.0 KB

#HITBGSEC 2018 D2 NFC Payments The Art Of Relay And Replay Attacks - Salvador Mendoza.mp4

54.4 MB

#HITBGSEC 2018 D2 The Road To iOS Sandbox Escape - Rani Idan.en.transcribed.srt

89.1 KB

#HITBGSEC 2018 D2 The Road To iOS Sandbox Escape - Rani Idan.mp4

42.4 MB

#HITBGSEC 2018 D2 Traversing The Kill-Chain The New Shiny In 2018 - Vincent Yiu.en.transcribed.srt

156.7 KB

#HITBGSEC 2018 D2 Traversing The Kill-Chain The New Shiny In 2018 - Vincent Yiu.mp4

70.9 MB

#HITBGSEC 2018 D2 Viewer Discretion Advised (De)Coding An iOS Vulnerability - Adam Donenfeld.en.transcribed.srt

149.2 KB

#HITBGSEC 2018 D2 Viewer Discretion Advised (De)Coding An iOS Vulnerability - Adam Donenfeld.mp4

64.0 MB

#HITBGSEC 2018 KEYNOTE 1 (In)Security Is Eating The World - Michael Coates.en.transcribed.srt

130.6 KB

#HITBGSEC 2018 KEYNOTE 1 (In)Security Is Eating The World - Michael Coates.mp4

41.6 MB

#HITBGSEC 2018 KEYNOTE 2 OK Computer Machine Learning In Cybersecurity - Alexander Polyakov.en.transcribed.srt

3.9 KB

#HITBGSEC 2018 KEYNOTE 2 OK Computer Machine Learning In Cybersecurity - Alexander Polyakov.mp4

2.7 MB

#HITBGSEC 2018 LOCK NOTE - Philippe Viola.en.transcribed.srt

20.8 KB

#HITBGSEC 2018 LOCK NOTE - Philippe Viola.mp4

15.5 MB

#HITBGSec 2018 COMMSEC RedPhishing Wi-Fi, Phishing And Red Teaming - Matteo Beccaro.en.transcribed.srt

41.6 KB

#HITBGSec 2018 COMMSEC RedPhishing Wi-Fi, Phishing And Red Teaming - Matteo Beccaro.mp4

21.8 MB

/HITB 2019 - Amsterdam/

#HITB2019AMS CLOSING The Beginning Of The End A Return To The Abyss For A Quick Look - R. Thieme.en.transcribed.srt

105.9 KB

#HITB2019AMS CLOSING The Beginning Of The End A Return To The Abyss For A Quick Look - R. Thieme.mp4

92.2 MB

#HITB2019AMS Closing Ceremony & CTF Prize Giving Ceremony.en.transcribed.srt

23.9 KB

#HITB2019AMS Closing Ceremony & CTF Prize Giving Ceremony.mp4

114.2 MB

#HITB2019AMS D1T1 - A Successful Mess Between Hardening And Mitigation - Weichselbaum & Spagnuolo.en.transcribed.srt

97.0 KB

#HITB2019AMS D1T1 - A Successful Mess Between Hardening And Mitigation - Weichselbaum & Spagnuolo.mp4

321.5 MB

#HITB2019AMS D1T1 - Deobfuscate UEFI BIOS Malware And Virtualized Packers - Alexandre Borges.en.transcribed.srt

65.9 KB

#HITB2019AMS D1T1 - Deobfuscate UEFI BIOS Malware And Virtualized Packers - Alexandre Borges.mp4

372.3 MB

#HITB2019AMS D1T1 - Finding Vulnerabilities In iOS MacOS Networking Code - Kevin Backhouse.en.transcribed.srt

73.3 KB

#HITB2019AMS D1T1 - Finding Vulnerabilities In iOS MacOS Networking Code - Kevin Backhouse.mp4

241.9 MB

#HITB2019AMS D1T1 - Make ARM Shellcode Great Again - Saumil Shah.mp4

271.0 MB

#HITB2019AMS D1T1 - Pwning Centrally-Controlled Smart Homes - Sanghyun Park and Seongjoon Cho.mp4

123.0 MB

#HITB2019AMS D1T1 - TOCTOU Attacks Against Secure Boot And BootGuard - Trammell Hudson & Peter Bosch.en.transcribed.srt

58.0 KB

#HITB2019AMS D1T1 - TOCTOU Attacks Against Secure Boot And BootGuard - Trammell Hudson & Peter Bosch.mp4

194.8 MB

#HITB2019AMS D1T1 - The Birdman Hacking Cospas-Sarsat Satellites - Hao Jingli.en.transcribed.srt

48.7 KB

#HITB2019AMS D1T1 - The Birdman Hacking Cospas-Sarsat Satellites - Hao Jingli.mp4

173.7 MB

#HITB2019AMS D1T2 - Automated Discovery Of Logical Priv. Esc. Bugs In Win10 - Wenxu Wu and Shi Qin.en.transcribed.srt

53.9 KB

#HITB2019AMS D1T2 - Automated Discovery Of Logical Priv. Esc. Bugs In Win10 - Wenxu Wu and Shi Qin.mp4

353.4 MB

#HITB2019AMS D1T2 - Duplicating Black Box Machine Learning Models - Rewanth Cool and Nikhil Joshi.mp4

220.2 MB

#HITB2019AMS D1T2 - For The Win The Art Of The Windows Kernel Fuzzing - Guangming Liu.en.transcribed.srt

38.5 KB

#HITB2019AMS D1T2 - For The Win The Art Of The Windows Kernel Fuzzing - Guangming Liu.mp4

298.9 MB

#HITB2019AMS D1T2 - H(ack)DMI Pwning HDMI For Fun And Profit - Jeonghoon Shin and Changhyeon Moon.mp4

230.0 MB

#HITB2019AMS D1T2 - Hidden Agendas Bypassing GSMA Recommendations On SS7 Networks - Kirill Puzankov.en.transcribed.srt

72.9 KB

#HITB2019AMS D1T2 - Hidden Agendas Bypassing GSMA Recommendations On SS7 Networks - Kirill Puzankov.mp4

336.3 MB

#HITB2019AMS D1T2 - Hourglass Fuzz A Quick Bug Hunting Method - M. Li, T. Han, L. Jiang and L. Wu.en.transcribed.srt

81.1 KB

#HITB2019AMS D1T2 - Hourglass Fuzz A Quick Bug Hunting Method - M. Li, T. Han, L. Jiang and L. Wu.mp4

293.2 MB

#HITB2019AMS D1T2 - Researching New Attack Interfaces On iOS And OSX - Lilang Wu and Moony Li.en.transcribed.srt

61.2 KB

#HITB2019AMS D1T2 - Researching New Attack Interfaces On iOS And OSX - Lilang Wu and Moony Li.mp4

299.4 MB

#HITB2019AMS D1T2 - fn_fuzzy Fast Multiple Binary Diffing Triage With IDA - Takahiro Haruyama.mp4

153.6 MB

#HITB2019AMS D1T3 - Attacking GSM - Alarms, Smart Homes, Smart Watches And More - Alex Kolchanov.mp4

238.0 MB

#HITB2019AMS D1T3 - How To Dump, Parse, And Analyze i.MX Flash Memory Chips - Damien Cauquil.en.transcribed.srt

69.5 KB

#HITB2019AMS D1T3 - How To Dump, Parse, And Analyze i.MX Flash Memory Chips - Damien Cauquil.mp4

54.1 MB

#HITB2019AMS D1T3 - Overcoming Fear Reversing With Radare2 - Arnau Gamez Montolio.en.transcribed.srt

183.4 KB

#HITB2019AMS D1T3 - Overcoming Fear Reversing With Radare2 - Arnau Gamez Montolio.mp4

516.1 MB

#HITB2019AMS D2T1 - Attacking Industrial Remote Controllers - Marco Balduzzi and Federico Maggi.en.transcribed.srt

85.6 KB

#HITB2019AMS D2T1 - Attacking Industrial Remote Controllers - Marco Balduzzi and Federico Maggi.mp4

340.3 MB

#HITB2019AMS D2T1 - Compiler Bugs And Bug Compilers - Marion Marschalek.en.transcribed.srt

121.6 KB

#HITB2019AMS D2T1 - Compiler Bugs And Bug Compilers - Marion Marschalek.mp4

238.4 MB

#HITB2019AMS D2T1 - Muraena The Unexpected Phish - Michele Orru and Giuseppe Trotta.en.transcribed.srt

65.4 KB

#HITB2019AMS D2T1 - Muraena The Unexpected Phish - Michele Orru and Giuseppe Trotta.mp4

221.5 MB

#HITB2019AMS D2T1 - Sneaking Past Device Guard - Philip Tsukerman.en.transcribed.srt

77.4 KB

#HITB2019AMS D2T1 - Sneaking Past Device Guard - Philip Tsukerman.mp4

276.1 MB

#HITB2019AMS D2T2 - Binder The Bridge To Root - Hongli Han and Mingjian Zhou.en.transcribed.srt

38.6 KB

#HITB2019AMS D2T2 - Binder The Bridge To Root - Hongli Han and Mingjian Zhou.mp4

151.9 MB

#HITB2019AMS D2T2 - Improving Unicode Attacks With Deep Learning - Muñoz, Boza & Escribano.mp4

63.7 MB

#HITB2019AMS D2T2 - ModJack Hijacking The MacOS Kernel - Zhi Zhou.en.transcribed.srt

70.7 KB

#HITB2019AMS D2T2 - ModJack Hijacking The MacOS Kernel - Zhi Zhou.mp4

361.1 MB

#HITB2019AMS D2T2 - Panic On The Streets Of Amsterdam PanicXNU 3.0 - Juwei Lin and Junzhi Lu.en.transcribed.srt

57.9 KB

#HITB2019AMS D2T2 - Panic On The Streets Of Amsterdam PanicXNU 3.0 - Juwei Lin and Junzhi Lu.mp4

288.6 MB

#HITB2019AMS D2T2 - Reversing Cryptographic Primitives Using Quantum Computing - Renaud Lifchitz.en.transcribed.srt

76.4 KB

#HITB2019AMS D2T2 - Reversing Cryptographic Primitives Using Quantum Computing - Renaud Lifchitz.mp4

426.2 MB

#HITB2019AMS KEYNOTE 2 - Securing Journalists - Runa Sandvik.en.transcribed.srt

72.8 KB

#HITB2019AMS KEYNOTE 2 - Securing Journalists - Runa Sandvik.mp4

140.5 MB

#HITB2019AMS KEYNOTE The End Is The Beginning Is The End Ten Years In The NL Box - D. Kannabhiran.en.transcribed.srt

77.1 KB

#HITB2019AMS KEYNOTE The End Is The Beginning Is The End Ten Years In The NL Box - D. Kannabhiran.mp4

181.3 MB

#HITB2019AMS LOCKNOTE - HITB+CyberWeek Announcement - Dhillon 'L33tdawg' Kannabhiran.en.transcribed.srt

22.3 KB

#HITB2019AMS LOCKNOTE - HITB+CyberWeek Announcement - Dhillon 'L33tdawg' Kannabhiran.mp4

62.6 MB

#HITB2019AMS PRECONF PREVIEW - The Beginning of the End A Return to the Abyss for a Quick Look.en.transcribed.srt

4.2 KB

#HITB2019AMS PRECONF PREVIEW - The Beginning of the End A Return to the Abyss for a Quick Look.mp4

8.6 MB

#HITB2019AMS PRECONF PREVIEW - The End Is The Beginning Is The End Ten Years In The NL Box.en.transcribed.srt

0.9 KB

#HITB2019AMS PRECONF PREVIEW - The End Is The Beginning Is The End Ten Years In The NL Box.mp4

1.7 MB

#HITBHaxpo D1 - Hacking LTE Public Warning Systems - Weiguang Li.en.transcribed.srt

24.1 KB

#HITBHaxpo D1 - Hacking LTE Public Warning Systems - Weiguang Li.mp4

70.1 MB

#HITBHaxpo D1 - Hacking The 0day Market - Andrea Zapparoli Manzoni.en.transcribed.srt

44.3 KB

#HITBHaxpo D1 - Hacking The 0day Market - Andrea Zapparoli Manzoni.mp4

73.5 MB

#HITBHaxpo D1 - Social Networks Can We Fix Them - Joel Hernandez.en.transcribed.srt

29.3 KB

#HITBHaxpo D1 - Social Networks Can We Fix Them - Joel Hernandez.mp4

106.5 MB

#HITBHaxpo D1 - V1 Bounty Building A Coordinated Bug Disclosure Bridge For The EU - Benjamin Kunz.mp4

199.7 MB

#HITBHaxpo D1 - WiCy Monitoring 802.11AC Networks At Scale - Vivek Ramachandran.mp4

72.7 MB

#HITBHaxpo D2 - Attacking Encrypted VOIP Protocols - Ivica Stipovic.en.transcribed.srt

39.8 KB

#HITBHaxpo D2 - Attacking Encrypted VOIP Protocols - Ivica Stipovic.mp4

85.6 MB

#HITBHaxpo D2 - Demystifying IoT OT Hacks With SDR - Harshit Agrawal & Himanshu Mehta.en.transcribed.srt

57.1 KB

#HITBHaxpo D2 - Demystifying IoT OT Hacks With SDR - Harshit Agrawal & Himanshu Mehta.mp4

18.7 MB

#HITBHaxpo D2 - I Own Your Building (Management System) - Gjoko Krstic.en.transcribed.srt

62.7 KB

#HITBHaxpo D2 - I Own Your Building (Management System) - Gjoko Krstic.mp4

129.6 MB

#HITBHaxpo D2 - Might As Well JUMP Exploit Development For Java Serialization - Jameel Nabbo.en.transcribed.srt

30.9 KB

#HITBHaxpo D2 - Might As Well JUMP Exploit Development For Java Serialization - Jameel Nabbo.mp4

109.5 MB

#HITBHaxpo D2 - PatrOwl - The Red Flavour Of SOC Automation And Orchestration - Nicolas Mattiocco.mp4

86.3 MB

#HITBHaxpo D2 - Reverse Engineering Custom ASICs By Exploiting Supply-Chain Leaks - Thomas Weber.en.transcribed.srt

35.9 KB

#HITBHaxpo D2 - Reverse Engineering Custom ASICs By Exploiting Supply-Chain Leaks - Thomas Weber.mp4

155.7 MB

#HITBHaxpo D2 - Reversing Mobile Malware - Abdullah Joseph.en.transcribed.srt

54.3 KB

#HITBHaxpo D2 - Reversing Mobile Malware - Abdullah Joseph.mp4

184.4 MB

#HITBHaxpo D2 - Rise Of The WarPi - Kevin McPeake.en.transcribed.srt

56.7 KB

#HITBHaxpo D2 - Rise Of The WarPi - Kevin McPeake.mp4

111.4 MB

#HITBHaxpo D2 - Secure And Scalable Anomaly-Based Network Intrusion Detection - Philipp Mieden.en.transcribed.srt

54.5 KB

#HITBHaxpo D2 - Secure And Scalable Anomaly-Based Network Intrusion Detection - Philipp Mieden.mp4

163.7 MB

/

Hack in the Box thank you.txt

0.8 KB

hitb logo.png

29.6 KB

 

Total files 1070


Copyright © 2024 FileMood.com