/
|
Hack in the Box thank you.txt
|
1.0 KB
|
hitb logo.png
|
29.6 KB
|
/HITB 2003 - Malaysia/
|
bt1.mp4
|
66.6 MB
|
bt2.mp4
|
42.8 MB
|
bt3.mp4
|
34.2 MB
|
bt4.mp4
|
39.8 MB
|
bt5.mp4
|
46.3 MB
|
bt6.mp4
|
18.6 MB
|
panel.mp4
|
80.5 MB
|
tt1.mp4
|
108.6 MB
|
tt2.mp4
|
56.0 MB
|
tt3.mp4
|
68.2 MB
|
tt4.mp4
|
60.0 MB
|
tt5.mp4
|
61.4 MB
|
tt6.mp4
|
76.3 MB
|
tt7.mp4
|
89.8 MB
|
tt8.mp4
|
48.1 MB
|
tt9.mp4
|
80.3 MB
|
/proceedings/
|
hitb04-adam-gowdiak.pdf
|
56.4 MB
|
hitb04-captain-crunch-01.pdf
|
41.7 KB
|
hitb04-captain-crunch-02.pdf
|
38.6 KB
|
hitb04-chew-keong-tan.pdf
|
9.0 MB
|
hitb04-emmanuel-gadaix.pdf
|
43.8 MB
|
hitb04-fyodor-meder.pdf
|
880.4 KB
|
hitb04-gareth-davies.pdf
|
589.7 KB
|
hitb04-grugq.pdf
|
1.1 MB
|
hitb04-jose-nazario.pdf
|
458.4 KB
|
hitb04-kamal-hilmi.tgz
|
657.1 KB
|
hitb04-roberto-fabio.pdf
|
2.1 MB
|
hitb04-shreeraj-shah.pdf
|
583.6 KB
|
hitb04-sk-chong.pdf
|
988.5 KB
|
hitb04-sukhdev-singh.pdf
|
13.8 MB
|
hitb04-teo-sze-siong.zip
|
364.7 KB
|
hitb04-theo-deraadt.zip
|
2.7 MB
|
hitb04-toh-swee-hoe.pdf
|
6.7 MB
|
/videos/
|
adam gowdiak.mp4
|
97.6 MB
|
emmanuel gadaix.mp4
|
94.1 MB
|
fyodor and meder.mp4
|
46.0 MB
|
gareth davies.mp4
|
31.0 MB
|
grugq.mp4
|
48.0 MB
|
jorge sebastiao.mp4
|
33.5 MB
|
jose nazario.mp4
|
55.8 MB
|
keynote 1 theo de raadt.mp4
|
48.3 MB
|
panel discussion.mp4
|
53.6 MB
|
roberto and fabio.mp4
|
69.9 MB
|
shreeraj shah.mp4
|
69.2 MB
|
sk chong.mp4
|
82.1 MB
|
sukdev singh.mp4
|
47.9 MB
|
suresh ramasamy.mp4
|
31.9 MB
|
teo sze siong.mp4
|
48.0 MB
|
toh swee hoe.mp4
|
60.8 MB
|
/proceedings/
|
BT-Anthony-Zboralski-Social-Engineering.pdf
|
1.1 MB
|
BT-Fabrice-Marie-Hacking-Internet-Banking-Applications.pdf
|
1.2 MB
|
BT-Raoul-Chiesa-X25-Security.pdf
|
1.1 MB
|
BT-Roberto-Preatoni-Fabio-Ghioni-Corp-vs-Corp.ppt
|
7.5 MB
|
BT-Tim-Pritlove-Blinkenlights-Arcade-Project.pdf
|
5.3 MB
|
HITB.gif
|
14.4 KB
|
Keynote-Mikko-Hypponen-Mobile-Malware.pdf
|
3.6 MB
|
Keynote-Tony-Chor-IE-Security-Past-Present-and-Future.ppt
|
5.1 MB
|
Mark Schoenefeld - Java and Secure Programming.pdf
|
3.7 MB
|
TT-Dave-Aitel-Nematodes.zip
|
63.3 KB
|
TT-Fyodor-Yarochkin-Meder-Kydyraliev-STIFware-Evolution.ppt
|
491.0 KB
|
TT-Jim-Geovedi-Hotspot-Security.pdf
|
789.6 KB
|
TT-Joanna-Rutkowska-HITB-Virginity-Verifier.ppt
|
540.7 KB
|
TT-Jose-Nazario-Analyzing-all-that-data.pdf
|
806.3 KB
|
TT-Nish-Bhalla-Defects-Overview.pdf
|
614.9 KB
|
TT-Roelof-Temmingh-State-of-the-art.ppt
|
2.6 MB
|
TT-San-Hacking-Windows-CE.ppt
|
900.1 KB
|
TT-Shreeraj-Shah-Webhacking-Kungfu.pdf
|
294.0 KB
|
TT-The-Grugq-VoIPPhreaking.ppt
|
137.2 KB
|
/video/
|
Analyzing Code.mp4
|
34.1 MB
|
Assesing Srv Sec.mp4
|
59.9 MB
|
Beneficial Worms.mp4
|
60.5 MB
|
Build Sec Oper Center.mp4
|
60.4 MB
|
CCC.mp4
|
62.2 MB
|
Cyber Skirmishes.mp4
|
45.3 MB
|
Fabrice M.mp4
|
87.1 MB
|
Fyodor Y.mp4
|
81.2 MB
|
Hacking WinCE.mp4
|
63.0 MB
|
HckInternet Banking App.mp4
|
59.5 MB
|
IE-Security.mp4
|
90.1 MB
|
Java & Sec Programming.mp4
|
58.9 MB
|
Jim Geove.mp4
|
50.7 MB
|
Joanna Ru.mp4
|
87.0 MB
|
Marc Scho.mp4
|
87.1 MB
|
Mobile Malware.mp4
|
81.0 MB
|
Modern Espionage.mp4
|
54.9 MB
|
Raoul Chi.mp4
|
98.1 MB
|
Real World Attacks.mp4
|
36.6 MB
|
Roberto P.mp4
|
80.0 MB
|
Roelof T.mp4
|
87.3 MB
|
Rohyt Bel.mp4
|
53.1 MB
|
Social Engineering Fundam.mp4
|
68.2 MB
|
STIF-wareEvol.mp4
|
55.9 MB
|
Stifting Haystacks.mp4
|
43.8 MB
|
The Grugq.mp4
|
99.6 MB
|
VoIPhreaking.mp4
|
65.6 MB
|
WHcking Kung FU.mp4
|
50.5 MB
|
wifi Hotspot Sec.mp4
|
32.8 MB
|
Windows Malware Detection.mp4
|
59.1 MB
|
x25 Security Wwwww.mp4
|
67.8 MB
|
/HITB 2006 - Malaysia/
|
Anthony Zboralski & Dave McKay - Hacking Trust.mp4
|
69.7 MB
|
Carlos Sarraute & Javier Burroni - Neural Networks.mp4
|
43.1 MB
|
Ching Tim Meng - X.805 Standard.mp4
|
67.5 MB
|
CTF Prize Giving & Charity Auction.mp4
|
70.7 MB
|
Douglas MacIver - Pen Testing Windows Vista BitLocker.mp4
|
57.3 MB
|
Fabrice Marie - Application Intrusion Prevention....mp4
|
70.6 MB
|
Fyodor Yarochkin & - Meder Kydyraliev - YAWATT.mp4
|
11.7 MB
|
Jim Geovedi & - Raditya Iryandi - Hacking VSAT.mp4
|
57.4 MB
|
Joanna Rutkowska - Subverting Vista Kernel for Fun...mp4
|
67.2 MB
|
Jonathan Limbo - The world through the eyes of a .....mp4
|
28.6 MB
|
Lisa Thalheim - Visualization of Source Code.mp4
|
39.6 MB
|
Marc Schonefeld - Pentesting Java J2EE.mp4
|
60.8 MB
|
Mark Curphey & John Viega - Keynote.mp4
|
16.1 MB
|
Michael Davis - Client Honeypots - Its not only ....mp4
|
43.5 MB
|
Nguyen Anh Quynh - Invisible Honeypot Monitoring.mp4
|
50.2 MB
|
Nish Balla - Finding Secrets in ISAPI.mp4
|
52.3 MB
|
Paul Boehm - Taming Bugs.mp4
|
8.7 MB
|
Philippe Biondi & - Arnaud Ebalard - Scapy and IPv6.mp4
|
62.7 MB
|
Raoul Chiesa - Hacker's Profiling Project (HPP).mp4
|
14.7 MB
|
Roberto Preatoni & Fabio Ghioni - The Biggest Brother.mp4
|
15.8 MB
|
Rohyt Belani - Smashing the stack for profit - period.mp4
|
58.5 MB
|
Saumil Shah - - Writing Metasploit Plugins.mp4
|
57.3 MB
|
The Grugq - VoIPhreaking SIPhallis Unveiled.mp4
|
71.3 MB
|
Thorsten Holz - Playing with Botnets.mp4
|
7.1 MB
|
Van Hauser - Attacking the IPv6 Protocol Suite.mp4
|
64.4 MB
|
Wes Brown - MOSREF.mp4
|
59.0 MB
|
Window Snyder - Firefox Security.mp4
|
7.2 MB
|
Yen Min Cheng - Triple Play Triple Threats .mp4
|
65.7 MB
|
/HITB 2007 - Malaysia/
|
Alexander Kornbrust - Hacking Hardend and Secured Oracle Servers.mp4
|
53.6 MB
|
Andrea Barisani and Daniele Bianco - Injecting RDS-TMC.mp4
|
64.1 MB
|
Billy Rios and Nathan McFeters - Slipping Past the Firewall.mp4
|
48.5 MB
|
CTF Prize Giving and Charity Auction.mp4
|
87.6 MB
|
Felix FX Lindner - Attack Surface of Modern Applications.mp4
|
56.1 MB
|
Frank Yuan Fan - Advanced Web Application and Database Threat Analysis with MatriXay.mp4
|
47.8 MB
|
Grugq - Meta Anti Forensics - The Hash Hacking Harness.mp4
|
44.6 MB
|
KEYNOTE 1 - Lance Spitzner - Honeypots - Past Present and Future.mp4
|
53.4 MB
|
KEYNOTE 2 - Mikko Hypponen - Online Crime and Crime Online.mp4
|
68.1 MB
|
KEYNOTE 3 - Mark Phiber Optik Abene.mp4
|
245.8 KB
|
KEYNOTE 4 - Emmanuel Goldstein.mp4
|
284.5 KB
|
Luiz Eduardo - Protocol Fuzzing.mp4
|
58.3 MB
|
Marc Weber Tobias and TOOOL USA - High Security Locks.mp4
|
84.8 MB
|
Martin Johns - Hacking the Intranet with a Webpage.mp4
|
42.1 MB
|
Raffael Marty - Insider Threat Visualization.mp4
|
37.9 MB
|
Raoul Chiesa and Mayhem - Hacking SCADA.mp4
|
25.3 MB
|
Roberto Preatoni - WabiSabiLabi - The Exploit Marketplace.mp4
|
62.9 MB
|
Sarb Sembhi - An End to End Analysis of Securing Networked CCTV Systems.mp4
|
58.4 MB
|
Shreeraj Shah - Hacking AJAX and Web Services.mp4
|
54.4 MB
|
Starbug - Hacking Biometric Passports.mp4
|
46.4 MB
|
Stefano Zanero - Anomaly Based Intrusion Detection.mp4
|
55.5 MB
|
Window Snyder - Tools and Strategies for Securing a Large Development Project.mp4
|
60.1 MB
|
/HITB 2008 - Dubai/
|
Adrian Pastor - Cracking Into Embeded Devices and Beyond.zip
|
40.1 MB
|
Alessio Penasilico - VoIP INsecurities - Italians Do It Better.zip
|
12.9 MB
|
Alexander Kornbrust - Practical Oracle Forensics.zip
|
1.3 MB
|
Benjamin Hagen and Walter Goulet - Real World Attacks Against 3G Networks Using Subscriber Devices.zip
|
385.0 KB
|
Cesar Cerrudo - Token Kidnapping.zip
|
174.8 KB
|
Daniel Ingevaldson - Virtualization = Security.zip
|
10.6 MB
|
Dino Covotsos - Hacking the Bluetooth Stack for Fun Fame and Mayhem.zip
|
60.6 MB
|
Domingo Montanaro - In-depth Anti-Forensics - Challenges of Steganography and Discovering Hidden Data.zip
|
1.5 MB
|
Ero Carrera - Malware Behavior Tools Scripting and Adavanced Analysis.zip
|
2.3 MB
|
Hacking the bluetooth stack.mp4
|
3.0 MB
|
Jamie Butler - Computer Forensics and Incident Response.zip
|
172.8 KB
|
Jim Geovedi - Hijacking VSAT Connections.zip
|
1.9 MB
|
KEYNOTE - Jeremiah Grossman.zip
|
5.6 MB
|
Meling Mudin and Lee Chin Sheng - Defensive Network Security.pdf
|
1.0 MB
|
Michael Thumann - Hacking Second Life.zip
|
106.7 MB
|
Petko Petkov - For My Next Trick - Client Side Hacking.zip
|
7.5 MB
|
Raoul Chiesa and Alessio Pennasillico - Penetration Testing SCADA.zip
|
7.7 MB
|
Rodrigo Rubira Branco - Hacking The Cell Architecture.zip
|
1.5 MB
|
Shreeraj Shah - Securing Next Generation Applications - Scan Detect and Mitigate.zip
|
408.8 KB
|
Skyper - Cracking the GSM A5-1 Encryption in Seconds.zip
|
3.2 MB
|
/HITB 2008 - Malaysia/
|
Adrian Pagvac Pastor - Cracking into Embedded Devices and Beyond.mp4
|
55.7 MB
|
Alexander Tereskin - Bluepilling the Xen Hypervisor.mp4
|
44.8 MB
|
Charl Van Der Walt - Pushing the Camel Through the Eye of a Needle.mp4
|
61.1 MB
|
Charlie Miller - iPwning the iPhone.mp4
|
56.4 MB
|
CTF Prize Giving & Charity Auction.mp4
|
87.5 MB
|
DinoDaiZovi-Mac OS X Exploitation.mp4
|
57.3 MB
|
Eric Lawrence - Internet Explorer 8 - Trustworthy Engineering and Browsing.mp4
|
61.0 MB
|
Ero Carrera - Analysis and Visualization of Common Packers.mp4
|
54.6 MB
|
HernanOchoa-Pass The Hass Toolkit for Windows.mp4
|
52.0 MB
|
Ilfak Guilfanov - Decompilers and Beyond.mp4
|
56.5 MB
|
JeremiahGrossman-The Art Of Click Jacking.mp4
|
55.2 MB
|
Jim Geovedi & Raditya Iryandi - Hacking a Bird in the Sky 2.0.mp4
|
36.0 MB
|
Jonathan Squire - A Fox in the Hen House - UPnP IGD.mp4
|
54.7 MB
|
Julian Ho - MoocherHunting - Real-Time Geo-Location Unauthorized WiFi Users.mp4
|
49.7 MB
|
Kris Kaspersky - Remote Code Execution Through Intel CPU Bugs.mp4
|
31.7 MB
|
MarcusRanum-Cyberwar Is Bullshit.mp4
|
54.4 MB
|
Matthew Geiger - How to Build Your Own Password Cracker with a VM.mp4
|
51.0 MB
|
Next Generation Reverse Shell.mp4
|
62.0 MB
|
Paul Craig - Hacking Internet Kiosks.mp4
|
60.4 MB
|
Peter Silberman - Full Process Reconsitution from Memory.mp4
|
51.2 MB
|
Petko D Petkov - Client-Side Security.mp4
|
38.7 MB
|
Roberto Preatoni - Time for a free hardware foundation.mp4
|
50.5 MB
|
Saumil Shah - Browser Exploits - A New Model For Browser Security.mp4
|
53.9 MB
|
Shreeraj Shah - Top 10 Web 2.0 Attacks.mp4
|
62.9 MB
|
The Grugq - How The Leopard Hides His Spots - OS X Anti-Forensics Techniques.mp4
|
51.6 MB
|
The Pirate Bay - Dissolving an Industry as a Hobby.mp4
|
77.9 MB
|
ThomasVarghese-Delivering Identity Management 2.0 by Leveraging OPSS.mp4
|
44.9 MB
|
/HITB 2009 - Malaysia/
|
Alexander Gazet & Yoann Guilot - Defeating Software Protection with Metasm.mp4
|
60.4 MB
|
Announcement of CTF Winners and Final HITB Charity Auction.mp4
|
45.0 MB
|
Bruno Goncalves - Hacking From The Restroom.mp4
|
55.8 MB
|
ctf-clip1.mp4
|
1.1 MB
|
CTF.mp4
|
478.4 KB
|
Dimitrious Petroulos - Having Fun With ATMs and HSMs.mp4
|
58.7 MB
|
Ed Skoudis - The Bad Guys Are Winning. So Now What.mp4
|
66.1 MB
|
Frederic Raynal, Guillaume Deluge, Damien Aumaitre - PDF Origami Strikes Back.mp4
|
49.2 MB
|
Fyodor Yarochkin and The Grugq - From Russia With Love.exe.mp4
|
64.8 MB
|
Harron Meer - Clobbering The Cloud.mp4
|
67.8 MB
|
Job De Haas - Side Channel Analysis on Embedded Systems.mp4
|
64.6 MB
|
Joe Grand - Hardware Is The New Software.mp4
|
55.3 MB
|
Julian Assage - Publishing the Unpublished.mp4
|
68.1 MB
|
Julien Tinnes, Chris Evans - Security In-Depth for Linux Software.mp4
|
61.4 MB
|
Kuza55 - Implementing a Blind TCPIP Hijacking Tool.mp4
|
41.5 MB
|
Lucas Adamski - Freeing Sisyphus, Declaratively Address Web Security Issue.mp4
|
46.8 MB
|
MARES - APRS,HAM Radio.mp4
|
61.9 MB
|
Mark Dowd - Attacking Interoperability.mp4
|
58.4 MB
|
Meling Mudin & CS Lee - Network Forensics.mp4
|
77.5 MB
|
Nguyen Anh Quyuh - eKimono, A Malware Scanner for Virtual Machines.mp4
|
59.7 MB
|
Nishad Herath - How Low Will Malware Go.mp4
|
59.5 MB
|
Paul Theriault - Browser Ghosting Attacks.mp4
|
43.9 MB
|
Rop Gonggip - Modern Day Robin Hoods.mp4
|
47.0 MB
|
Saumil Shah - How To Own The World, One Desktop At A Time.mp4
|
59.1 MB
|
Sheran Gunasekera - Bugs and Kisses, Spying on Blackberry Users for Fun.mp4
|
58.2 MB
|
Steve Anson - Detecting Computer Intrusions.mp4
|
41.0 MB
|
The Secret History Of Hacking.DivxMp3.mp4
|
51.2 MB
|
Travis Ormandy - Making Software Dumber.mp4
|
33.5 MB
|
/HITB 2010 - Malaysia/
|
Future of Mobile Malware & Cloud Computing Part 1.mp4
|
10.1 MB
|
Future of Mobile Malware & Cloud Computing Part 1.srt
|
8.6 KB
|
Future of Mobile Malware & Cloud Computing Part 2.mp4
|
10.1 MB
|
Future of Mobile Malware & Cloud Computing Part 3.mp4
|
12.5 MB
|
Future of Mobile Malware & Cloud Computing Part 3.srt
|
11.0 KB
|
Future of Mobile Malware & Cloud Computing Part 4.mp4
|
10.4 MB
|
Future of Mobile Malware & Cloud Computing Part 4.srt
|
8.9 KB
|
Future of Mobile Malware & Cloud Computing Part 5.mp4
|
10.0 MB
|
Future of Mobile Malware & Cloud Computing Part 5.srt
|
9.5 KB
|
Future of Mobile Malware & Cloud Computing Part 6.mp4
|
12.8 MB
|
Future of Mobile Malware & Cloud Computing Part 7.mp4
|
9.7 MB
|
Future of Mobile Malware & Cloud Computing Part 8.mp4
|
9.7 MB
|
Future of Mobile Malware & Cloud Computing Part 8.srt
|
8.5 KB
|
Future of Mobile Malware & Cloud Computing Part 9.mp4
|
12.4 MB
|
Future of Mobile Malware & Cloud Computing Part 9.srt
|
11.0 KB
|
Future of Mobile Malware & Cloud Computing Part 10.mp4
|
12.7 MB
|
Future of Mobile Malware & Cloud Computing Part 10.srt
|
10.2 KB
|
Perpetual Insecurity Machine Part 1.mp4
|
9.8 MB
|
Perpetual Insecurity Machine Part 1.srt
|
9.0 KB
|
Perpetual Insecurity Machine Part 2.mp4
|
10.0 MB
|
Perpetual Insecurity Machine Part 2.srt
|
8.0 KB
|
Perpetual Insecurity Machine Part 3.mp4
|
13.6 MB
|
Perpetual Insecurity Machine Part 3.srt
|
11.1 KB
|
Perpetual Insecurity Machine Part 4.mp4
|
10.0 MB
|
Perpetual Insecurity Machine Part 4.srt
|
7.3 KB
|
Perpetual Insecurity Machine Part 5.mp4
|
8.1 MB
|
Perpetual Insecurity Machine Part 5.srt
|
7.2 KB
|
Taking Back the DNS Part 1.mp4
|
9.7 MB
|
Taking Back the DNS Part 2.mp4
|
9.7 MB
|
Taking Back the DNS Part 3.mp4
|
13.4 MB
|
Taking Back the DNS Part 4.mp4
|
14.3 MB
|
Taking Back the DNS Part 5.mp4
|
11.2 MB
|
/HITB 2011 - Amsterdam/
|
Hackers Op De Gracht.mp4
|
9.2 MB
|
/Presentations/
|
D1 LABS - VoIP Attacking CUCM.pdf
|
2.8 MB
|
D1 SIGINT - Adnan Mohd Shukor - Fun With Javascript DeObfuscation.pdf
|
4.2 MB
|
D1 SIGINT - Elger Stitch Jonker - Building the Hackerspace.pdf
|
8.8 MB
|
D1 SIGINT - Jurre van Bergen and Youri van der Zwart - Abusing RFID.pdf
|
790.1 KB
|
D1 SIGINT - Muhammad Najmi Ahmad Zabidi - Compiling Features for Malcious Binaries.pdf
|
420.2 KB
|
D1 SIGINT - Raoul Chiesa - Cyber Weapons in 2011.pdf
|
7.4 MB
|
D1T1 - Alex Kirk - Mobile Malware Analysis.pdf
|
1.9 MB
|
D1T1 - Andrea Barisani and Daniele Bianco - EMV Protocol and POS Physical Analysis.pdf
|
2.1 MB
|
D1T1 - Elena K and Joffrey C - Webshells - A Framework for Pentesting.pdf
|
5.4 MB
|
D1T1 - Jonathan Brossard - Post Memory Corruption Analysis.pdf
|
284.6 KB
|
D1T1 - Mahmud Ab Rahman - Reverse Engineering Android Malware.pdf
|
9.7 MB
|
D1T1 - Marco Balduzzi - Attacking the Privacy of Social Network Users.pdf
|
6.7 MB
|
D1T1 - Mariano Nunez - Attacks Against SAP Web Applications.pdf
|
1.4 MB
|
D1T1 - Riley Hassell - Exploiting Androids for Fun and Profit.pdf
|
9.4 MB
|
D1T1 - Stefan Esser - Antid0te 2.0 - ASLR in iOS.pdf
|
5.0 MB
|
D1T2 - Alexander Polyakov and Dimitry Chastuhin - SAPocalypse Now.pdf
|
15.9 MB
|
D1T2 - Asia Slowinka - Excavating Data Structures from Stripped Binaries.pdf
|
902.7 KB
|
D1T2 - biatch0 and RuFI0 - Pwning a 4G Device for the LuLz.pdf
|
3.7 MB
|
D1T2 - Claudio Criscione - MetaXSSploit - Bringing XSS to Pentesting.pdf
|
3.2 MB
|
D1T2 - Don Bailey - GoodFUN - The GoodFET.pdf
|
991.1 KB
|
D1T2 - Guillaume Prigent - Really Open Source Information Gathering.pdf
|
5.6 MB
|
D1T2 - Jim Geovedi - Satellite Telephony Security.pdf
|
5.7 MB
|
D1T2 - Laurent Oudot - Extracting Senstive Data from Your iPhone.pdf
|
14.6 MB
|
D1T2 - Laurent Weber - All your Base Stations Are Belong To Us.pdf
|
320.0 KB
|
D1T2 - The Grugq - Smashing the Slack for Fun and Profit.pdf
|
14.7 MB
|
D1T2 - Thomas Caplin - Silverlight - A New Way to Surf .Net Holes.pdf
|
1.5 MB
|
D1T3 - Barry van Kampen - DIY Video Surveillance.pdf
|
915.7 KB
|
D1T3 - Itzhak Zuk Avraham - Popping Shell On Android Devices.pdf
|
1.3 MB
|
D1T3 - Jimmy Shah - Mobile App Moolah.pdf
|
1.7 MB
|
D1T3 - Mitja Kolsek - Remote Binary Planting.pdf
|
4.4 MB
|
D2 LABS - Daniel Mende and Jim Geovedi - Practical 3G-4G Attacks.pdf
|
2.3 MB
|
D2 SIGINT - Jim Manico - Ghost of XSS Past Present and Future.pdf
|
2.2 MB
|
D2 SIGINT - Keith Lee - iPhone Espionage.pdf
|
5.1 MB
|
D2 SIGINT - Martin Knobloch - Secure Your Software Using OWASP.pdf
|
1.6 MB
|
D2 SIGINT - Nur Muhammed Kamil - MyKotakPasir.pdf
|
1.2 MB
|
D2T1 - Andreas Weigenstein - SQL Injection with ABAP.pdf
|
1.3 MB
|
D2T1 - Andrew Gavin - Stealing Sensitive Data from Thousands of Systems.pdf
|
65.9 KB
|
D2T1 - Daniele Bianco and Adam Laurie - Credit Card Skimming and PIN Harvesting in an EMV World.pdf
|
3.6 MB
|
D2T1 - Hendrik Scholz - Air Travel Hacking.pdf
|
5.7 MB
|
D2T1 - Itzik Kotler - Let Me Stuxnet You.pdf
|
542.6 KB
|
D2T1 - Ivan Ristic - A Study of What Really Breaks SSL.pdf
|
3.2 MB
|
D2T1 - Marc Blanchou and Mathew Solnik - Blackbox Android.pdf
|
3.7 MB
|
D2T1 - Ravi B Kevin R and Nico G - Femtocells.pdf
|
6.2 MB
|
D2T1 - Stefan Esser - iPhone Exploitation - One ROPe to Bind Them All.pdf
|
8.6 MB
|
D2T2 - D. Mende & Enno Rey - Attacking 3G and 4G Networks.pdf
|
2.4 MB
|
D2T2 - Jim Geovedi and Raoul Chiesa - Hacking a Bird in the Sky.pdf
|
18.1 MB
|
D2T2 - KaiJern Lau - Malware Sandboxing the Xandora Way.pdf
|
16.2 MB
|
D2T2 - Paul Sebastian Ziegler - Stenographic AVI FIlesystems.pdf
|
3.1 MB
|
D2T2 - Philippe Langlois - Attacking the GPRS Roaming Exchange.pdf
|
13.5 MB
|
D2T2 - Rosario Valotta - Cookie Jacking.pdf
|
2.6 MB
|
D2T2 - Shreeraj Shah - Next Generation Web Attacks.pdf
|
752.9 KB
|
D2T2 - Travis Goodspeed - Remotely Exploiting Layer One.pdf
|
318.5 KB
|
D2T3 - Aditya K Sood - Spying on SpyEye.pdf
|
2.8 MB
|
D2T3 - Bert Hubert - DNSSEC - The Good The Bad and The Very Bad.pdf
|
407.0 KB
|
D2T3 - Guillaume Delugre - Reverse Engineering Broadcom NetExtreme Firmware.pdf
|
1.3 MB
|
D2T3 - Maarten Oosterink - Attacking Critical Infrastructure.pdf
|
2.5 MB
|
D2T3 - Travis Goodspeed - Building a Promiscious nRF24L01 Packet Sniffer.pdf
|
32.2 MB
|
HackWEEKDAY - Arzumy.pdf
|
250.1 KB
|
KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.pdf
|
1.6 MB
|
/.../D1T3 - Didier Stevens - Malicious PDF Analysis Lab/
|
HITB2011AMS - PDF Chapter.pdf
|
272.0 KB
|
HITB2011AMS - Slides.pdf
|
42.4 KB
|
HITB2011AMS - Solutions.txt
|
2.7 KB
|
/.../D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities/
|
D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities.zip
|
50.6 MB
|
/Videos/
|
Air Travel Hacking Understanding and (Ab) Using the .....mp4
|
43.1 MB
|
Alexander Kirk - Mobile Malware Analysis.eng.srt
|
102.7 KB
|
Alexander Kirk - Mobile Malware Analysis.mp4
|
40.5 MB
|
Alexander Polyakov, Dimitry Chastuhin - SAPocalypse Now, CrushingSAPs J2EE....mp4
|
46.4 MB
|
Andrea Barisani & Daniele Bianco - Chip & PIN is Definitely Broken....eng.srt
|
97.3 KB
|
Andrea Barisani & Daniele Bianco - Chip & PIN is Definitely Broken....mp4
|
44.0 MB
|
CLOSING KEYNOTE - Richard Thieme - Conspiracy Theories, Counter-Intelligence & K.....eng.srt
|
120.6 KB
|
CLOSING KEYNOTE - Richard Thieme - Conspiracy Theories, Counter-Intelligence & K.....mp4
|
50.9 MB
|
Jim Geovedi - Satellite Telephony Security - What Is and What Will Never Be.eng.srt
|
38.6 KB
|
Jim Geovedi - Satellite Telephony Security - What Is and What Will Never Be.mp4
|
24.2 MB
|
Jonathan Brossard - Post Memory Corruption Analysis & Exploitation.mp4
|
44.3 MB
|
KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.eng.srt
|
119.3 KB
|
KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.mp4
|
54.5 MB
|
KEYNOTE 2 - Jennifer Granick - Privacy, Secrecy, Freedom and Power.eng.srt
|
108.9 KB
|
KEYNOTE 2 - Jennifer Granick - Privacy, Secrecy, Freedom and Power.mp4
|
40.7 MB
|
Mahmud Ab Rahman - Reverse Engineering Android Malware.eng.srt
|
78.6 KB
|
Mahmud Ab Rahman - Reverse Engineering Android Malware.mp4
|
37.3 MB
|
Marc Blanchou & Mathew Solnik - BlackBox Android Breaking En.eng.srt
|
85.0 KB
|
Marc Blanchou & Mathew Solnik - BlackBox Android Breaking En.mp4
|
34.1 MB
|
Marco 'embyte' Balduzzi - Attacking the Privacy of Social Network Users.eng.srt
|
80.3 KB
|
Marco 'embyte' Balduzzi - Attacking the Privacy of Social Network Users.mp4
|
40.4 MB
|
Riley Hassell - Hacking Androids for Profit.eng.srt
|
98.0 KB
|
Riley Hassell - Hacking Androids for Profit.mp4
|
34.1 MB
|
Skype Software Vulnerabilities 0 Day Exploitation 2011.eng.mp4
|
48.3 MB
|
Skype Software Vulnerabilities 0 Day Exploitation 2011.eng.srt
|
56.3 KB
|
Stefan Esser - IPhone Exploitation. One ROPe to Bind Them All.eng.srt
|
90.0 KB
|
Stefan Esser - IPhone Exploitation. One ROPe to Bind Them All.mp4
|
34.1 MB
|
Track 1- Femtocells - Kevin Redon & Nico Golde - A Poisonous Needle in the...mp4
|
175.3 MB
|
/HITB 2012 - Amsterdam/
|
A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities.mp4
|
72.9 MB
|
A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities.srt
|
107.2 KB
|
Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV.mp4
|
76.9 MB
|
Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV.srt
|
95.9 KB
|
Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets.mp4
|
57.1 MB
|
Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets.srt
|
76.8 KB
|
Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond.mp4
|
57.8 MB
|
Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond.srt
|
82.9 KB
|
Arnauld Mascret - Whistling Over the Wire.mp4
|
62.8 MB
|
Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis.mp4
|
57.1 MB
|
Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis.srt
|
66.3 KB
|
Dr Marco Balduzzi - SatanCloud.mp4
|
56.5 MB
|
Dr Marco Balduzzi - SatanCloud.srt
|
68.0 KB
|
Dream Team - Part 1 - Corona for iOS 5.0.1.mp4
|
55.7 MB
|
Dream Team - Part 1 - Corona for iOS 5.0.1.srt
|
59.7 KB
|
Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing).mp4
|
58.9 MB
|
Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing).srt
|
68.7 KB
|
Georgia Weidman - Bypassing the Android Permission Model.mp4
|
66.8 MB
|
Georgia Weidman - Bypassing the Android Permission Model.srt
|
84.4 KB
|
Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE.mp4
|
67.3 MB
|
Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE.srt
|
68.7 KB
|
Ivo Pooters - Turning Android Inside Out.mp4
|
56.7 MB
|
Ivo Pooters - Turning Android Inside Out.srt
|
72.1 KB
|
Juan Pablo Echtegoyen - Attacking the SAP Solution Manager.mp4
|
57.1 MB
|
Juan Pablo Echtegoyen - Attacking the SAP Solution Manager.srt
|
64.2 KB
|
Kenneth White - A Deep Analysis of Amazon Web Services.mp4
|
49.6 MB
|
Kenneth White - A Deep Analysis of Amazon Web Services.srt
|
75.6 KB
|
KEYNOTE - Ms Jaya Baloo - Identity, Privacy and Security.mp4
|
72.8 MB
|
KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line.mp4
|
64.7 MB
|
KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line.srt
|
89.7 KB
|
KEYNOTE 2 - Bruce Schneier - Trust Security and Society.mp4
|
66.8 MB
|
KEYNOTE 2 - Bruce Schneier - Trust Security and Society.srt
|
72.4 KB
|
MuscleNerd - Evolution of iPhone Baseband and Unlocks.mp4
|
43.4 MB
|
MuscleNerd - Evolution of iPhone Baseband and Unlocks.srt
|
60.5 KB
|
Nicolas Gregoire - Attacking XML Preprocessing.mp4
|
65.6 MB
|
Nicolas Gregoire - Attacking XML Preprocessing.srt
|
62.3 KB
|
Rahul Sasi - CXML VXML IVR Pentesting for Auditors.mp4
|
53.3 MB
|
Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012.mp4
|
66.7 MB
|
Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012.srt
|
76.4 KB
|
Sebastien Renaud and Kevin Szkudlapski - WinRT.mp4
|
38.6 MB
|
Sebastien Renaud and Kevin Szkudlapski - WinRT.srt
|
44.2 KB
|
SPECIAL CLOSING - Rop Gonggrijp.mp4
|
38.4 MB
|
SPECIAL CLOSING - Rop Gonggrijp.srt
|
46.2 KB
|
Steven Seeley - Ghost in the Windows 7 Allocator.mp4
|
64.0 MB
|
Steven Seeley - Ghost in the Windows 7 Allocator.srt
|
81.6 KB
|
/HITB 2012 - Malaysia/
|
A. Barisani & D. Bianco - Practical Exploitation of Embedded Systems.mp4
|
68.7 MB
|
A. Barisani & D. Bianco - Practical Exploitation of Embedded Systems.srt
|
84.4 KB
|
Chris Evans - Element 1337 in the Periodic Table - Pwnium.mp4
|
69.6 MB
|
Chris Evans - Element 1337 in the Periodic Table - Pwnium.srt
|
75.4 KB
|
Chris Wysopal - Data Mining a Mountain of Vulnerabilities.mp4
|
50.2 MB
|
Chris Wysopal - Data Mining a Mountain of Vulnerabilities.srt
|
89.2 KB
|
Don Bailey - Hackers the Movie - A Retrospective.mp4
|
69.4 MB
|
Don Bailey - Hackers the Movie - A Retrospective.srt
|
79.5 KB
|
Emmanuel Gadaix - Something MEGA.mp4
|
70.8 MB
|
Emmanuel Gadaix - Something MEGA.srt
|
56.1 KB
|
Felix - FX - Lindner - Hacking Huawei VRP.mp4
|
62.4 MB
|
Felix - FX - Lindner - Hacking Huawei VRP.srt
|
51.8 KB
|
Fyodor Yarochkin - Messing Up the Kids Playground.mp4
|
111.6 MB
|
Fyodor Yarochkin - Messing Up the Kids Playground.srt
|
93.5 KB
|
Haroon Meer - You and Your Research.mp4
|
67.5 MB
|
Haroon Meer - You and Your Research.srt
|
72.7 KB
|
Jeremiah Grossman - Why Web Security is Fundamentally Broken.mp4
|
79.2 MB
|
Jeremiah Grossman - Why Web Security is Fundamentally Broken.srt
|
73.4 KB
|
John Captain Crunch Draper - A Historical Look at the Phreaking Scene.mp4
|
85.2 MB
|
John Captain Crunch Draper - A Historical Look at the Phreaking Scene.srt
|
75.5 KB
|
John Viega - Crypto for the Public Cloud.mp4
|
86.3 MB
|
John Viega - Crypto for the Public Cloud.srt
|
71.2 KB
|
Katie Moussouris - How to Get Along With Vendors Without Really Trying.mp4
|
70.8 MB
|
Katie Moussouris - How to Get Along With Vendors Without Really Trying.srt
|
92.1 KB
|
Lucas Adamski - Mozilla Apps, Firefox OS and You.mp4
|
57.0 MB
|
Lucas Adamski - Mozilla Apps, Firefox OS and You.srt
|
72.9 KB
|
Marc - Van Hauser - Heuse - IPv6 Insecurity Revolutions.mp4
|
118.6 MB
|
Marc - Van Hauser - Heuse - IPv6 Insecurity Revolutions.srt
|
92.0 KB
|
Mark Dowd & Tarjei Mandt - iOS 6 Security.mp4
|
76.8 MB
|
Mark Dowd & Tarjei Mandt - iOS 6 Security.srt
|
81.3 KB
|
Meder Kydyraliev - Defibrilating Web Security.mp4
|
72.2 MB
|
Meder Kydyraliev - Defibrilating Web Security.srt
|
80.0 KB
|
Mikko Hypponen - Behind Enemy Lines.mp4
|
101.2 MB
|
Mikko Hypponen - Behind Enemy Lines.srt
|
80.7 KB
|
Ollie Whitehouse - Finding the Weak Link in Binaries.mp4
|
43.9 MB
|
Ollie Whitehouse - Finding the Weak Link in Binaries.srt
|
59.5 KB
|
OPEN BOTTLE - - Security Industry Panel Discussion.mp4
|
192.5 MB
|
P. Langlois & E. Gadaix - Why Telcos Keep Getting Hacked.mp4
|
90.0 MB
|
P. Langlois & E. Gadaix - Why Telcos Keep Getting Hacked.srt
|
94.8 KB
|
PANEL DISCUSSION - iOS - OS X Security.mp4
|
96.5 MB
|
PANEL DISCUSSION - iOS - OS X Security.srt
|
75.8 KB
|
Paul Sebastian Ziegler - Hacking in The Far East.mp4
|
95.5 MB
|
Paul Sebastian Ziegler - Hacking in The Far East.srt
|
97.0 KB
|
Paul Vixie - Silo Busting in Information Security - The ISC SIE Approach.mp4
|
84.2 MB
|
Paul Vixie - Silo Busting in Information Security - The ISC SIE Approach.srt
|
85.3 KB
|
Petko D. Petkov - A Short History of the JavaScript Security Arsenal.mp4
|
82.7 MB
|
Petko D. Petkov - A Short History of the JavaScript Security Arsenal.srt
|
90.2 KB
|
Rodrigo Rubira Branco - Study of Malware Obfuscation Techniques.mp4
|
95.3 MB
|
Rodrigo Rubira Branco - Study of Malware Obfuscation Techniques.srt
|
89.4 KB
|
Saumil Shah - Innovative Approaches to Exploit Delivery.mp4
|
86.5 MB
|
Saumil Shah - Innovative Approaches to Exploit Delivery.srt
|
66.6 KB
|
Shreeraj Shah - XSS & CSRF Strike Back - Powered by HTML5.mp4
|
68.8 MB
|
Shreeraj Shah - XSS & CSRF Strike Back - Powered by HTML5.srt
|
80.6 KB
|
Stefano Zanero - Scalable Malware Analysis.mp4
|
103.9 MB
|
Stefano Zanero - Scalable Malware Analysis.srt
|
75.1 KB
|
The Grugq - OPSEC - Because Jail is for wuftpd.mp4
|
101.1 MB
|
The Grugq - OPSEC - Because Jail is for wuftpd.srt
|
91.7 KB
|
Wes Brown - Supercomputing, Malware and Correlation.mp4
|
86.5 MB
|
Wes Brown - Supercomputing, Malware and Correlation.srt
|
49.3 KB
|
/HITB 2013 - Amsterdam/
|
Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.mp4
|
33.9 MB
|
Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.srt
|
40.4 KB
|
Bob Lord - Rethinking the Front Lines.mp4
|
68.8 MB
|
Bob Lord - Rethinking the Front Lines.srt
|
98.8 KB
|
Chilik Tamir - iNalyzer - No More Blackbox iOS Analysis.mp4
|
72.4 MB
|
Coverage on RSI Telegiornale (Italian).mp4
|
2.5 MB
|
Dan Tentler - System Shock - The Shodan Computer Search Engine.mp4
|
55.4 MB
|
Daniel Mende - Paparazzi over IP.mp4
|
58.8 MB
|
Daniel Mende - Paparazzi over IP.srt
|
70.1 KB
|
E. Schwartz - Embracing the Uncertain'ty of Attacks with Big Data Analytics.mp4
|
75.0 MB
|
E. Schwartz - Embracing the Uncertain'ty of Attacks with Big Data Analytics.srt
|
95.1 KB
|
Evad3rs - Swiping Through Modern Security Features.mp4
|
74.5 MB
|
Evad3rs - Swiping Through Modern Security Features.srt
|
87.7 KB
|
Hugo Teso - Aircraft Hacking - Practical Aero Series.mp4
|
74.6 MB
|
Hugo Teso - Aircraft Hacking - Practical Aero Series.srt
|
97.5 KB
|
KEYNOTE Winn Schwartau - The History of the Future of InfoSec.mp4
|
73.8 MB
|
KEYNOTE Winn Schwartau - The History of the Future of InfoSec.srt
|
90.8 KB
|
Nicolas Seriot - Abusing Twitter s API and OAuth Implementation.mp4
|
39.8 MB
|
Nicolas Seriot - Abusing Twitter s API and OAuth Implementation.srt
|
52.4 KB
|
Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in MS Windows Kernel.mp4
|
39.3 MB
|
Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in MS Windows Kernel.srt
|
49.2 KB
|
Ofer Shezaf - The Infosec Risks of Charging Electric Cars.mp4
|
70.9 MB
|
Ofer Shezaf - The Infosec Risks of Charging Electric Cars.srt
|
77.8 KB
|
P Uhley and K Raman - Security Response in the Age of Mass Customized Attacks.mp4
|
65.8 MB
|
P Uhley and K Raman - Security Response in the Age of Mass Customized Attacks.srt
|
108.8 KB
|
Peter Geissler and Steven Ketelaar - How I Met Your Modem.mp4
|
66.0 MB
|
Peter Geissler and Steven Ketelaar - How I Met Your Modem.srt
|
71.3 KB
|
Petko D Petkov - Defeating the Intercepting Web Proxy.mp4
|
69.6 MB
|
Petko D Petkov - Defeating the Intercepting Web Proxy.srt
|
100.7 KB
|
Petukhov, Noseevich and Gamayunov - Breaking Certified Crypto in Banking Apps.mp4
|
54.4 MB
|
Petukhov, Noseevich and Gamayunov - Breaking Certified Crypto in Banking Apps.srt
|
52.6 KB
|
Philippe Langlois - LTE Pwnage - Hacking Core Network Elements.mp4
|
51.6 MB
|
Philippe Langlois - LTE Pwnage - Hacking Core Network Elements.srt
|
75.5 KB
|
Press Briefing - 11th April 2013.mp4
|
38.7 MB
|
Press Briefing - 11th April 2013.srt
|
18.8 KB
|
Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.mp4
|
44.3 MB
|
Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.srt
|
56.4 KB
|
S. Shekyan and A. Harutyunyan - Turning Your Surveillance Camera Against You.mp4
|
53.2 MB
|
S. Shekyan and A. Harutyunyan - Turning Your Surveillance Camera Against You.srt
|
56.3 KB
|
Sebastien Kaczmarek - Dreamboot - A UEFI Bootkit.mp4
|
60.4 MB
|
Sebastien Kaczmarek - Dreamboot - A UEFI Bootkit.srt
|
64.8 KB
|
Sergey Bratus and Julian Bangert - Page Fault Liberation Army.mp4
|
69.2 MB
|
Sergey Bratus and Julian Bangert - Page Fault Liberation Army.srt
|
90.4 KB
|
Tal Zeltzer - Analysis to Remote Root 0day in a SSL-VPN Appliance.mp4
|
37.5 MB
|
Tal Zeltzer - Analysis to Remote Root 0day in a SSL-VPN Appliance.srt
|
56.0 KB
|
Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.mp4
|
61.1 MB
|
Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.srt
|
85.8 KB
|
V. Vorontsov and A. Golovko - SSRF PWNs - New Techniques and Stories.mp4
|
53.0 MB
|
V. Vorontsov and A. Golovko - SSRF PWNs - New Techniques and Stories.srt
|
59.5 KB
|
Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.mp4
|
52.7 MB
|
Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.srt
|
59.4 KB
|
/presentations/
|
D1-LAB-Sniffing-the-Airwaves-with-RTL-SDR.pdf
|
6.2 MB
|
D1T1-AIS-Exposed-New-Vulnerabilities-and-Attacks.pdf
|
4.5 MB
|
D1T1-Compromise-as-a-Service-Our-PleAZURE.pdf
|
8.2 MB
|
D1T1-Escaping-IE11-Enhanced-Protected-Mode.pdf
|
2.3 MB
|
D1T1-Hacking-Your-Cable-TV-Network-Die-Hard-Style.pdf
|
39.2 MB
|
D1T1-The-NSA-Playset.pdf
|
10.4 MB
|
D1T1-Vulnerabilities-Exposed-at-the-Protocol-Level-in-TN3270-based-Applications.pdf
|
17.3 MB
|
D1T2-Bypassing-Endpoint-Security-for-Fun-and-Profit.pdf
|
28.2 MB
|
D1T2-More-Ways-to-Defeat-Secure-Boot.pdf
|
7.3 MB
|
D1T2-REboot-Bootkits-Revisited.pdf
|
924.3 KB
|
D1T2-State-of-the-Art-Exploring-the-New-Android-KitKat-Runtime.pdf
|
641.8 KB
|
D1T3-Exploiting-NoSQL-Like-Never-Before.pdf
|
2.5 MB
|
D1T3-XSSing-Your-Way-to-Shell.pdf
|
5.0 MB
|
D2-LAB-Attack-Surface-Intelligence-of-Source-Code.pdf
|
12.5 MB
|
D2T1-Alices-Adventures-in-Smart-Building-Land.pdf
|
7.2 MB
|
D2T1-Exploiting-Passbook-to-Fly-for-Free.pdf
|
19.8 MB
|
D2T1-G-Jacking-AppEngine-based-Applications.pdf
|
784.7 KB
|
D2T1-GRX-and-a-Spy-Agency.pdf
|
7.7 MB
|
D2T1-Why-Port-Scans-are-for-Pussies.pdf
|
2.4 MB
|
D2T2-Bitcoin-Forensics-Fact-or-Fiction.pdf
|
24.7 MB
|
D2T2-Breaking-Cloud-Isolation.pdf
|
1.1 MB
|
D2T2-Exploring-and-Exploiting-iOS-Web-Browsers.pdf
|
2.8 MB
|
D2T2-Shellcodes-for-ARM-Your-Pills-Dont-Work-on-Me-x86.pdf
|
4.3 MB
|
D2T2-The-InSecurity-of-Pull-Printing-Solutions.pdf
|
4.2 MB
|
D2T3-Exploit-Development-for-New-Platforms-Based-on-64-bits.pdf
|
74.1 KB
|
D2T3-Format-Reverser-of-Data-Objects.pdf
|
23.0 MB
|
D2T3-Using-Javascript-Security-Features-to-Kill-Itself.pdf
|
2.0 MB
|
/HITB 2014 - Malaysia/
|
CLOSING KEYNOTE - Richard Thieme.mp4
|
114.7 MB
|
CLOSING KEYNOTE - Richard Thieme.srt
|
81.4 KB
|
/HITB 2015 - Singapore/
|
Alfonso De Gregorio - Extortion and Cooperation in the Zero-day Market.mp4
|
53.5 MB
|
Alfonso De Gregorio - Extortion and Cooperation in the Zero-day Market.srt
|
40.5 KB
|
Barry Greene - Closing Keynote - Can Vendors Ever Provide Secure Solutions.mp4
|
86.5 MB
|
Chris Rouland - Understanding the IoT from DC to 10GhZ.mp4
|
93.9 MB
|
Chris Rouland - Understanding the IoT from DC to 10GhZ.srt
|
65.2 KB
|
Dawid Czagan - Hacking Cookies in Modern Web Applications and Browsers.mp4
|
67.2 MB
|
Dawid Czagan - Hacking Cookies in Modern Web Applications and Browsers.srt
|
49.2 KB
|
Dhillon ‘l33tdawg Kannabhiran - Welcome Note.mp4
|
4.7 MB
|
Dhillon ‘l33tdawg Kannabhiran - Welcome Note.srt
|
3.5 KB
|
Dmitry Chastuhin - SAP Afaria. One SMS To Hack A Company.mp4
|
65.1 MB
|
Dmitry Chastuhin - SAP Afaria. One SMS To Hack A Company.srt
|
25.1 KB
|
Dr. Marco Balduzzi & Dr. Vincenzo Ciancaglini - Cybercrime In The Deep Web.mp4
|
86.9 MB
|
Dr. Marco Balduzzi & Dr. Vincenzo Ciancaglini - Cybercrime In The Deep Web.srt
|
62.4 KB
|
Eleanor Saitta - Security Design and High Risk Users.mp4
|
37.7 MB
|
Eleanor Saitta - Security Design and High Risk Users.srt
|
50.4 KB
|
Fatih Ozavci - VoIP Wars - Destroying Jar Jar Lync.mp4
|
120.8 MB
|
Julien Lenoir - Implementing Your Own Generic Unpacker.mp4
|
67.0 MB
|
Katie Kleemola & Anthony Lai - Targeted attacks in Asia.mp4
|
74.7 MB
|
Katie Kleemola & Anthony Lai - Targeted attacks in Asia.srt
|
55.0 KB
|
Kristin Lovejoy - Keynote 1 - Security vs Privacy.mp4
|
94.8 MB
|
Kristin Lovejoy - Keynote 1 - Security vs Privacy.srt
|
78.9 KB
|
Lyon Yang - Advanced SOHO Router Exploitation.mp4
|
61.7 MB
|
Marc Heuse - Hiding in Complexity.mp4
|
76.0 MB
|
Marc Heuse - Hiding in Complexity.srt
|
59.9 KB
|
Marina Krotofil - Hacking Chemical Plants for Competition and Extortion.mp4
|
89.2 MB
|
Ofir Arkin - Keynote 2 - Security in A World Out of Our Control.mp4
|
65.6 MB
|
Ofir Arkin - Keynote 2 - Security in A World Out of Our Control.srt
|
3.2 KB
|
Valerie Thomas - All Your Door Belong To Me.mp4
|
73.9 MB
|
Valerie Thomas - All Your Door Belong To Me.srt
|
72.4 KB
|
Winn Schwartau - Keynote 3 - Analogue Network Security.mp4
|
85.4 MB
|
Winn Schwartau - Keynote 3 - Analogue Network Security.srt
|
57.7 KB
|
Xeno Kovah - ThunderStrike 2 - Sith Strike.mp4
|
75.9 MB
|
Xeno Kovah - ThunderStrike 2 - Sith Strike.srt
|
81.7 KB
|
/HITB 2016 - Amsterdam/
|
Adaptive Android Kernel Live Patching - Tim Xia and Yulong Zhang.mp4
|
86.8 MB
|
Adaptive Android Kernel Live Patching - Tim Xia and Yulong Zhang.srt
|
59.3 KB
|
Advanced Exploitation - Xen Hypervisor VM Escape - Shangcong Luan.mp4
|
72.6 MB
|
Advanced Exploitation - Xen Hypervisor VM Escape - Shangcong Luan.srt
|
36.6 KB
|
Attacking Next Generation Firewalls - Breaking PAN OS - Felix Wilhelm.mp4
|
125.5 MB
|
Attacking Next Generation Firewalls - Breaking PAN OS - Felix Wilhelm.srt
|
73.3 KB
|
Beyond FBI vs Apple - What s Next For The Crypto Wars - John Adams.mp4
|
47.9 MB
|
Beyond FBI vs Apple - What s Next For The Crypto Wars - John Adams.srt
|
43.5 KB
|
Breaking Naive ESSID WPA2 Key Generation Algorithms - Peter - Blasty - Geissler.mp4
|
97.2 MB
|
Breaking Naive ESSID WPA2 Key Generation Algorithms - Peter - Blasty - Geissler.srt
|
70.2 KB
|
Cache Side Channel Attacks - CPU Design As A Security Problem - Anders Fogh.mp4
|
96.9 MB
|
Cache Side Channel Attacks - CPU Design As A Security Problem - Anders Fogh.srt
|
71.1 KB
|
CANsee - An Automobile Intrusion Detection System - Jun Li.mp4
|
126.2 MB
|
CANsee - An Automobile Intrusion Detection System - Jun Li.srt
|
63.0 KB
|
CommSec - Anatomy Of An APT Attack - Paul Mason.mp4
|
54.4 MB
|
CommSec - Anatomy Of An APT Attack - Paul Mason.srt
|
33.1 KB
|
CommSec - Applying Regulatory Data to IoT RF Reverse Engineering - Marc Newlin.mp4
|
64.5 MB
|
CommSec - Applying Regulatory Data to IoT RF Reverse Engineering - Marc Newlin.srt
|
77.5 KB
|
CommSec - CLOSING COMMENTS - Martin Knobloch.mp4
|
2.9 MB
|
CommSec - CLOSING COMMENTS - Martin Knobloch.srt
|
2.6 KB
|
CommSec - don't Feed The Hippos - Martin Knobloch.mp4
|
31.2 MB
|
CommSec - don't Feed The Hippos - Martin Knobloch.srt
|
31.3 KB
|
CommSec - Exploiting GLIBC - Hacking Everything - Gal De Leon and Nadav Markus.mp4
|
83.6 MB
|
CommSec - Exploiting GLIBC - Hacking Everything - Gal De Leon and Nadav Markus.srt
|
62.9 KB
|
CommSec - Facebook Presents Capture The Flag - Paul Marinescu.mp4
|
31.0 MB
|
CommSec - Facebook Presents Capture The Flag - Paul Marinescu.srt
|
20.2 KB
|
CommSec - Hack In The Class - Barry - Fish - van Kampen.mp4
|
30.7 MB
|
CommSec - Hack In The Class - Barry - Fish - van Kampen.srt
|
31.8 KB
|
CommSec - Inspeckage - Android Package Inspector - Antonio Martins.mp4
|
53.9 MB
|
CommSec - Inspeckage - Android Package Inspector - Antonio Martins.srt
|
18.1 KB
|
CommSec - Park This Yet Another Parking Meter Talk - Paul Moreno.mp4
|
38.9 MB
|
CommSec - Park This Yet Another Parking Meter Talk - Paul Moreno.srt
|
45.4 KB
|
CommSec - Pentesting Chatops - Melanie Rieback.mp4
|
66.9 MB
|
CommSec - Pentesting Chatops - Melanie Rieback.srt
|
50.5 KB
|
CommSec - Unformation In The Era Of Hyperconnectivity - Elisabeth De Leeuw.mp4
|
46.2 MB
|
CommSec - Unformation In The Era Of Hyperconnectivity - Elisabeth De Leeuw.srt
|
23.4 KB
|
CommSec - Where Malware Meets Murphy - Mattijs Van Ommeren.mp4
|
45.9 MB
|
CommSec - Where Malware Meets Murphy - Mattijs Van Ommeren.srt
|
24.6 KB
|
CommSec - Women In Cyber Security Woman Of The Year 2016 Award Ceremony.mp4
|
28.5 MB
|
CommSec - Women In Cyber Security Woman Of The Year 2016 Award Ceremony.srt
|
11.1 KB
|
CSP Oddities - Michele Spagnuolo and Lukas Weichselbaum.mp4
|
114.5 MB
|
CSP Oddities - Michele Spagnuolo and Lukas Weichselbaum.srt
|
79.4 KB
|
Escape From The Docker KVM QEMU Machine - Shengping Wang and Xu Liu.mp4
|
61.2 MB
|
Escape From The Docker KVM QEMU Machine - Shengping Wang and Xu Liu.srt
|
36.7 KB
|
Exploit Kits - Hunting The Hunters - Nick Biasini.mp4
|
87.1 MB
|
Exploit Kits - Hunting The Hunters - Nick Biasini.srt
|
74.9 KB
|
Forcing A Targeted LTE Cellphone Into An Eavesdropping Network - Lin Huang.mp4
|
76.3 MB
|
Forcing A Targeted LTE Cellphone Into An Eavesdropping Network - Lin Huang.srt
|
33.6 KB
|
Forging a Wireless Time Signal to Attack NTP Servers - Y. Zheng & H. Shan.mp4
|
90.6 MB
|
Forging a Wireless Time Signal to Attack NTP Servers - Y. Zheng & H. Shan.srt
|
36.0 KB
|
Go Speed Tracer Guided Fuzzing - Richard Johnson.mp4
|
136.6 MB
|
Go Speed Tracer Guided Fuzzing - Richard Johnson.srt
|
94.6 KB
|
Hardsploit Project - Yann Allain and Julien Moinard.mp4
|
116.2 MB
|
Hardsploit Project - Yann Allain and Julien Moinard.srt
|
54.5 KB
|
Hardware Side Channels in Virtualized Environments - Sophia D Antoine.mp4
|
91.4 MB
|
Hardware Side Channels in Virtualized Environments - Sophia D Antoine.srt
|
60.3 KB
|
In Plain Sight - The Perfect Exfiltration Technique - Itzik Kotler and Amit Klein.mp4
|
129.2 MB
|
In Plain Sight - The Perfect Exfiltration Technique - Itzik Kotler and Amit Klein.srt
|
66.8 KB
|
IRON HID - Create Your Own Bad USB Device - Seunghun Han.mp4
|
71.2 MB
|
IRON HID - Create Your Own Bad USB Device - Seunghun Han.srt
|
35.6 KB
|
Kernel Exploit Hunting And Mitigation - Broderick Aquilino and Wayne Low.mp4
|
107.2 MB
|
Kernel Exploit Hunting And Mitigation - Broderick Aquilino and Wayne Low.srt
|
54.5 KB
|
New Methods For Exploiting ORM Injections - Mikhail Egorov and Sergey Soldatov.mp4
|
110.1 MB
|
New Methods For Exploiting ORM Injections - Mikhail Egorov and Sergey Soldatov.srt
|
47.7 KB
|
Patricia M Zorko.mp4
|
27.2 MB
|
Patricia M Zorko.srt
|
14.9 KB
|
Perf - From Profiling To Kernel Exploiting - Wish Wu.mp4
|
75.7 MB
|
Perf - From Profiling To Kernel Exploiting - Wish Wu.srt
|
28.4 KB
|
Sandjacking - Profiting From iOS Malware - Chilik Tamir.mp4
|
105.9 MB
|
Sandjacking - Profiting From iOS Malware - Chilik Tamir.srt
|
66.0 KB
|
TeLeScope - Peering Into The Depths Of TLS Traffic In Real Time - Radu Caragea.mp4
|
92.7 MB
|
TeLeScope - Peering Into The Depths Of TLS Traffic In Real Time - Radu Caragea.srt
|
53.5 KB
|
The Future Has Arrived And It s Effin - Hilarious - Adam Laurie.mp4
|
110.8 MB
|
The Future Has Arrived And It s Effin - Hilarious - Adam Laurie.srt
|
60.2 KB
|
Using The Observer Effect And Cyber Feng Shui - Jacob Torrey.mp4
|
109.8 MB
|
Using The Observer Effect And Cyber Feng Shui - Jacob Torrey.srt
|
79.1 KB
|
Virtualization System Vulnerability Discovery Framework - Tang Qinghao.mp4
|
77.3 MB
|
Virtualization System Vulnerability Discovery Framework - Tang Qinghao.srt
|
46.2 KB
|
/HITB 2016 - Singapore/
|
(Ab)using Smart Cities - Matteo Beccaro & Matteo Collura.mp4
|
73.4 MB
|
(Ab)using Smart Cities - Matteo Beccaro & Matteo Collura.srt
|
39.8 KB
|
Breaking Exploits - Shlomi Oberman & Ron Shina.mp4
|
95.4 MB
|
Breaking Exploits - Shlomi Oberman & Ron Shina.srt
|
58.3 KB
|
CLOSING KEYNOTE - Hacking in Song - Fabienne Serriere.mp4
|
61.7 MB
|
CLOSING KEYNOTE - Hacking in Song - Fabienne Serriere.srt
|
27.3 KB
|
CommSec - Copy-paste Vulnerabilities - Vanessa Henderson.mp4
|
37.6 MB
|
CommSec - Data Driven Software Security - Sweety Chauhan.mp4
|
125.3 MB
|
CommSec - Fake President Fraud Defrauded - Florian Lukavsky.mp4
|
44.5 MB
|
CommSec - Forensic Analysis of Android Banking Apps - Rajchada Chanajitt.mp4
|
45.0 MB
|
CommSec - IoT Honeypots - Tan Kean Siong.mp4
|
62.8 MB
|
CommSec - Local Privilege Escalation in 2016 - Paul Craig.mp4
|
44.5 MB
|
CommSec - Reverse Engineering Swift Applications - Michael Gianarakis.mp4
|
53.4 MB
|
CommSec - Vulnerabilities and Ethics - Alfonso De Gregorio.mp4
|
55.5 MB
|
CommSec Track D1- Halcyon - An IDE for Faster NSE Development - Sanoop Thomas.mp4
|
44.2 MB
|
Conference - A Next Generation Assembler Framework - Nguyen Anh Quynh.mp4
|
114.9 MB
|
Conference - Attacking NVidia s Tegra Platform - Peter Pi.mp4
|
61.9 MB
|
Conference - Attacking NVidia s Tegra Platform - Peter Pi.srt
|
24.1 KB
|
Conference - Attacking Software Tokens - Bernhard Mueller.mp4
|
69.7 MB
|
Conference - Stumping The Mobile Chipset - A. Donenfeld & Y. Mordekhay.mp4
|
85.0 MB
|
Conference - Stumping The Mobile Chipset - A. Donenfeld & Y. Mordekhay.srt
|
51.4 KB
|
Conference - The Apple Sandbox - Deeper Into The Quagmire - Jonathan Levin.mp4
|
127.3 MB
|
Conference - The Apple Sandbox - Deeper Into The Quagmire - Jonathan Levin.srt
|
86.8 KB
|
Conference - Trust No One - O. Kochetova & A. Osipov.mp4
|
72.9 MB
|
Fuzzing The Windows Kernel - Koh Yong Chuan.mp4
|
56.2 MB
|
iOS 10 Kernel Heap Revisited - Stefan Esser.mp4
|
136.2 MB
|
iOS 10 Kernel Heap Revisited - Stefan Esser.srt
|
78.7 KB
|
KEYNOTE 1 - I Fight For The Users The Prequel - Erin Jacobs.mp4
|
61.7 MB
|
KEYNOTE 1 - I Fight For The Users The Prequel - Erin Jacobs.srt
|
52.0 KB
|
KEYNOTE 2 - Hacking The Pentagon - Katie Moussouris.mp4
|
93.5 MB
|
KEYNOTE 2 - Hacking The Pentagon - Katie Moussouris.srt
|
65.8 KB
|
Look Mom I don't Use Shellcode - Moritz Jodeit.mp4
|
83.3 MB
|
Look Mom I don't Use Shellcode - Moritz Jodeit.srt
|
61.0 KB
|
Replicating a RSA SecurID Token Instance (RSA SecurID 2.0.4).mp4
|
401.1 KB
|
Replicating a VASCO DIGIPASS Token Instance (DIGIPASS DEMO for Android 4.10.0).mp4
|
264.7 KB
|
/HITB 2017 - Amsterdam/
|
A New RISC - Don Bailey.mp4
|
78.3 MB
|
A New RISC - Don Bailey.srt
|
115.2 KB
|
Bootstrapping Systems With Open Source Firmware - Trammell Hudson.mp4
|
72.0 MB
|
Bootstrapping Systems With Open Source Firmware - Trammell Hudson.srt
|
71.4 KB
|
Bypassing Memory Mitigations Using Data Only Exploitation Techniques - Bing Sun.mp4
|
114.0 MB
|
Bypassing Memory Mitigations Using Data Only Exploitation Techniques - Bing Sun.srt
|
89.7 KB
|
Can't Touch This - Cloning Any Android HCE Contactless Card - Slawomir Jasek.mp4
|
113.4 MB
|
Can't Touch This - Cloning Any Android HCE Contactless Card - Slawomir Jasek.srt
|
104.2 KB
|
Chasing Cars - Keyless Entry System Attacks - Yingtao Zeng, Qing Yang and Jun Li.mp4
|
96.1 MB
|
Chasing Cars - Keyless Entry System Attacks - Yingtao Zeng, Qing Yang and Jun Li.srt
|
97.2 KB
|
Closing Ceremony - HITB Core Team.mp4
|
30.3 MB
|
Closing Ceremony - HITB Core Team.srt
|
36.5 KB
|
CLOSING KEYNOTE - The ECMA And The Chakra - Natalie Silvanovich.mp4
|
71.8 MB
|
CLOSING KEYNOTE - The ECMA And The Chakra - Natalie Silvanovich.srt
|
89.1 KB
|
COMMSEC A Passive Listing Ransomware Detector - Paulus Meessen and Don Mulders.mp4
|
55.0 MB
|
COMMSEC A Passive Listing Ransomware Detector - Paulus Meessen and Don Mulders.srt
|
54.4 KB
|
COMMSEC Breaking Apple's iCloud Keychain - Vladimir Katalov.mp4
|
76.4 MB
|
COMMSEC Breaking Apple's iCloud Keychain - Vladimir Katalov.srt
|
83.0 KB
|
COMMSEC Disarming EMET 5 52 - Niels Warnars.mp4
|
37.2 MB
|
COMMSEC Exploiting Windows Automatic Wireless Association - George Chatzisofroniou.mp4
|
62.7 MB
|
COMMSEC Exploiting Windows Automatic Wireless Association - George Chatzisofroniou.srt
|
62.4 KB
|
COMMSEC Fault Injection Attacks On Secure Boot - Niek Timmers and Albert Spruyt.mp4
|
47.9 MB
|
COMMSEC Fault Injection Attacks On Secure Boot - Niek Timmers and Albert Spruyt.srt
|
56.3 KB
|
COMMSEC Intel DCI Secrets - Maxim Goryachy and Mark Ermolov.mp4
|
41.2 MB
|
COMMSEC Low Cost Open Source Spectrum Monitoring - Dominic Spill.mp4
|
52.1 MB
|
COMMSEC Low Cost Open Source Spectrum Monitoring - Dominic Spill.srt
|
68.7 KB
|
COMMSEC Meet And Greet With The MacOs Malware Class Of 2016 - Patrick Wardle.mp4
|
57.8 MB
|
COMMSEC Meet And Greet With The MacOs Malware Class Of 2016 - Patrick Wardle.srt
|
69.8 KB
|
COMMSEC Pwning ARM Debug Components - Muhammad Abdul Wahab (2).mp4
|
45.0 MB
|
COMMSEC Pwning ARM Debug Components - Muhammad Abdul Wahab (2).srt
|
71.2 KB
|
COMMSEC Pwning Banks - How The Playground Evolved Over The Years - Miika Turkia.mp4
|
79.7 MB
|
COMMSEC Pwning Banks - How The Playground Evolved Over The Years - Miika Turkia.srt
|
69.1 KB
|
COMMSEC So You Want To Hack Radios Matt Knight and Marc Newlin.mp4
|
102.0 MB
|
COMMSEC So You Want To Hack Radios Matt Knight and Marc Newlin.srt
|
190.9 KB
|
COMMSEC Unauthorized Erlang - A Demonstration - Don Bailey (2).mp4
|
41.0 MB
|
COMMSEC Unauthorized Erlang - A Demonstration - Don Bailey (2).srt
|
79.0 KB
|
Drammer - The Making Of - Victor van der Veen.mp4
|
99.9 MB
|
Drammer - The Making Of - Victor van der Veen.srt
|
112.4 KB
|
Everybody Wants SOME - Advance Same Origin Method Execution - Ben Hayak.srt
|
147.8 KB
|
Hacking Customer Information Control System - Ayoub Elaassal.mp4
|
90.1 MB
|
Hacking Customer Information Control System - Ayoub Elaassal.srt
|
124.6 KB
|
Hacking Medical Devices And Healthcare Infrastructure - Anirudh Duggal.mp4
|
79.1 MB
|
Harnessing Intel Processor Trace On Windows For Vuln Discovery - Richard Johnson.mp4
|
91.5 MB
|
Harnessing Intel Processor Trace On Windows For Vuln Discovery - Richard Johnson.srt
|
118.2 KB
|
Hunting For Vulnerabilities In Signal - Markus Vervier.mp4
|
71.0 MB
|
Hunting For Vulnerabilities In Signal - Markus Vervier.srt
|
71.2 KB
|
I Got 99 Trends And A # Is All Of Them Steven Seeley and Roberto Suggi Liverani.mp4
|
135.2 MB
|
I Got 99 Trends And A # Is All Of Them Steven Seeley and Roberto Suggi Liverani.srt
|
147.7 KB
|
In Depth Analysis Of Multicast DNS And DNS Service Discovery - Antonios Atlasis.mp4
|
82.8 MB
|
KEYNOTE 1 - Redefining Defense - Saumil Shah.mp4
|
69.4 MB
|
KEYNOTE 1 - Redefining Defense - Saumil Shah.srt
|
83.2 KB
|
KEYNOTE 2 - All Fall Down - Interdependencies In The Cloud - Window Snyder.mp4
|
19.6 MB
|
KEYNOTE 2 - All Fall Down - Interdependencies In The Cloud - Window Snyder.srt
|
30.6 KB
|
Most Impressive - A Guide To Key Impressioning Attacks - Jos Weyers.mp4
|
84.7 MB
|
Most Impressive - A Guide To Key Impressioning Attacks - Jos Weyers.srt
|
89.1 KB
|
Oversight - Exposing Spies On MacOS - Patrick Wardle.mp4
|
110.7 MB
|
Oversight - Exposing Spies On MacOS - Patrick Wardle.srt
|
133.3 KB
|
Shadow Box - The Practical And Omnipotent Sandbox - Seunghun Han.mp4
|
70.1 MB
|
Shadow Box - The Practical And Omnipotent Sandbox - Seunghun Han.srt
|
70.1 KB
|
Side Channel Attacks Against iOS Crypto Libraries And More - Najwa Aaraj.mp4
|
63.0 MB
|
The Best Laid Schemes - Attacking URL Schemes - Yu Hong.mp4
|
76.4 MB
|
The Secret Of Chakracore - 10 Ways To Go Beyond The Edge - Linan Hao and Long Liu.mp4
|
89.6 MB
|
Vulnerabilities In Android Password Managers - Huber, Arzt & Rasthofer.mp4
|
71.3 MB
|
Vulnerabilities In Android Password Managers - Huber, Arzt & Rasthofer.srt
|
85.5 KB
|
We Broke All CSPs And You Won't Believe What Happened - Spagnuolo & Weichselbaum.mp4
|
98.0 MB
|
We Broke All CSPs And You Won't Believe What Happened - Spagnuolo & Weichselbaum.srt
|
110.4 KB
|
/HITB 2017 - Singapore/
|
A New Era Of SSRF - Exploiting Url Parsers - Orange Tsai.mp4
|
84.2 MB
|
A New Era Of SSRF - Exploiting Url Parsers - Orange Tsai.srt
|
84.3 KB
|
A Year In The Red - Dominic Chell & Vincent Yiu.mp4
|
97.6 MB
|
A Year In The Red - Dominic Chell & Vincent Yiu.srt
|
138.5 KB
|
CLOSING KEYNOTE - A Spin Around The Block - 13 Years Of Infosec Challenges - Kelly Lum.mp4
|
83.0 MB
|
CLOSING KEYNOTE - A Spin Around The Block - 13 Years Of Infosec Challenges - Kelly Lum.srt
|
107.6 KB
|
CommSec - 2FAssassin - Bypass 2FA, Stealing Private Keys, And More - Maxwell Koh.mp4
|
58.0 MB
|
CommSec - 2FAssassin - Bypass 2FA, Stealing Private Keys, And More - Maxwell Koh.srt
|
65.6 KB
|
CommSec - 200 Vulnerabilities In Android Phones - B. Guangdong & Z. Qing.mp4
|
56.2 MB
|
CommSec - 200 Vulnerabilities In Android Phones - B. Guangdong & Z. Qing.srt
|
46.3 KB
|
CommSec - Automotive Security Assessment Techniques And Tools - Keisuke Hirata.mp4
|
49.8 MB
|
CommSec - Automotive Security Assessment Techniques And Tools - Keisuke Hirata.srt
|
52.4 KB
|
CommSec - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger.mp4
|
94.8 MB
|
CommSec - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger.srt
|
77.3 KB
|
CommSec - Facebook - The Deep & Dark Web For Threat Actors In Asia - Fadli Sidek.mp4
|
73.1 MB
|
CommSec - Facebook - The Deep & Dark Web For Threat Actors In Asia - Fadli Sidek.srt
|
91.9 KB
|
CommSec - Growing Network Security Specialists For Our Enterprise - Xinhua Cai.mp4
|
41.2 MB
|
CommSec - Growing Network Security Specialists For Our Enterprise - Xinhua Cai.srt
|
48.2 KB
|
CommSec - Hacking Robots Before Skynet - Lucas Apa and Cesar Cerrudo.mp4
|
139.3 MB
|
CommSec - Hadoop Safari - Hunting For Vulnerabilities - T. Debize and M. Braik.mp4
|
105.3 MB
|
CommSec - Hadoop Safari - Hunting For Vulnerabilities - T. Debize and M. Braik.srt
|
113.8 KB
|
CommSec - Insecurity In 2017 - 0 Days Are The Least Of Our Problems - Nick Biasini.mp4
|
118.1 MB
|
CommSec - Insecurity In 2017 - 0 Days Are The Least Of Our Problems - Nick Biasini.srt
|
146.1 KB
|
CommSec - Intelligence And Counterintelligence Techniques - J. Hesse & K. Ranjan.mp4
|
105.0 MB
|
CommSec - Intelligence And Counterintelligence Techniques - J. Hesse & K. Ranjan.srt
|
127.2 KB
|
CommSec - Its Friday Evening Professor Moriarty - Nicolas Collery.mp4
|
70.8 MB
|
CommSec - Its Friday Evening Professor Moriarty - Nicolas Collery.srt
|
63.4 KB
|
CommSec - Searching For A Needle In A Remote Haystack - Vitaly Kamluk & Wayne Lee.mp4
|
65.7 MB
|
CommSec - Searching For A Needle In A Remote Haystack - Vitaly Kamluk & Wayne Lee.srt
|
80.7 KB
|
CommSec - Stealing PLC Intellectual Property - A Red Teaming Story - Matteo Beccaro.mp4
|
51.3 MB
|
CommSec - Stealing PLC Intellectual Property - A Red Teaming Story - Matteo Beccaro.srt
|
71.7 KB
|
CommSec - The Original Elevat0r - History Of A Private Jailbreak - Stefan Esser.mp4
|
93.9 MB
|
CommSec - The Original Elevat0r - History Of A Private Jailbreak - Stefan Esser.srt
|
114.1 KB
|
CommSec - Threat Hunting 101 - Become The Hunter - Hamza Beghal.mp4
|
60.4 MB
|
CommSec - Threat Hunting 101 - Become The Hunter - Hamza Beghal.srt
|
95.9 KB
|
CommSec - Unstructured Data Is The New Gold - ML - NLP Is The New Shiz - J. Geovedi.mp4
|
81.8 MB
|
CommSec - Unstructured Data Is The New Gold - ML - NLP Is The New Shiz - J. Geovedi.srt
|
92.1 KB
|
Finding Vulns And Malware In Open Source Code At Scale - Mark Curphey.mp4
|
108.9 MB
|
Finding Vulns And Malware In Open Source Code At Scale - Mark Curphey.srt
|
180.4 KB
|
Get To The Money - Hacking PoS And PoP Systems - D. Chastuhin & V. Egorov.mp4
|
103.6 MB
|
Get To The Money - Hacking PoS And PoP Systems - D. Chastuhin & V. Egorov.srt
|
103.3 KB
|
How We Broke Intel Amt - A. Ermolov, D. Evdokimov & M. Malyutin.mp4
|
70.1 MB
|
How We Broke Intel Amt - A. Ermolov, D. Evdokimov & M. Malyutin.srt
|
74.2 KB
|
Neuralfuzz - Neural Networks For Fuzzing Web Apps - Ivan Novikov.mp4
|
110.7 MB
|
Neuralfuzz - Neural Networks For Fuzzing Web Apps - Ivan Novikov.srt
|
131.3 KB
|
QEMU Attack Surface And Security Internals - Qiang Li & ZhiBin Hu.mp4
|
64.6 MB
|
Radio Exploitation 101 - Matt Knight & Marc Newlin.mp4
|
103.0 MB
|
Radio Exploitation 101 - Matt Knight & Marc Newlin.srt
|
153.8 KB
|
Rootten Apples - Vulnerability Heaven In The iOS Sandbox - Adam Donenfeld.mp4
|
89.8 MB
|
Rootten Apples - Vulnerability Heaven In The iOS Sandbox - Adam Donenfeld.srt
|
109.1 KB
|
Smart Cities Panel Discussion with M. Curphey, C. Cerrudo, E. Schwartz & M. Beccaro.mp4
|
125.1 MB
|
Smart Cities Panel Discussion with M. Curphey, C. Cerrudo, E. Schwartz & M. Beccaro.srt
|
188.8 KB
|
Spy Vs Spy - A Modern Study Of Microphone Bugs - V. Valeros & S. Garcia.mp4
|
121.8 MB
|
Spy Vs Spy - A Modern Study Of Microphone Bugs - V. Valeros & S. Garcia.srt
|
144.7 KB
|
The State Of Cyber - George Kurtz.mp4
|
86.7 MB
|
The State Of Cyber - George Kurtz.srt
|
146.0 KB
|
WELCOME ADDRESS - IoT - A Security Hole Without A Patch - Earl Carter.mp4
|
27.6 MB
|
WELCOME ADDRESS - IoT - A Security Hole Without A Patch - Earl Carter.srt
|
42.7 KB
|
XFLTReaT - A New Dimension In Tunnelling - Balazs Bucsay.mp4
|
120.4 MB
|
XFLTReaT - A New Dimension In Tunnelling - Balazs Bucsay.srt
|
133.8 KB
|
/HITB 2018 - Amsterdam/
|
A New Fuzzing Method for Android - Zhang Qing & Bai Guangdong.eng.srt
|
31.0 KB
|
A New Fuzzing Method for Android - Zhang Qing & Bai Guangdong.mp4
|
32.4 MB
|
Abusing The Travel Industry - V. Kropotov, F. Yarochkin, M. Fuentes & L. Gu.eng.srt
|
90.9 KB
|
Abusing The Travel Industry - V. Kropotov, F. Yarochkin, M. Fuentes & L. Gu.mp4
|
94.5 MB
|
Applying Machine Learning to User Behavior Anomaly Analysis - Eugene Neyolov.eng.srt
|
126.0 KB
|
Applying Machine Learning to User Behavior Anomaly Analysis - Eugene Neyolov.mp4
|
115.5 MB
|
Attacking Microsofts .NET Framework Through CLR - Yu Hong & Shikang Xing.eng.srt
|
83.6 KB
|
Attacking Microsofts .NET Framework Through CLR - Yu Hong & Shikang Xing.mp4
|
111.5 MB
|
Backdooring & Remotely Controlling Cars - Sheila A. Berta & Claudio Carraciolo.eng.srt
|
82.0 KB
|
Backdooring & Remotely Controlling Cars - Sheila A. Berta & Claudio Carraciolo.mp4
|
73.9 MB
|
Brida - When Burp Suite meets Frida - Federico Dotta & Piergiovanni Cipolloni.mp4
|
113.7 MB
|
CLOSING KEYNOTE - Security is What We Make of It - Blockchain and Beyond - Amber Baldet.eng.srt
|
163.3 KB
|
CLOSING KEYNOTE - Security is What We Make of It - Blockchain and Beyond - Amber Baldet.mp4
|
79.8 MB
|
CommSec - A Deep Dive Into Malicious Documents - Josh Stroschein.eng.srt
|
82.1 KB
|
CommSec - A Deep Dive Into Malicious Documents - Josh Stroschein.mp4
|
52.4 MB
|
CommSec - An Isolated Data Center Security Policy Model Using SmartNICs - Ofir Arkin.eng.srt
|
136.3 KB
|
CommSec - An Isolated Data Center Security Policy Model Using SmartNICs - Ofir Arkin.mp4
|
112.0 MB
|
CommSec - Attacking IoT Speakers - Stephen Hilt.eng.srt
|
77.8 KB
|
CommSec - Attacking IoT Speakers - Stephen Hilt.mp4
|
55.5 MB
|
CommSec - Automatic Generation of ROP Chains - Ricardo. J. Rodríguez & Daniel Uroz.eng.srt
|
77.8 KB
|
CommSec - Automatic Generation of ROP Chains - Ricardo. J. Rodríguez & Daniel Uroz.mp4
|
72.5 MB
|
CommSec - Behaviors and Patterns of Rogue Hosting Providers - D. Mahjoub & S. Brown.eng.srt
|
112.2 KB
|
CommSec - Behaviors and Patterns of Rogue Hosting Providers - D. Mahjoub & S. Brown.mp4
|
69.1 MB
|
CommSec - Faster, Wider, Greater - Modern Pentest Tricks - Thomas Debize.eng.srt
|
78.7 KB
|
CommSec - Faster, Wider, Greater - Modern Pentest Tricks - Thomas Debize.mp4
|
66.9 MB
|
CommSec - Hacking a Hospital for Fun and Profit - Asaf Cohen & Ofir Kamil.eng.srt
|
70.7 KB
|
CommSec - Hacking a Hospital for Fun and Profit - Asaf Cohen & Ofir Kamil.mp4
|
56.4 MB
|
CommSec - Hiding Tasks via Hardware Task Switching - Kyeong Joo Jung.eng.srt
|
48.4 KB
|
CommSec - Hiding Tasks via Hardware Task Switching - Kyeong Joo Jung.mp4
|
51.9 MB
|
CommSec - How to Find and Exploit Bugs in IoT Devices - Kelvin Wong.eng.srt
|
51.2 KB
|
CommSec - How to Find and Exploit Bugs in IoT Devices - Kelvin Wong.mp4
|
56.3 MB
|
CommSec - Keynterceptor - Press Any Key to Continue - Niels van Dijkhuizen.eng.srt
|
53.6 KB
|
CommSec - Keynterceptor - Press Any Key to Continue - Niels van Dijkhuizen.mp4
|
51.9 MB
|
CommSec - ProdSec - A Technical Approach - Jeremy Brown.eng.srt
|
107.8 KB
|
CommSec - ProdSec - A Technical Approach - Jeremy Brown.mp4
|
61.6 MB
|
CommSec - PyREBox - Making Dynamic Instrumentation Great Again - X. Ugarte-Pedrero.mp4
|
113.8 MB
|
CommSec - Smart Contract (In)Security - Ben Schmidt.eng.srt
|
59.9 KB
|
CommSec - Smart Contract (In)Security - Ben Schmidt.mp4
|
52.5 MB
|
CommSec - Steganography Ante Portas - Steffen Wendzel.eng.srt
|
71.2 KB
|
CommSec - Steganography Ante Portas - Steffen Wendzel.mp4
|
68.4 MB
|
CommSec - The Life & Death of Kernel Object Abuse - Salf ElSherei & Ian Kronquist.eng.srt
|
112.4 KB
|
CommSec - The Life & Death of Kernel Object Abuse - Salf ElSherei & Ian Kronquist.mp4
|
88.7 MB
|
Covert Data Exfiltration Channel - Hongjian Cao, Kunzhe Chai & Jun Li.eng.srt
|
53.7 KB
|
Covert Data Exfiltration Channel - Hongjian Cao, Kunzhe Chai & Jun Li.mp4
|
59.2 MB
|
Defense-in-Depth Techniques for Modern Web Apps - M. Spagnuolo & L. Weichselbaum.eng.srt
|
114.3 KB
|
Defense-in-Depth Techniques for Modern Web Apps - M. Spagnuolo & L. Weichselbaum.mp4
|
86.3 MB
|
Establishing Covert Channels By Abusing GSM AT Commands - A. Munoz & J. C. Saez.eng.srt
|
103.9 KB
|
Establishing Covert Channels By Abusing GSM AT Commands - A. Munoz & J. C. Saez.mp4
|
97.8 MB
|
Expanding Your WMI Lateral Movement Arsenal - Philip Tsukerman.eng.srt
|
89.6 KB
|
Expanding Your WMI Lateral Movement Arsenal - Philip Tsukerman.mp4
|
67.5 MB
|
Exposing Hidden Exploitable Behaviors Using EDF - Fernando Arnaboldi.eng.srt
|
135.4 KB
|
Exposing Hidden Exploitable Behaviors Using EDF - Fernando Arnaboldi.mp4
|
96.9 MB
|
Fuzzing Javascript Engines for Fun and Pwnage - Areum Lee & Jeonghoon Shin.eng.srt
|
55.6 KB
|
Fuzzing Javascript Engines for Fun and Pwnage - Areum Lee & Jeonghoon Shin.mp4
|
49.8 MB
|
How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers - X. Bai & M. Zheng.eng.srt
|
85.5 KB
|
How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers - X. Bai & M. Zheng.mp4
|
87.1 MB
|
KEYNOTE 1 - The Future, The Past, and Wait, Where the Hell are We Now - M. Marschalek.eng.srt
|
157.9 KB
|
KEYNOTE 1 - The Future, The Past, and Wait, Where the Hell are We Now - M. Marschalek.mp4
|
105.6 MB
|
KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio.eng.srt
|
120.3 KB
|
KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio.mp4
|
74.4 MB
|
Mallet - Towards a Generic Intercepting Proxy - Rogan Dawes.eng.srt
|
126.8 KB
|
Mallet - Towards a Generic Intercepting Proxy - Rogan Dawes.mp4
|
102.7 MB
|
Over The Edge - Pwning The Windows Kernel - Rancho Han.eng.srt
|
56.7 KB
|
Over The Edge - Pwning The Windows Kernel - Rancho Han.mp4
|
69.9 MB
|
Pwning KNX & ZigBee Networks - HuiYu Wu, YuXiang Li & Yong Yang.eng.srt
|
82.0 KB
|
Pwning KNX & ZigBee Networks - HuiYu Wu, YuXiang Li & Yong Yang.mp4
|
83.0 MB
|
Real World Attacks Against Secure Elements - Don Bailey.eng.srt
|
158.9 KB
|
Real World Attacks Against Secure Elements - Don Bailey.mp4
|
91.2 MB
|
Rooting Android 8 with a Kernel Space Mirroring Attack - Yong Wang & Yang Song.eng.srt
|
81.7 KB
|
Rooting Android 8 with a Kernel Space Mirroring Attack - Yong Wang & Yang Song.mp4
|
77.2 MB
|
Sandbox Evasion Using VBA Referencing - Aviv Grafi & Amit Dori.eng.srt
|
104.5 KB
|
Sandbox Evasion Using VBA Referencing - Aviv Grafi & Amit Dori.mp4
|
56.3 MB
|
Smashing Ethereum Smart Contracts for Fun and ACTUAL Profit - Bernhard Mueller.mp4
|
89.3 MB
|
Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) - Daniel Bohannon.eng.srt
|
212.6 KB
|
Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) - Daniel Bohannon.mp4
|
120.3 MB
|
Uncovering the Android Patch Gap - Karsten Nohl & Jakob Lell.eng.srt
|
134.1 KB
|
Uncovering the Android Patch Gap - Karsten Nohl & Jakob Lell.mp4
|
103.5 MB
|
Welcome Address - Improving Incentives for Cybersecurity - Michel van Eeten.mp4
|
40.1 MB
|
/HITB 2018 - Dubai/
|
A Secure And Robust Wireless Comm System For Low-Latency Applications - Dr. H. Mukhtar.mp4
|
15.3 MB
|
AI Model Security - Reverse Engineering Machine Learning Models - Kang Li.eng.srt
|
142.0 KB
|
AI Model Security - Reverse Engineering Machine Learning Models - Kang Li.mp4
|
43.1 MB
|
Attacking Industrial Wireless Mesh Networks - M. Van Ommeren and Erwin Paternotte.eng.srt
|
115.8 KB
|
Attacking Industrial Wireless Mesh Networks - M. Van Ommeren and Erwin Paternotte.mp4
|
50.0 MB
|
Auditable & Provable Privacy Of Smart Speakers - Wang Kang and Yang Bo.eng.srt
|
84.9 KB
|
Auditable & Provable Privacy Of Smart Speakers - Wang Kang and Yang Bo.mp4
|
42.6 MB
|
Blockchain, Public Chain and Contract Security - Li Jiafeng and Yang Changcheng.eng.srt
|
91.9 KB
|
Blockchain, Public Chain and Contract Security - Li Jiafeng and Yang Changcheng.mp4
|
37.2 MB
|
Building Security Beyond The Genesis Block - Ryan Shepherd.eng.srt
|
92.2 KB
|
Building Security Beyond The Genesis Block - Ryan Shepherd.mp4
|
25.5 MB
|
Building Your Own Self Driving, Self Racing Car - Dhillon 'L33tdawg' Kannabhiran.eng.srt
|
49.1 KB
|
Building Your Own Self Driving, Self Racing Car - Dhillon 'L33tdawg' Kannabhiran.mp4
|
14.1 MB
|
Capture This - Real Time Packet Processing With FPGAs - Matteo Collura.eng.srt
|
144.4 KB
|
Capture This - Real Time Packet Processing With FPGAs - Matteo Collura.mp4
|
45.9 MB
|
CLOSING KEYNOTE - Blind Digital Signatures - Dr. Manar Abu Talib and Dr. Qassim Nasir.mp4
|
38.7 MB
|
CTF Prize Giving Closing Ceremony Locknote - HitB Crew.eng.srt
|
38.2 KB
|
CTF Prize Giving Closing Ceremony Locknote - HitB Crew.mp4
|
22.7 MB
|
DHCP Is Hard - Felix Wilhelm.eng.srt
|
124.4 KB
|
DHCP Is Hard - Felix Wilhelm.mp4
|
41.4 MB
|
Enhancing DL DGA Detection Models Using Separate Character Embedding - Vikash Yadav.eng.srt
|
96.1 KB
|
Enhancing DL DGA Detection Models Using Separate Character Embedding - Vikash Yadav.mp4
|
27.9 MB
|
Evolution of Security Threats To Telecommunications Infrastructures - Emmanuel Gadaix.eng.srt
|
72.8 KB
|
Evolution of Security Threats To Telecommunications Infrastructures - Emmanuel Gadaix.mp4
|
23.1 MB
|
Extracting Messages From iCloud - Vladimir Katalov.eng.srt
|
128.7 KB
|
Extracting Messages From iCloud - Vladimir Katalov.mp4
|
49.2 MB
|
Glitch Chronicles - Turning WebGL Into A Hammer - Pietro Frigo.eng.srt
|
148.9 KB
|
Glitch Chronicles - Turning WebGL Into A Hammer - Pietro Frigo.mp4
|
43.1 MB
|
Gold Digging - Discovering Hidden Gems In APKs - Marc Schoenefeld.mp4
|
41.5 MB
|
Hacking Into Broadband And Broadcast TV Systems - C. Kasmi, P. Barre and T. Sabono.eng.srt
|
62.0 KB
|
Hacking Into Broadband And Broadcast TV Systems - C. Kasmi, P. Barre and T. Sabono.mp4
|
27.6 MB
|
Hacking Telephone Systems For Fun & Profit - Himanshu Mehta and Sachin Wagh.mp4
|
32.6 MB
|
Hacking The International RFQ Process killthebuzzwords - Dino Covotsos.eng.srt
|
93.6 KB
|
Hacking The International RFQ Process killthebuzzwords - Dino Covotsos.mp4
|
20.9 MB
|
Hacking Yachts Remotely - IoT Hacking At Sea - Stephan Gerling.mp4
|
38.2 MB
|
Horror On The Bus - Hacking COMBUS - Kirils Solovjovs.eng.srt
|
125.2 KB
|
Horror On The Bus - Hacking COMBUS - Kirils Solovjovs.mp4
|
51.1 MB
|
Hunting For Backdoors In IoT Firmware At Unprecedented Scale - John Toterhi.eng.srt
|
117.1 KB
|
Hunting For Backdoors In IoT Firmware At Unprecedented Scale - John Toterhi.mp4
|
31.5 MB
|
HWallet - The Simple Cryptocurrency Hardware Wallet - Nemanja Nikodijevic.eng.srt
|
53.5 KB
|
HWallet - The Simple Cryptocurrency Hardware Wallet - Nemanja Nikodijevic.mp4
|
18.2 MB
|
Improved Blockchain Infrastructure With IoT - Dr Qassim Nasir and Dr Manar Abu Talib.eng.srt
|
55.0 KB
|
Improved Blockchain Infrastructure With IoT - Dr Qassim Nasir and Dr Manar Abu Talib.mp4
|
15.6 MB
|
Intrusion-Detection On The HW Bus - Congyuan Xu,Wang Kang and Yang Bo.eng.srt
|
79.3 KB
|
Intrusion-Detection On The HW Bus - Congyuan Xu,Wang Kang and Yang Bo.mp4
|
43.0 MB
|
IPv666 - Address Of The Beast - Marc Newlin and Chris Grayson.eng.srt
|
166.9 KB
|
IPv666 - Address Of The Beast - Marc Newlin and Chris Grayson.mp4
|
48.9 MB
|
KEYNOTE 1 - Crouching Tiger, Sudden Keynote - Katie Moussouris.eng.srt
|
137.5 KB
|
KEYNOTE 1 - Crouching Tiger, Sudden Keynote - Katie Moussouris.mp4
|
61.8 MB
|
KEYNOTE 2 - Cyber Arms Race - Mikko Hypponen (2).eng.srt
|
107.4 KB
|
KEYNOTE 2 - Cyber Arms Race - Mikko Hypponen (2).mp4
|
56.4 MB
|
KEYNOTE 2 - Cyber Arms Race - Mikko Hypponen.eng.srt
|
107.4 KB
|
KEYNOTE 2 - Cyber Arms Race - Mikko Hypponen.mp4
|
81.7 MB
|
Multidimensional HW Attack And Defense Toolset - K. Chai, Jie Fu & Mingchuang Qin.eng.srt
|
63.6 KB
|
Multidimensional HW Attack And Defense Toolset - K. Chai, Jie Fu & Mingchuang Qin.mp4
|
34.5 MB
|
NTLM Relay Is Dead, Long Live NTLM Relay - Jianing Wang and Junyu Zhou.eng.srt
|
80.0 KB
|
NTLM Relay Is Dead, Long Live NTLM Relay - Jianing Wang and Junyu Zhou.mp4
|
36.3 MB
|
Offensive Memory Forensics - Hugo Teso.eng.srt
|
150.2 KB
|
Offensive Memory Forensics - Hugo Teso.mp4
|
48.9 MB
|
Rooting Routers Using Symbolic Execution - Mathy Vanhoef.mp4
|
49.3 MB
|
Spanish Fly - Infecting Files On-The-Fly - Leonardo Nve.eng.srt
|
83.4 KB
|
Spanish Fly - Infecting Files On-The-Fly - Leonardo Nve.mp4
|
47.4 MB
|
System-level Threats - Assumptions In Modern Product Security - Cristofaro Mune.eng.srt
|
98.5 KB
|
System-level Threats - Assumptions In Modern Product Security - Cristofaro Mune.mp4
|
27.0 MB
|
The Phantom Menace - Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.eng.srt
|
52.1 KB
|
The Phantom Menace - Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.mp4
|
32.6 MB
|
Using Machine-Learning To Investigate Web Campaigns At Large - Federico Maggi.eng.srt
|
133.8 KB
|
Using Machine-Learning To Investigate Web Campaigns At Large - Federico Maggi.mp4
|
55.7 MB
|
Virtualizing IoT With Code Coverage Guided Fuzzing - KJ Lau and Nguyen Anh Quynh.eng.srt
|
163.1 KB
|
Virtualizing IoT With Code Coverage Guided Fuzzing - KJ Lau and Nguyen Anh Quynh.mp4
|
61.7 MB
|
Vote Of No Confidence - Second Factor Correctness - Victor Mateu.eng.srt
|
161.0 KB
|
Vote Of No Confidence - Second Factor Correctness - Victor Mateu.mp4
|
45.6 MB
|
Welcome Address - H.E. Yousuf Hamad Al Shaibani.mp4
|
1.6 MB
|
/HITB 2018 - Singapore/
|
A First Look Into The Security Of The Apple Pencil And Smartkeyboard - S. Esser.eng.srt
|
138.3 KB
|
A First Look Into The Security Of The Apple Pencil And Smartkeyboard - S. Esser.mp4
|
60.2 MB
|
A Year Of Purple - Ryan Shepherd.eng.srt
|
216.2 KB
|
A Year Of Purple - Ryan Shepherd.mp4
|
64.9 MB
|
CLOSING KEYNOTE - Rethinking The Cyber Kill Chain - Alexis Lavi.eng.srt
|
58.5 KB
|
CLOSING KEYNOTE - Rethinking The Cyber Kill Chain - Alexis Lavi.mp4
|
22.2 MB
|
COMMSEC - Blockchain And Smart Contract Attack Vectors - Jorden Seet.eng.srt
|
100.9 KB
|
COMMSEC - Blockchain And Smart Contract Attack Vectors - Jorden Seet.mp4
|
33.1 MB
|
COMMSEC - Breaking Full Disk Encryption - Nicolas Collery and Vitaly Kamluk.eng.srt
|
86.2 KB
|
COMMSEC - Breaking Full Disk Encryption - Nicolas Collery and Vitaly Kamluk.mp4
|
36.9 MB
|
COMMSEC - Closing Remarks - Andrea Zapparoli Manzoni.eng.srt
|
14.8 KB
|
COMMSEC - Closing Remarks - Andrea Zapparoli Manzoni.mp4
|
7.2 MB
|
COMMSEC - Cognitive Automation With Machine Learning In Cybersecurity - Rishi Kant.eng.srt
|
54.6 KB
|
COMMSEC - Cognitive Automation With Machine Learning In Cybersecurity - Rishi Kant.mp4
|
24.0 MB
|
COMMSEC - Demystifying The Definitions Of Dark - Fadli. B. Sidek.eng.srt
|
69.1 KB
|
COMMSEC - Demystifying The Definitions Of Dark - Fadli. B. Sidek.mp4
|
26.6 MB
|
COMMSEC - Generic And Static Detection Of Mobile Malware Using ML - Minh Tran.eng.srt
|
67.2 KB
|
COMMSEC - Generic And Static Detection Of Mobile Malware Using ML - Minh Tran.mp4
|
20.4 MB
|
COMMSEC - Hacking Mobile Games - Closing The Gap - Nicholas Lim.eng.srt
|
82.2 KB
|
COMMSEC - Hacking Mobile Games - Closing The Gap - Nicholas Lim.mp4
|
28.8 MB
|
COMMSEC - Internet Of Things - Battle Of The Bots - Rommel D. Joven.eng.srt
|
62.9 KB
|
COMMSEC - Internet Of Things - Battle Of The Bots - Rommel D. Joven.mp4
|
23.9 MB
|
COMMSEC - KLara - Your New Friend - Dan Demeter.eng.srt
|
68.4 KB
|
COMMSEC - KLara - Your New Friend - Dan Demeter.mp4
|
29.4 MB
|
COMMSEC - Learning How To Smurf With Honeypots - Emil Tan.eng.srt
|
78.3 KB
|
COMMSEC - Learning How To Smurf With Honeypots - Emil Tan.mp4
|
29.5 MB
|
COMMSEC - Monitoring Native Execution In WoW64 Apps - Y. Shafir and A. Carlsbad.eng.srt
|
130.0 KB
|
COMMSEC - Monitoring Native Execution In WoW64 Apps - Y. Shafir and A. Carlsbad.mp4
|
42.0 MB
|
COMMSEC - RedPhishing - Wi-Fi, Phishing And Red Teaming - Matteo Beccaro.eng.srt
|
41.6 KB
|
COMMSEC - RedPhishing - Wi-Fi, Phishing And Red Teaming - Matteo Beccaro.mp4
|
16.1 MB
|
COMMSEC - SayaKenaHack - Breach Notification In Malaysia - Keith Rozario.eng.srt
|
93.4 KB
|
COMMSEC - SayaKenaHack - Breach Notification In Malaysia - Keith Rozario.mp4
|
29.6 MB
|
COMMSEC - Securing ICS SCADA - Defense In Depth - Mike Rebultan.eng.srt
|
39.1 KB
|
COMMSEC - Securing ICS SCADA - Defense In Depth - Mike Rebultan.mp4
|
20.9 MB
|
COMMSEC - Software Security Era - Past, Present, And Future - Nafiez and Jaan Yeh.mp4
|
25.2 MB
|
COMMSEC - Surprise Rant 2.0 - Joernchen.eng.srt
|
34.1 KB
|
COMMSEC - Surprise Rant 2.0 - Joernchen.mp4
|
15.9 MB
|
COMMSEC - The Trails Of WINDSHIFT APT - Taha Karim.eng.srt
|
130.7 KB
|
COMMSEC - The Trails Of WINDSHIFT APT - Taha Karim.mp4
|
54.0 MB
|
COMMSEC - Threat Impact Analyser For IoT - Simon Eng and Lim Eng Woei.eng.srt
|
75.4 KB
|
COMMSEC - Threat Impact Analyser For IoT - Simon Eng and Lim Eng Woei.mp4
|
29.6 MB
|
COMMSEC - Using ML To Identify Security Issues In Open-Source Libraries - A. Sharma.eng.srt
|
78.0 KB
|
COMMSEC - Using ML To Identify Security Issues In Open-Source Libraries - A. Sharma.mp4
|
19.9 MB
|
COMMSEC - Welcome Address - Andrea Zapparoli Manzoni.eng.srt
|
22.1 KB
|
COMMSEC - Welcome Address - Andrea Zapparoli Manzoni.mp4
|
8.7 MB
|
Exploiting Automation In LTE Mobile Networks - R. Borgaonkar and A. Shaik.eng.srt
|
131.7 KB
|
Exploiting Automation In LTE Mobile Networks - R. Borgaonkar and A. Shaik.mp4
|
38.3 MB
|
File Structures - Another Binary Exploitation Technique - An-Jie Yang (Angelboy).eng.srt
|
79.1 KB
|
File Structures - Another Binary Exploitation Technique - An-Jie Yang (Angelboy).mp4
|
37.5 MB
|
God Mode Unlocked - Hardware Backdoors In x86 CPUs - Christopher Domas.eng.srt
|
178.9 KB
|
God Mode Unlocked - Hardware Backdoors In x86 CPUs - Christopher Domas.mp4
|
47.3 MB
|
Hacking BLE Bicycle Locks For Fun And (A Small) Profit - Vincent Tan.eng.srt
|
74.4 KB
|
Hacking BLE Bicycle Locks For Fun And (A Small) Profit - Vincent Tan.mp4
|
30.1 MB
|
KEYNOTE 1 - (In)Security Is Eating The World - Michael Coates.eng.srt
|
130.6 KB
|
KEYNOTE 1 - (In)Security Is Eating The World - Michael Coates.mp4
|
39.9 MB
|
KEYNOTE 2 - OK Computer - Machine Learning In Cybersecurity - Alexander Polyakov.eng.srt
|
3.9 KB
|
KEYNOTE 2 - OK Computer - Machine Learning In Cybersecurity - Alexander Polyakov.mp4
|
2.0 MB
|
LOCK NOTE - Philippe Viola.eng.srt
|
20.8 KB
|
LOCK NOTE - Philippe Viola.mp4
|
9.7 MB
|
NFC Payments - The Art Of Relay And Replay Attacks - Salvador Mendoza.eng.srt
|
82.0 KB
|
NFC Payments - The Art Of Relay And Replay Attacks - Salvador Mendoza.mp4
|
34.0 MB
|
Owning Electronic Locks Without Leaving A Trace - Tomi Tuominen and Timo Hirvonen.eng.srt
|
121.3 KB
|
Owning Electronic Locks Without Leaving A Trace - Tomi Tuominen and Timo Hirvonen.mp4
|
50.2 MB
|
Panel Discussion - Zero Seconds To Midnight - The 0-day Market.eng.srt
|
156.6 KB
|
Panel Discussion - Zero Seconds To Midnight - The 0-day Market.mp4
|
70.7 MB
|
The Road To iOS Sandbox Escape - Rani Idan.eng.srt
|
89.1 KB
|
The Road To iOS Sandbox Escape - Rani Idan.mp4
|
33.3 MB
|
Traversing The Kill-Chain - The New Shiny In 2018 - Vincent Yiu.eng.srt
|
156.7 KB
|
Traversing The Kill-Chain - The New Shiny In 2018 - Vincent Yiu.mp4
|
51.7 MB
|
Turning Memory Errors Into Code Execution With Client-Side Compilers - R. Gawlik.mp4
|
30.1 MB
|
Viewer Discretion Advised - (De)Coding An iOS Vulnerability - Adam Donenfeld.eng.srt
|
149.2 KB
|
Viewer Discretion Advised - (De)Coding An iOS Vulnerability - Adam Donenfeld.mp4
|
51.7 MB
|
/HITB 2019 - Amsterdam/
|
A Successful Mess Between Hardening And Mitigation - Weichselbaum & Spagnuolo.eng.srt
|
97.0 KB
|
A Successful Mess Between Hardening And Mitigation - Weichselbaum & Spagnuolo.mp4
|
114.9 MB
|
Attacking Encrypted VOIP Protocols - Ivica Stipovic.eng.srt
|
39.8 KB
|
Attacking Encrypted VOIP Protocols - Ivica Stipovic.mp4
|
44.7 MB
|
Attacking GSM - Alarms, Smart Homes, Smart Watches And More - Alex Kolchanov.mp4
|
101.6 MB
|
Attacking Industrial Remote Controllers - Marco Balduzzi and Federico Maggi.eng.srt
|
85.6 KB
|
Attacking Industrial Remote Controllers - Marco Balduzzi and Federico Maggi.mp4
|
112.7 MB
|
Automated Discovery Of Logical Priv. Esc. Bugs In Win10 - Wenxu Wu and Shi Qin.eng.srt
|
53.9 KB
|
Automated Discovery Of Logical Priv. Esc. Bugs In Win10 - Wenxu Wu and Shi Qin.mp4
|
107.3 MB
|
Binder The Bridge To Root - Hongli Han and Mingjian Zhou.eng.srt
|
38.6 KB
|
Binder The Bridge To Root - Hongli Han and Mingjian Zhou.mp4
|
50.7 MB
|
Closing Ceremony & CTF Prize Giving Ceremony.eng.srt
|
23.9 KB
|
Closing Ceremony & CTF Prize Giving Ceremony.mp4
|
31.9 MB
|
Compiler Bugs And Bug Compilers - Marion Marschalek.eng.srt
|
121.6 KB
|
Compiler Bugs And Bug Compilers - Marion Marschalek.mp4
|
84.8 MB
|
Demystifying IoT OT Hacks With SDR - Harshit Agrawal & Himanshu Mehta.eng.srt
|
57.1 KB
|
Demystifying IoT OT Hacks With SDR - Harshit Agrawal & Himanshu Mehta.mp4
|
8.4 MB
|
Deobfuscate UEFI BIOS Malware And Virtualized Packers - Alexandre Borges.eng.srt
|
65.9 KB
|
Deobfuscate UEFI BIOS Malware And Virtualized Packers - Alexandre Borges.mp4
|
135.7 MB
|
Duplicating Black Box Machine Learning Models - Rewanth Cool and Nikhil Joshi.mp4
|
71.2 MB
|
Finding Vulnerabilities In iOS MacOS Networking Code - Kevin Backhouse.eng.srt
|
73.3 KB
|
Finding Vulnerabilities In iOS MacOS Networking Code - Kevin Backhouse.mp4
|
92.9 MB
|
fn fuzzy Fast Multiple Binary Diffing Triage With IDA - Takahiro Haruyama.mp4
|
62.8 MB
|
For The Win The Art Of The Windows Kernel Fuzzing - Guangming Liu.eng.srt
|
38.5 KB
|
For The Win The Art Of The Windows Kernel Fuzzing - Guangming Liu.mp4
|
93.9 MB
|
H(ack)DMI Pwning HDMI For Fun And Profit - Jeonghoon Shin and Changhyeon Moon.mp4
|
74.0 MB
|
Hacking LTE Public Warning Systems - Weiguang Li.eng.srt
|
24.1 KB
|
Hacking LTE Public Warning Systems - Weiguang Li.mp4
|
33.7 MB
|
Hacking The 0day Market - Andrea Zapparoli Manzoni.eng.srt
|
44.3 KB
|
Hacking The 0day Market - Andrea Zapparoli Manzoni.mp4
|
37.1 MB
|
Hidden Agendas Bypassing GSMA Recommendations On SS7 Networks - Kirill Puzankov.eng.srt
|
72.9 KB
|
Hidden Agendas Bypassing GSMA Recommendations On SS7 Networks - Kirill Puzankov.mp4
|
113.7 MB
|
Hourglass Fuzz A Quick Bug Hunting Method - M. Li, T. Han, L. Jiang and L. Wu.eng.srt
|
81.1 KB
|
Hourglass Fuzz A Quick Bug Hunting Method - M. Li, T. Han, L. Jiang and L. Wu.mp4
|
108.2 MB
|
How To Dump, Parse, And Analyze i.MX Flash Memory Chips - Damien Cauquil.eng.srt
|
69.5 KB
|
How To Dump, Parse, And Analyze i.MX Flash Memory Chips - Damien Cauquil.mp4
|
20.3 MB
|
I Own Your Building (Management System) - Gjoko Krstic.eng.srt
|
62.7 KB
|
I Own Your Building (Management System) - Gjoko Krstic.mp4
|
57.7 MB
|
Improving Unicode Attacks With Deep Learning - Muñoz, Boza & Escribano.mp4
|
22.1 MB
|
KEYNOTE 2 - Securing Journalists - Runa Sandvik.eng.srt
|
72.8 KB
|
KEYNOTE 2 - Securing Journalists - Runa Sandvik.mp4
|
55.6 MB
|
KEYNOTE The End Is The Beginning Is The End Ten Years In The NL Box - D. Kannabhiran.eng.srt
|
77.1 KB
|
KEYNOTE The End Is The Beginning Is The End Ten Years In The NL Box - D. Kannabhiran.mp4
|
69.5 MB
|
LOCKNOTE - HITBCyberWeek Announcement - Dhillon 'L33tdawg' Kannabhiran.eng.srt
|
22.3 KB
|
LOCKNOTE - HITBCyberWeek Announcement - Dhillon 'L33tdawg' Kannabhiran.mp4
|
19.4 MB
|
Make ARM Shellcode Great Again - Saumil Shah.mp4
|
101.7 MB
|
Might As Well JUMP Exploit Development For Java Serialization - Jameel Nabbo.eng.srt
|
30.9 KB
|
Might As Well JUMP Exploit Development For Java Serialization - Jameel Nabbo.mp4
|
44.0 MB
|
ModJack Hijacking The MacOS Kernel - Zhi Zhou.eng.srt
|
70.7 KB
|
ModJack Hijacking The MacOS Kernel - Zhi Zhou.mp4
|
111.2 MB
|
Muraena The Unexpected Phish - Michele Orru and Giuseppe Trotta.eng.srt
|
65.4 KB
|
Muraena The Unexpected Phish - Michele Orru and Giuseppe Trotta.mp4
|
221.5 MB
|
Overcoming Fear Reversing With Radare2 - Arnau Gamez Montolio.eng.srt
|
183.4 KB
|
Overcoming Fear Reversing With Radare2 - Arnau Gamez Montolio.mp4
|
204.2 MB
|
Panic On The Streets Of Amsterdam PanicXNU 3.0 - Juwei Lin and Junzhi Lu.eng.srt
|
57.9 KB
|
Panic On The Streets Of Amsterdam PanicXNU 3.0 - Juwei Lin and Junzhi Lu.mp4
|
95.6 MB
|
PatrOwl - The Red Flavour Of SOC Automation And Orchestration - Nicolas Mattiocco.mp4
|
36.6 MB
|
PREVIEW - The Beginning of the End A Return to the Abyss for a Quick Look.eng.srt
|
4.2 KB
|
PREVIEW - The Beginning of the End A Return to the Abyss for a Quick Look.mp4
|
7.8 MB
|
PREVIEW - The End Is The Beginning Is The End Ten Years In The NL Box.eng.srt
|
0.9 KB
|
PREVIEW - The End Is The Beginning Is The End Ten Years In The NL Box.mp4
|
1.7 MB
|
Pwning Centrally-Controlled Smart Homes - Sanghyun Park and Seongjoon Cho.mp4
|
58.0 MB
|
Researching New Attack Interfaces On iOS And OSX - Lilang Wu and Moony Li.eng.srt
|
61.2 KB
|
Researching New Attack Interfaces On iOS And OSX - Lilang Wu and Moony Li.mp4
|
102.4 MB
|
Reverse Engineering Custom ASICs By Exploiting Supply-Chain Leaks - Thomas Weber.eng.srt
|
35.9 KB
|
Reverse Engineering Custom ASICs By Exploiting Supply-Chain Leaks - Thomas Weber.mp4
|
55.1 MB
|
Reversing Cryptographic Primitives Using Quantum Computing - Renaud Lifchitz.eng.srt
|
76.4 KB
|
Reversing Cryptographic Primitives Using Quantum Computing - Renaud Lifchitz.mp4
|
126.6 MB
|
Reversing Mobile Malware - Abdullah Joseph.eng.srt
|
54.3 KB
|
Reversing Mobile Malware - Abdullah Joseph.mp4
|
61.7 MB
|
Rise Of The WarPi - Kevin McPeake.eng.srt
|
56.7 KB
|
Rise Of The WarPi - Kevin McPeake.mp4
|
52.1 MB
|
Secure And Scalable Anomaly-Based Network Intrusion Detection - Philipp Mieden.eng.srt
|
54.5 KB
|
Secure And Scalable Anomaly-Based Network Intrusion Detection - Philipp Mieden.mp4
|
58.0 MB
|
Sneaking Past Device Guard - Philip Tsukerman.eng.srt
|
77.4 KB
|
Sneaking Past Device Guard - Philip Tsukerman.mp4
|
107.7 MB
|
Social Networks Can We Fix Them - Joel Hernandez.eng.srt
|
29.3 KB
|
Social Networks Can We Fix Them - Joel Hernandez.mp4
|
35.7 MB
|
The Beginning Of The End A Return To The Abyss For A Quick Look - R. Thieme.eng.srt
|
105.9 KB
|
The Beginning Of The End A Return To The Abyss For A Quick Look - R. Thieme.mp4
|
28.4 MB
|
The Birdman Hacking Cospas-Sarsat Satellites - Hao Jingli.eng.srt
|
48.7 KB
|
The Birdman Hacking Cospas-Sarsat Satellites - Hao Jingli.mp4
|
70.5 MB
|
TOCTOU Attacks Against Secure Boot And BootGuard - Trammell Hudson & Peter Bosch.eng.srt
|
58.0 KB
|
TOCTOU Attacks Against Secure Boot And BootGuard - Trammell Hudson & Peter Bosch.mp4
|
72.4 MB
|
V1 Bounty Building A Coordinated Bug Disclosure Bridge For The EU - Benjamin Kunz.mp4
|
87.4 MB
|
WiCy Monitoring 802.11AC Networks At Scale - Vivek Ramachandran.mp4
|
37.2 MB
|
/HITB 2019 - CyberWeek/
|
AI HIGHLIGHT - Advances In The Trinity Of AI - Anima Anandkumar.mp4
|
147.2 MB
|
AI HIGHLIGHT - Reputation Systems Against Social Engineering - Anton Kolonin.mp4
|
133.2 MB
|
An Open-Source Toolkit For Model-Based Fuzzing Of ARM CPUs - Jared Wright.mp4
|
82.5 MB
|
BLOCKCHAIN HIGHLIGHT - BCM Secure Messaging By Hackers For Hackers - KunZhe Chai.mp4
|
53.9 MB
|
BLOCKCHAIN HIGHLIGHT - Security Enabling Blockchains - Paul Makowski.mp4
|
105.8 MB
|
BLOCKCHAIN HIGHLIGHT - The Impact Of Blockchain And Cryptocurrencies - Gerard Dache.mp4
|
80.8 MB
|
Build A Quantum Computer At Home - Hacker Style - Yann Allain.mp4
|
65.2 MB
|
Car Hacking Practical Guide To Automotive Security - Yogesh Ojha.mp4
|
84.7 MB
|
COMMSEC - HIGHLIGHT - Are You Insured Around Cyber Crime - Jake Kouns.mp4
|
97.9 MB
|
COMMSEC - HIGHLIGHT Cloud Computings Appeal Is Cloud Secs Complexity - Nils Puhlmann.mp4
|
42.1 MB
|
COMMSEC - HIGHLIGHT Government At The Center Of A Cyber Battle - H.E. Mohammed Gheyath.mp4
|
41.2 MB
|
CyptoAPT APT Attacks On Crypto Exchange Employees - Heungsoo Kang.mp4
|
73.0 MB
|
DCART Decoupled Components For Automated Ransomware Testing - Mark Mager.mp4
|
90.8 MB
|
Debunking Fault Injection Myths And Misconceptions - C. Mune and N. Timmers.mp4
|
110.3 MB
|
Detecting Attacks In Ethereum Smart Contracts - N. Quoc Bao and N. Anh Quynh.mp4
|
104.0 MB
|
EOS Hackers New Bank - Vic Huang.mp4
|
58.2 MB
|
Fuzzing Farm Monoculture Antipatterns - Marc Schoenefeld.mp4
|
78.7 MB
|
Hunting Threats In Social Media Networks - F. Yarochkin and V. Kropotov.mp4
|
110.3 MB
|
Introducing ARM-X The ARM IoT Firmware Emulation Framework - Saumil Shah.mp4
|
90.1 MB
|
KEYNOTE - How Hacking Has Changed The Modern Battlefield - Marc Rogers.mp4
|
90.1 MB
|
KEYNOTE - Security Is Already Here - Its Just Not Evenly Distributed - Chris Wysopal.mp4
|
107.3 MB
|
KEYNOTE - We Hacked The Planet - Now What - Katie Moussouris.mp4
|
91.0 MB
|
LoRaWAN Auditing - E. Martínez Fayó, M. Sequeira and C. Cerrudo.mp4
|
120.5 MB
|
Open Source Security - Vulnerabilities Never Come Alone - Fermin J. Serna.mp4
|
90.6 MB
|
QUANTUM HIGHLIGHT - Quantum Disruption - Jose Ignacio.mp4
|
57.7 MB
|
QUANTUM HIGHLIGHT - What Would A Quantum Computer Do To Crypto - Najwa Aaraj.mp4
|
57.4 MB
|
QUANTUM HIGHLIGHT Panel Discussion - M. Manzano, Y. Allain, N. Aaraj and J. Ignacio.mp4
|
128.2 MB
|
Reimplementing Local RPC In .Net - James Forshaw.mp4
|
95.2 MB
|
Ridiculous Radios - Michael Ossmann.mp4
|
98.3 MB
|
RIDL Rogue In Flight Data Load - Stephan van Schaik and Sebastian Osterlund.mp4
|
78.8 MB
|
The Road to Building Defendable Systems - Saumil Shah.mp4
|
73.3 MB
|
The Sum Of All Fears, When ICS SCADA Are Compromised - Mars Cheng.mp4
|
115.8 MB
|
/HITB 2019 - Singapore/
|
4G LTE Man In The Middle Attacks With A Hacked Femtocell - Xiaodong Zou.eng.srt
|
50.7 KB
|
4G LTE Man In The Middle Attacks With A Hacked Femtocell - Xiaodong Zou.mp4
|
55.6 MB
|
4G To 5G New Attacks - Altaf Shaik.eng.srt
|
105.6 KB
|
4G To 5G New Attacks - Altaf Shaik.mp4
|
57.1 MB
|
A Pre-Auth RCE On Leading SSL VPNs - Orange Tsai and Tingyi Chang.eng.srt
|
71.4 KB
|
A Pre-Auth RCE On Leading SSL VPNs - Orange Tsai and Tingyi Chang.mp4
|
61.1 MB
|
Advanced Mutation Fuzzing Method For Wireless Protocols - Lidong Li and Xianzi Kong.eng.srt
|
26.9 KB
|
Advanced Mutation Fuzzing Method For Wireless Protocols - Lidong Li and Xianzi Kong.mp4
|
27.4 MB
|
Bypassing Hardware-Based Trusted Boot Through x86 Downgrade - Alexander Ermolov.eng.srt
|
37.7 KB
|
Bypassing Hardware-Based Trusted Boot Through x86 Downgrade - Alexander Ermolov.mp4
|
37.9 MB
|
CLOSING KEYNOTE Securing Cyber-Physical Systems Moving Beyond Fear - Stefano Zanero.eng.srt
|
77.6 KB
|
CLOSING KEYNOTE Securing Cyber-Physical Systems Moving Beyond Fear - Stefano Zanero.mp4
|
59.7 MB
|
CLOSING Prize Ceremony Lock Note by Dhillon 'L33tdawg' Kannabhiran.eng.srt
|
26.7 KB
|
CLOSING Prize Ceremony Lock Note by Dhillon 'L33tdawg' Kannabhiran.mp4
|
21.7 MB
|
COMMSEC - Abusing Over-The-Air Client Provisioning - Slava Makkaveev and Artyom Skrobov.eng.srt
|
50.7 KB
|
COMMSEC - Abusing Over-The-Air Client Provisioning - Slava Makkaveev and Artyom Skrobov.mp4
|
42.9 MB
|
COMMSEC - Activities Of The Tick Cyber Espionage Group Over The Last 10 Years - Cha Minseok.eng.srt
|
36.4 KB
|
COMMSEC - Activities Of The Tick Cyber Espionage Group Over The Last 10 Years - Cha Minseok.mp4
|
49.2 MB
|
COMMSEC - BONUS Security Should Be Smarter Not Harder - Katie Moussouris.eng.srt
|
94.8 KB
|
COMMSEC - BONUS Security Should Be Smarter Not Harder - Katie Moussouris.mp4
|
96.3 MB
|
COMMSEC - Car Hacking Made - Easel - - Alina Tan, Chun Yong, Tan Pei Si and Solomon Tan.eng.srt
|
51.7 KB
|
COMMSEC - Car Hacking Made - Easel - - Alina Tan, Chun Yong, Tan Pei Si and Solomon Tan.mp4
|
54.8 MB
|
COMMSEC - DFEx - DNS File Exfiltration - Emilio Couto.eng.srt
|
87.7 KB
|
COMMSEC - DFEx - DNS File Exfiltration - Emilio Couto.mp4
|
105.7 MB
|
COMMSEC - Exploiting Zoom On MacOS - Michael Gianarakis and Sean Yeoh.eng.srt
|
115.8 KB
|
COMMSEC - Exploiting Zoom On MacOS - Michael Gianarakis and Sean Yeoh.mp4
|
66.5 MB
|
COMMSEC - Hacking Object Detectors Is Just Like Training Neural Networks - Jay Xiong.eng.srt
|
37.0 KB
|
COMMSEC - Hacking Object Detectors Is Just Like Training Neural Networks - Jay Xiong.mp4
|
52.5 MB
|
COMMSEC - How To Detect Fake Faces (Manipulated Images) Using CNNs - Jay Xiong.eng.srt
|
53.3 KB
|
COMMSEC - How To Detect Fake Faces (Manipulated Images) Using CNNs - Jay Xiong.mp4
|
87.6 MB
|
COMMSEC - Modern Automotive Attack Surfaces - Lior Yaari and Yonatan Migdal.eng.srt
|
104.8 KB
|
COMMSEC - Modern Automotive Attack Surfaces - Lior Yaari and Yonatan Migdal.mp4
|
81.8 MB
|
COMMSEC - Perfidious Make PE Backdooring Great Again - Shreyans Doshi.eng.srt
|
49.4 KB
|
COMMSEC - Perfidious Make PE Backdooring Great Again - Shreyans Doshi.mp4
|
26.3 MB
|
COMMSEC - Physical To Cyber And Back Fingerprint Scanner Security - Kevin Reed.eng.srt
|
74.7 KB
|
COMMSEC - Physical To Cyber And Back Fingerprint Scanner Security - Kevin Reed.mp4
|
101.2 MB
|
COMMSEC - Tracking Fake News Based On Deep Learning - Zonghou Lv,Tao Wei and Dou Goodman.eng.srt
|
30.2 KB
|
COMMSEC - Tracking Fake News Based On Deep Learning - Zonghou Lv,Tao Wei and Dou Goodman.mp4
|
53.9 MB
|
COMMSEC - Underrated Security Bugs - Eldar - Wireghoul - Marcussen.eng.srt
|
44.0 KB
|
COMMSEC - Underrated Security Bugs - Eldar - Wireghoul - Marcussen.mp4
|
52.1 MB
|
Creating A Fuzzer For Diameter And LTE Telecom Protocols - Sergey Mashukov.eng.srt
|
72.6 KB
|
Creating A Fuzzer For Diameter And LTE Telecom Protocols - Sergey Mashukov.mp4
|
69.0 MB
|
KEYNOTE D2 Never Gonna Give You Up, Never Gonna Let You Down - Marc Rogers.eng.srt
|
67.6 KB
|
KEYNOTE D2 Never Gonna Give You Up, Never Gonna Let You Down - Marc Rogers.mp4
|
44.0 MB
|
KEYNOTE The CISO's Dilemma - Saumil Shah.eng.srt
|
74.1 KB
|
KEYNOTE The CISO's Dilemma - Saumil Shah.mp4
|
55.2 MB
|
Launching Feedback-Driven Fuzzing On TrustZone TEE - Andrey Akimov.mp4
|
58.9 MB
|
Malware Classification With Graph Hash - Chai Ching Fang and Shih-Hao Weng.eng.srt
|
44.2 KB
|
Malware Classification With Graph Hash - Chai Ching Fang and Shih-Hao Weng.mp4
|
46.9 MB
|
Recreating An iOS 0-Day Jailbreak Out Of Apple's Security Updates - Stefan Esser.eng.srt
|
87.1 KB
|
Recreating An iOS 0-Day Jailbreak Out Of Apple's Security Updates - Stefan Esser.mp4
|
69.2 MB
|
Scare Static Code Analysis Recognition Evasion - Andreas Wiegenstein.mp4
|
65.6 MB
|
Understanding, Attacking & Securing Medical Devices - Ajay Pratap Singh.mp4
|
66.7 MB
|
Why You Should Fear Your - Mundane - Office Equipment - Mario Rivas and Daniel Romero.eng.srt
|
80.0 KB
|
Why You Should Fear Your - Mundane - Office Equipment - Mario Rivas and Daniel Romero.mp4
|
59.9 MB
|
/HITB 2020 - CyberWeek/
|
AEZAKMI Browser Anonymity & Fingerprinting Bypass.mp4
|
113.6 MB
|
Anatomy of Automated Account Takeovers.mp4
|
33.5 MB
|
Android RATs Detection With A Machine Learning-based Python IDS.mp4
|
42.3 MB
|
COMMSEC - Adventures in Building a CAN Bus Sniffer.mp4
|
35.9 MB
|
COMMSEC - Blue Team Visibility.mp4
|
17.4 MB
|
COMMSEC - Detection and Efficiency Testing of Endpoint Security Sensors.mp4
|
50.1 MB
|
COMMSEC - Enterprise Security Strategy Leveraging On Zero Trust Approach.mp4
|
64.6 MB
|
COMMSEC - Fuzzing Finding Your Own Bugs And 0days.mp4
|
48.1 MB
|
COMMSEC - Hacking The 0day Marketplace.mp4
|
44.3 MB
|
COMMSEC - Inside The Mind Of A Threat Actor Beyond Pentesting.mp4
|
30.0 MB
|
COMMSEC - Machine Learning Security Evasion Competition 2020.mp4
|
20.7 MB
|
COMMSEC - Optimizing The Protection Of IoT Devices.mp4
|
27.6 MB
|
COMMSEC - Spoofing Your Location On IOS Without Jailbreaking.mp4
|
23.1 MB
|
COMMSEC - Subverting Bit Locker With One Vulnerability.mp4
|
59.2 MB
|
COMMSEC - The Art of Exploiting Logical Flaws in Web Applications.mp4
|
82.6 MB
|
COMMSEC - The Journey For Manufacturers To Develop Cyber Resilient IoT Devices.mp4
|
29.0 MB
|
COMMSEC - The Work of Cyber in the Age of Mechanical Reproduction.mp4
|
31.7 MB
|
COMMSEC - Trustworthy Shield - A Cheap TPM Module For Older Systems.mp4
|
14.6 MB
|
Constructing an OS X Cyber Range for Red & Blue Teams.mp4
|
73.9 MB
|
Critical Infrastructure Data Breaches - An In-depth Analysis.mp4
|
38.0 MB
|
Exploitation Techniques and Attacks on Hosting Assets and Access for Resale.mp4
|
39.4 MB
|
Industrial Protocol Gateways A Deep-Dive of Moxa MGate 5105-MB-EIP.mp4
|
41.3 MB
|
Jailbreaks Never Die Exploiting iOS 13.7.mp4
|
39.5 MB
|
Kernel Exploitation with a File System Fuzzer.mp4
|
40.5 MB
|
KEYNOTE 1 - Ask Bruce.mp4
|
42.1 MB
|
KEYNOTE 2 - The War for Control of DNS Encryption - Paul Vixie.mp4
|
56.4 MB
|
RAMN Resistant Automotive Miniature Network.mp4
|
42.8 MB
|
The Road Towards 365 Bugs in Microsoft Office 365.mp4
|
34.3 MB
|
Trust, but Verify Main'taining Democracy In Spite of Информационные контрмеры.mp4
|
36.8 MB
|
/HITB 2020 - Lock Down 001/
|
60 CVEs In 60 Days - Eran Shimony.mp4
|
44.4 MB
|
Analyzing Recent Evolutions In Malware Loaders - H. Unterbrink & E. Brumaghin.mp4
|
84.4 MB
|
Army Of Undead Tailored Firmware Emulation - Thomas Weber.mp4
|
85.1 MB
|
Breaking And Securing Cloud Platforms - Fyodor Yarochkin.mp4
|
60.4 MB
|
Bugrank A Community Bug Bounty Platform - T. Nguyen, A. Lai & N.A. Quynh.mp4
|
33.7 MB
|
Building Next-Gen Security Analysis Tools With Qiling Framework - Lau KJ & S. Berni.mp4
|
76.2 MB
|
Documents Of Doom Infecting Macos Via Office Macros - Patrick Wardle.mp4
|
45.1 MB
|
Exploiting Directory Permissions On Macos - Csaba Fitzl.mp4
|
59.5 MB
|
Exploiting The Netlogon Protocol - Tom Tervoort.mp4
|
21.0 MB
|
Fuzzing File System Implementations To Uncover Security Bugs - Christopher Krah.mp4
|
65.6 MB
|
Prisoner Number 6 - Nimrod Stoler.mp4
|
60.2 MB
|
Pwning Adobe Reader Multiple Times With Malformed Strings - Ke Liu.mp4
|
60.8 MB
|
The Insecurity Of Cloudless Smart Door Systems - J. Schneider S. Neef & J. Beier.mp4
|
70.5 MB
|
Virtual Lab - Firmware Hacking With Ghidra - Thomas Roth & Dmitry Nedospasov.mp4
|
172.9 MB
|
/HITB 2020 - Lock Down 002/
|
Breakout Script of the Westworld - Tianwen Tang & Wei Xiao.mp4
|
24.8 MB
|
Common Flaws in ICS Network Protocols - Mars Cheng & Selmon Yang.mp4
|
117.0 MB
|
Exploring and Exploiting the SQLite - Wenxiang Qian.mp4
|
73.3 MB
|
FIDLing with Decompilers - Carlos Garcia Prado & Ryan Warns.mp4
|
62.6 MB
|
How Adversary Emulation Can Enhance Blue Team Performance - SHANG-DE Jiang.mp4
|
49.6 MB
|
How to Hack Medical Imaging Applications via DICOM - Maria Nedyak.mp4
|
44.8 MB
|
HTTP Statuses as C2 Commands and Compromised TLS - Denis Legezo.mp4
|
68.2 MB
|
KEYNOTE 1 - How Hardware Boundaries Define Platform Security - Alex Matrosov.mp4
|
39.1 MB
|
KEYNOTE 2 - DevSecOps, Chaos Security, and Not Being Left Behind - Eddie Schwartz.mp4
|
67.2 MB
|
Operation SemiChimera - - Bletchley Chen, Inndy Lin & SHANG-DE Jiang.mp4
|
83.0 MB
|
Python for Enhanced OPSEC - Joe Gray.mp4
|
85.7 MB
|
Runtime Memory Analysis Tool for Mobile Apps - I. Lyrchikov & E. Saltykov.mp4
|
36.9 MB
|
Secret Flaws of In-DRAM RowHammer Mitigations - E. Vannacci & P. Frigo.mp4
|
71.6 MB
|
Serverless Security Attack & Defense - Pawel Rzepa.mp4
|
90.0 MB
|
The Secret Codes Tell the Secrets - Zhang Qing & Bai Guangdong.mp4
|
49.8 MB
|
VIRTUAL LAB D1 - Signal Processing with GNURadio and SDRs - Ateet Kumar.mp4
|
200.3 MB
|
VIRTUAL LAB D1- Car Hacking - Alina Tan, Edmund, Tan Pei Si & Chun Yong.mp4
|
45.4 MB
|
VIRTUAL LAB D2 - Car Hacking - Alina Tan, Edmund, Tan Pei Si & Chun Yong.mp4
|
37.3 MB
|
VIRTUAL LAB Qiling Framework Build a Fuzzer Based on a 1day Bug - Lau Kai Jern.mp4
|
78.3 MB
|
Zen A Complex Campaign of Harmful Android Apps - Łukasz Siewierski.mp4
|
60.9 MB
|
/HITB 2021 - Amsterdam/
|
A Journey Into Synology NAS - Q C.eng.srt
|
66.3 KB
|
A Journey Into Synology NAS - Q C.mp4
|
48.7 MB
|
A QEMU Black Box Escape Via USB Device - Lingni Kong, Yanyu Zhang & Haipeng Qu.eng.srt
|
29.5 KB
|
A QEMU Black Box Escape Via USB Device - Lingni Kong, Yanyu Zhang & Haipeng Qu.mp4
|
14.6 MB
|
Attacking Cloud Native Kubernetes With CDK - Zebin Zhou and Yue Xu.eng.srt
|
48.4 KB
|
Attacking Cloud Native Kubernetes With CDK - Zebin Zhou and Yue Xu.mp4
|
30.0 MB
|
Attacking Fast Charging Electric Vehicles - Wu HuiYu and YuXiang Li.eng.srt
|
37.1 KB
|
Attacking Fast Charging Electric Vehicles - Wu HuiYu and YuXiang Li.mp4
|
25.4 MB
|
Binary Fuzzing With Snapshot-Assisted-Driven Comparison Branch Analysis - K. Son.eng.srt
|
68.4 KB
|
Binary Fuzzing With Snapshot-Assisted-Driven Comparison Branch Analysis - K. Son.mp4
|
34.6 MB
|
Bypassing DEP With Jump-Oriented Programming - B. Brizendine and A. Babcock.eng.srt
|
110.4 KB
|
Bypassing DEP With Jump-Oriented Programming - B. Brizendine and A. Babcock.mp4
|
73.5 MB
|
Closing Note by Dhillon @l33tdawg Kannabhiran.eng.srt
|
20.1 KB
|
Closing Note by Dhillon @l33tdawg Kannabhiran.mp4
|
7.4 MB
|
COMMSEC - 5G Networks And Interconnect Threats - Martin Kacer.eng.srt
|
46.6 KB
|
COMMSEC - 5G Networks And Interconnect Threats - Martin Kacer.mp4
|
26.4 MB
|
COMMSEC - AWS GuardDuty Post-DNS Era Covert Channel For C&C - Sze Siong Teo.eng.srt
|
30.1 KB
|
COMMSEC - AWS GuardDuty Post-DNS Era Covert Channel For C&C - Sze Siong Teo.mp4
|
26.2 MB
|
COMMSEC - Breaking Siemens SIMATIC S7 PLC Protection Mechanism - Gao Jian.eng.srt
|
40.5 KB
|
COMMSEC - Breaking Siemens SIMATIC S7 PLC Protection Mechanism - Gao Jian.mp4
|
32.2 MB
|
COMMSEC - Exploitation With Shell Reverse & Infection With PowerShell - Filipi Pires.eng.srt
|
74.6 KB
|
COMMSEC - Exploitation With Shell Reverse & Infection With PowerShell - Filipi Pires.mp4
|
45.9 MB
|
COMMSEC - JARM Randomizer Evading JARM Fingerprinting - Dagmawi Mulugeta.eng.srt
|
50.0 KB
|
COMMSEC - JARM Randomizer Evading JARM Fingerprinting - Dagmawi Mulugeta.mp4
|
25.3 MB
|
COMMSEC - Model Robustness Will Hurt Data Privacy - Jiqiang Gao and Mengyun Tang.eng.srt
|
44.0 KB
|
COMMSEC - Model Robustness Will Hurt Data Privacy - Jiqiang Gao and Mengyun Tang.mp4
|
30.5 MB
|
COMMSEC - One Stop Anomaly Shop - Andrei Cotaie and Tiberiu Boros.mp4
|
30.0 MB
|
COMMSEC - OPENING - Shaping The Future Of The 0Day Market - Andrea Zapparoli Manzoni.eng.srt
|
36.7 KB
|
COMMSEC - OPENING - Shaping The Future Of The 0Day Market - Andrea Zapparoli Manzoni.mp4
|
26.8 MB
|
COMMSEC - The History Of Adversarial AI by Alex Polyakov and Eugene Neelou.eng.srt
|
49.9 KB
|
COMMSEC - The History Of Adversarial AI by Alex Polyakov and Eugene Neelou.mp4
|
24.5 MB
|
Dissecting Phishing Techniques Of CloudDragon APT - Linda Kuo & Zih-Cing Liao.eng.srt
|
63.0 KB
|
Dissecting Phishing Techniques Of CloudDragon APT - Linda Kuo & Zih-Cing Liao.mp4
|
40.7 MB
|
Exploiting QSEE, The Raelize Way - Cristofaro Mune and Niek Timmers.eng.srt
|
75.3 KB
|
Exploiting QSEE, The Raelize Way - Cristofaro Mune and Niek Timmers.mp4
|
39.5 MB
|
Grid Computing Attacks On Streaming Services - Yoon, - Myeong, Hwang, Yun & Kim.eng.srt
|
35.8 KB
|
Grid Computing Attacks On Streaming Services - Yoon, - Myeong, Hwang, Yun & Kim.mp4
|
30.1 MB
|
Hack Out Of The Box Discovering 10 Vulnerabilities In VirtualBox - Chen Nan.eng.srt
|
74.3 KB
|
Hack Out Of The Box Discovering 10 Vulnerabilities In VirtualBox - Chen Nan.mp4
|
38.1 MB
|
HATS - Ask Me Anything with Andrea Zapparoli Manzoni from Crowdfense.eng.srt
|
89.3 KB
|
HATS - Ask Me Anything with Andrea Zapparoli Manzoni from Crowdfense.mp4
|
88.2 MB
|
HATS - Catch Up With Edwin van Andel.eng.srt
|
54.5 KB
|
HATS - Catch Up With Edwin van Andel.mp4
|
34.7 MB
|
HATS - Catch up with Ero Carrera and Sergey Lozhkin.eng.srt
|
63.9 KB
|
HATS - Catch up with Ero Carrera and Sergey Lozhkin.mp4
|
42.4 MB
|
HATS - Catch up with Kevin Gallerin of Yes We Hack.eng.srt
|
51.9 KB
|
HATS - Catch up with Kevin Gallerin of Yes We Hack.mp4
|
29.6 MB
|
HATS - Interview with Sean Chen & Cory Tseng of Panasonic Security Lab.eng.srt
|
36.4 KB
|
HATS - Interview with Sean Chen & Cory Tseng of Panasonic Security Lab.mp4
|
29.7 MB
|
HATS - Post Keynote Q&A with Jon Callas from EFF.eng.srt
|
65.4 KB
|
HATS - Post Keynote Q&A with Jon Callas from EFF.mp4
|
52.4 MB
|
HATS - Post Talk Q&A with Bramwell Brizendine & Austin Babcock.eng.srt
|
28.4 KB
|
HATS - Post Talk Q&A with Bramwell Brizendine & Austin Babcock.mp4
|
20.2 MB
|
HATS - Post Talk Q&A with Cristofaro Mune & Niek Timmers.eng.srt
|
6.3 KB
|
HATS - Post Talk Q&A with Cristofaro Mune & Niek Timmers.mp4
|
14.2 MB
|
HATS - Post Talk Q&A with Kaijern 'Xwings' Lau.eng.srt
|
34.6 KB
|
HATS - Post Talk Q&A with Kaijern 'Xwings' Lau.mp4
|
33.9 MB
|
How I Found 16 Microsoft Office Excel Vulnerabilities In 6 Months - Quan Jin.eng.srt
|
52.9 KB
|
How I Found 16 Microsoft Office Excel Vulnerabilities In 6 Months - Quan Jin.mp4
|
31.7 MB
|
KEYNOTE 1 Surveillance Is Not The Answer What Is The Question - Jon Callas.eng.srt
|
82.2 KB
|
KEYNOTE 1 Surveillance Is Not The Answer What Is The Question - Jon Callas.mp4
|
40.8 MB
|
KEYNOTE 2 The State Of Mobile Security - Zuk Avraham.eng.srt
|
94.3 KB
|
KEYNOTE 2 The State Of Mobile Security - Zuk Avraham.mp4
|
42.5 MB
|
MacOS Security Escaping The Sandbox & Bypassing TCC - T. Alkemade and D. Keuper.eng.srt
|
97.3 KB
|
MacOS Security Escaping The Sandbox & Bypassing TCC - T. Alkemade and D. Keuper.mp4
|
46.7 MB
|
Mind The Bridge A New Attack Model For Hybird Mobile Applications - Ce Qin.eng.srt
|
57.1 KB
|
Mind The Bridge A New Attack Model For Hybird Mobile Applications - Ce Qin.mp4
|
43.8 MB
|
Security Analysis And Practical Attacks Of LPWAN - YuXiang Li & Wu HuiYu.eng.srt
|
58.4 KB
|
Security Analysis And Practical Attacks Of LPWAN - YuXiang Li & Wu HuiYu.mp4
|
37.2 MB
|
Should You Be Afraid Of Hands-On Payment Devices - T. Yunusov and A. Stennikov.eng.srt
|
51.8 KB
|
Should You Be Afraid Of Hands-On Payment Devices - T. Yunusov and A. Stennikov.mp4
|
24.3 MB
|
The Rise Of Potatoes Priv. Esc. In Windows Services - A. Pierini & A. Cocomazzi.eng.srt
|
106.4 KB
|
The Rise Of Potatoes Priv. Esc. In Windows Services - A. Pierini & A. Cocomazzi.mp4
|
83.5 MB
|
Utilizing Lol-Drivers In Post Exploitation Tradecraft - Bariş Akkaya.eng.srt
|
54.8 KB
|
Utilizing Lol-Drivers In Post Exploitation Tradecraft - Bariş Akkaya.mp4
|
42.7 MB
|
When Qiling Framework Meets Symbolic Execution - KJ Lau, Kong, ZiQiao & ChenXu.eng.srt
|
83.1 KB
|
When Qiling Framework Meets Symbolic Execution - KJ Lau, Kong, ZiQiao & ChenXu.mp4
|
76.4 MB
|
WoW Hell Rebuilding Heavens Gate - ShengHao Ma.eng.srt
|
45.5 KB
|
WoW Hell Rebuilding Heavens Gate - ShengHao Ma.mp4
|
41.2 MB
|
/HITB 2021 - CyberWeek/
|
5G Cyber Security Challenges And Solution - Hulk Zhang.eng.srt
|
92.6 KB
|
5G Cyber Security Challenges And Solution - Hulk Zhang.mp4
|
51.1 MB
|
A Retro- And Introspective Of The State Of Cyber - Roger Sels.eng.srt
|
80.2 KB
|
A Retro- And Introspective Of The State Of Cyber - Roger Sels.mp4
|
71.8 MB
|
Animated Bugs The New Remote Attack Surface In Telegram - Paolo Giai.eng.srt
|
77.0 KB
|
Animated Bugs The New Remote Attack Surface In Telegram - Paolo Giai.mp4
|
65.8 MB
|
Attack Scenarios Abusing Azure Active Directory - Bill Ben Haim & Zur Ulianitzky.eng.srt
|
88.9 KB
|
Attack Scenarios Abusing Azure Active Directory - Bill Ben Haim & Zur Ulianitzky.mp4
|
71.0 MB
|
Attacking Automated Manufacturing Systems - Stefano Zanero.mp4
|
75.4 MB
|
Car Hacking Village @ #HITBCyberWeek.mp4
|
637.6 KB
|
Catch Bill Hagestad's talk on cyber threat at #HITBCyberWeek.eng.srt
|
1.3 KB
|
Catch Bill Hagestad's talk on cyber threat at #HITBCyberWeek.mp4
|
1.2 MB
|
Code Intention Hiding Based on AI Uninterpretability - Jifeng Zhu & Keyun Luo.eng.srt
|
55.4 KB
|
Code Intention Hiding Based on AI Uninterpretability - Jifeng Zhu & Keyun Luo.mp4
|
36.5 MB
|
DeFi Crypto Cyber Security Challenges - Cesar Cerrudo.eng.srt
|
47.0 KB
|
DeFi Crypto Cyber Security Challenges - Cesar Cerrudo.mp4
|
35.3 MB
|
Electro-optical Sound Eavesdropping - Ben Nassi.eng.srt
|
90.3 KB
|
Electro-optical Sound Eavesdropping - Ben Nassi.mp4
|
77.6 MB
|
Fireside Chat With Barry - Fish - Van Kampen.eng.srt
|
43.9 KB
|
Fireside Chat With Barry - Fish - Van Kampen.mp4
|
38.1 MB
|
Fireside Chat With Cooper @Ministraitor.eng.srt
|
63.9 KB
|
Fireside Chat With Cooper @Ministraitor.mp4
|
39.8 MB
|
Fireside Chat With Cristofaro Mune & Adam Laurie.eng.srt
|
45.5 KB
|
Fireside Chat With Cristofaro Mune & Adam Laurie.mp4
|
27.3 MB
|
Fireside Chat With Dhillon ‘L33tdawg’ Kannabhiran.eng.srt
|
25.1 KB
|
Fireside Chat With Dhillon ‘L33tdawg’ Kannabhiran.mp4
|
13.0 MB
|
Fireside Chat with Mouza Al Romaithi.eng.srt
|
49.0 KB
|
Fireside Chat with Mouza Al Romaithi.mp4
|
29.1 MB
|
Fireside Chat With Nemo & Tim Murck from HackShield.eng.srt
|
54.2 KB
|
Fireside Chat With Nemo & Tim Murck from HackShield.mp4
|
49.2 MB
|
Fireside Chat With Stefano Zanero and Marco Balduzzi.eng.srt
|
59.6 KB
|
Fireside Chat With Stefano Zanero and Marco Balduzzi.mp4
|
41.3 MB
|
Fireside Chat With Youssef Awad with H.E. Dr. Mohamed Al-Kuwaiti.eng.srt
|
11.6 KB
|
Fireside Chat With Youssef Awad with H.E. Dr. Mohamed Al-Kuwaiti.mp4
|
9.1 MB
|
From A Workplace To A Workforce - Ofir Arkin.eng.srt
|
92.5 KB
|
From A Workplace To A Workforce - Ofir Arkin.mp4
|
82.6 MB
|
Gremlin Apps And Gremlin Botnets - Chema Alonso.eng.srt
|
73.3 KB
|
Gremlin Apps And Gremlin Botnets - Chema Alonso.mp4
|
76.3 MB
|
Hacking The Planet With Knowledge Graphs - Hugo Teso.mp4
|
71.6 MB
|
Harmony In Motion - Aloysius Cheang.eng.srt
|
30.1 KB
|
Harmony In Motion - Aloysius Cheang.mp4
|
21.4 MB
|
HITB CyberWeek 2021 - Brought to you by DisruptAD.mp4
|
1.4 MB
|
HITB CyberWeek 2021 - Day 2 Highlights.mp4
|
2.2 MB
|
HITB CyberWeek 2021 Badge Unboxing.eng.srt
|
4.1 KB
|
HITB CyberWeek 2021 Badge Unboxing.mp4
|
5.0 MB
|
HITB LAB - EXPLIoT Framework - Aseem Jakhar.eng.srt
|
107.7 KB
|
HITB LAB - EXPLIoT Framework - Aseem Jakhar.mp4
|
113.2 MB
|
HITB LAB ARM IoT Firmware Extraction And Emulation Using ARMX - Saumil Shah.eng.srt
|
113.8 KB
|
HITB LAB ARM IoT Firmware Extraction And Emulation Using ARMX - Saumil Shah.mp4
|
117.5 MB
|
HITBCyberWeek Event Highlights - Day 1.mp4
|
2.3 MB
|
How To Defeat EDRs In Usermode - Alessandro Magnosi & Jean Francois Maes.eng.srt
|
107.0 KB
|
How To Defeat EDRs In Usermode - Alessandro Magnosi & Jean Francois Maes.mp4
|
94.2 MB
|
Hunting For Malicious Infrastructure Using Big Data by Freek Bax And Shadi Alhakimi.mp4
|
56.7 MB
|
Join Aviation Cybersecurity Researcher, Hugo Teso at #HITBCyberWeek.eng.srt
|
1.2 KB
|
Join Aviation Cybersecurity Researcher, Hugo Teso at #HITBCyberWeek.mp4
|
1.3 MB
|
Join Chema Alonso, one of the world’s leading hacking and cybersecurity experts, at #HITBCyberWeek.eng.srt
|
1.0 KB
|
Join Chema Alonso, one of the world’s leading hacking and cybersecurity experts, at #HITBCyberWeek.mp4
|
1.5 MB
|
Join Cybersecurity researcher Ben Nassi at #HITBCyberWeek.eng.srt
|
0.9 KB
|
Join Cybersecurity researcher Ben Nassi at #HITBCyberWeek.mp4
|
544.7 KB
|
KEYNOTE 1 Alt-Payments And Crypto The Future Is Now - Matt Johnson.eng.srt
|
79.6 KB
|
KEYNOTE 1 Alt-Payments And Crypto The Future Is Now - Matt Johnson.mp4
|
59.4 MB
|
Knockin' On MediaTek ADSP’s Door - Slava Makkaveev.eng.srt
|
57.7 KB
|
Knockin' On MediaTek ADSP’s Door - Slava Makkaveev.mp4
|
47.5 MB
|
Launching A New Password Hashing Competition - Sebastien Raveau.eng.srt
|
123.1 KB
|
Launching A New Password Hashing Competition - Sebastien Raveau.mp4
|
99.5 MB
|
Learn new skills @ #HITBCyberWeek.mp4
|
678.6 KB
|
Low Level BootROM Protocol Fuzzing Secure Memory Regions - Sulthan Alaudee.eng.srt
|
83.7 KB
|
Low Level BootROM Protocol Fuzzing Secure Memory Regions - Sulthan Alaudee.mp4
|
61.6 MB
|
Malicious Contracts - Kyprianos Vasilopoulos and Christian Papathansiou.eng.srt
|
52.2 KB
|
Malicious Contracts - Kyprianos Vasilopoulos and Christian Papathansiou.mp4
|
37.7 MB
|
Military Bioweapons Dev. & Information Warfare - William Hagestad II.eng.srt
|
79.9 KB
|
Military Bioweapons Dev. & Information Warfare - William Hagestad II.mp4
|
49.1 MB
|
MIPS-X The Next IoT Frontier - Patrick Ross & Zoltan Balazs.eng.srt
|
61.0 KB
|
MIPS-X The Next IoT Frontier - Patrick Ross & Zoltan Balazs.mp4
|
71.2 MB
|
Modern Post Exploitation The Ghost In The Cloud - Gal Diskin.eng.srt
|
105.2 KB
|
Modern Post Exploitation The Ghost In The Cloud - Gal Diskin.mp4
|
87.4 MB
|
Opening Keynote by H.E. Dr. Mohamed Al-Kuwaiti.eng.srt
|
17.7 KB
|
Opening Keynote by H.E. Dr. Mohamed Al-Kuwaiti.mp4
|
17.2 MB
|
Panel 38°C Healthcare At A Fever Pitch - Biohacking Village.eng.srt
|
120.8 KB
|
Panel 38°C Healthcare At A Fever Pitch - Biohacking Village.mp4
|
69.3 MB
|
Payment Village @ #HITBCyberWeek.mp4
|
529.1 KB
|
Rage Against The Machine Clear - Enrico Barberis & Hany Ragab.eng.srt
|
78.1 KB
|
Rage Against The Machine Clear - Enrico Barberis & Hany Ragab.mp4
|
61.1 MB
|
Response Smuggling Pwning HTTP 1.1 Connections - Martin Doyhenard.eng.srt
|
97.7 KB
|
Response Smuggling Pwning HTTP 1.1 Connections - Martin Doyhenard.mp4
|
79.5 MB
|
Reversing GO Binaries With Ghidra - Albert Zsigovits and Dorka Palotay.eng.srt
|
66.4 KB
|
Reversing GO Binaries With Ghidra - Albert Zsigovits and Dorka Palotay.mp4
|
53.5 MB
|
Security Framework Challenges & Solutions - G. Singh, M. Baddeley & A. Pandey.eng.srt
|
95.3 KB
|
Security Framework Challenges & Solutions - G. Singh, M. Baddeley & A. Pandey.mp4
|
74.2 MB
|
Software Security Analysis Present And Future Research Initiatives - Sanjay Rawat.eng.srt
|
92.5 KB
|
Software Security Analysis Present And Future Research Initiatives - Sanjay Rawat.mp4
|
77.1 MB
|
Thank you for being a part of #HITBCyberWeek 2021.mp4
|
588.4 KB
|
TRAINING - A Practical Approach to Malware Analysis and Memory Forensics.eng.srt
|
3.0 KB
|
TRAINING - A Practical Approach to Malware Analysis and Memory Forensics.mp4
|
2.4 MB
|
TRAINING - Abusing Active Directory.eng.srt
|
0.6 KB
|
TRAINING - Abusing Active Directory.mp4
|
2.7 MB
|
TRAINING - IC Reverse Engineering & Code Extraction.mp4
|
1.9 MB
|
TRAINING - In & Out - Attack, Detection & Hunting with PurpleLabs Windows and Linux.eng.srt
|
3.9 KB
|
TRAINING - In & Out - Attack, Detection & Hunting with PurpleLabs Windows and Linux.mp4
|
4.3 MB
|
TRAINING - Linux Heap Exploitation.eng.srt
|
6.7 KB
|
TRAINING - Linux Heap Exploitation.mp4
|
5.4 MB
|
TRAINING - Rust Security Audit and Fuzzing.eng.srt
|
2.9 KB
|
TRAINING - Rust Security Audit and Fuzzing.mp4
|
3.5 MB
|
TRAINING - Software Deobfuscation Techniques.mp4
|
997.7 KB
|
TRAINING - TEEPwn Breaking TEEs by Experience.eng.srt
|
8.1 KB
|
TRAINING - TEEPwn Breaking TEEs by Experience.mp4
|
2.9 MB
|
TRAINING - x86-64 All You Can Learn Buffet.eng.srt
|
5.7 KB
|
TRAINING - x86-64 All You Can Learn Buffet.mp4
|
4.8 MB
|
What’s happening in the world of cryptocurrency Join Matt Johnson, at #HITBCyberWeek.eng.srt
|
1.5 KB
|
What’s happening in the world of cryptocurrency Join Matt Johnson, at #HITBCyberWeek.mp4
|
1.6 MB
|
When Fuzzing Meets SAP Network Services - Yvan Genuer.eng.srt
|
71.6 KB
|
When Fuzzing Meets SAP Network Services - Yvan Genuer.mp4
|
76.2 MB
|
Who Littered The Sandbox Scooping Up New Malware Behavior - Olaf Hartong.eng.srt
|
92.1 KB
|
Who Littered The Sandbox Scooping Up New Malware Behavior - Olaf Hartong.mp4
|
75.6 MB
|
WIFI Security From 0 To 1 - Sili Luo.eng.srt
|
79.3 KB
|
WIFI Security From 0 To 1 - Sili Luo.mp4
|
43.6 MB
|
/HITB 2021 - Singapore/
|
A Fuzzy Kind of HITB Armory with Matteo Beccaro and Rocco Calvi.eng.srt
|
52.4 KB
|
A Fuzzy Kind of HITB Armory with Matteo Beccaro and Rocco Calvi.mp4
|
36.9 MB
|
Catch Up With Aloysius Cheang.eng.srt
|
55.3 KB
|
Catch Up With Aloysius Cheang.mp4
|
41.7 MB
|
Catch Up With Emmanuel Gadaix.eng.srt
|
62.8 KB
|
Catch Up With Emmanuel Gadaix.mp4
|
45.5 MB
|
Catch Up With Fatih Ozavci.eng.srt
|
55.0 KB
|
Catch Up With Fatih Ozavci.mp4
|
39.2 MB
|
Catch up with Sensepost.eng.srt
|
54.0 KB
|
Catch up with Sensepost.mp4
|
35.4 MB
|
Catch Up With The Grugq.eng.srt
|
62.4 KB
|
Catch Up With The Grugq.mp4
|
47.5 MB
|
Container Escape In 2021 - Li Qiang.eng.srt
|
63.8 KB
|
Container Escape In 2021 - Li Qiang.mp4
|
34.3 MB
|
Exploiting UAF By Ret2bpf In Android Kernel - Xingyu Jin & Richard Neal.eng.srt
|
76.1 KB
|
Exploiting UAF By Ret2bpf In Android Kernel - Xingyu Jin & Richard Neal.mp4
|
42.9 MB
|
Framework to Examine Mobile App Privacy - Zhang Qing, Zeyu Wang & Guangdong Bai.eng.srt
|
64.9 KB
|
Framework to Examine Mobile App Privacy - Zhang Qing, Zeyu Wang & Guangdong Bai.mp4
|
42.9 MB
|
Fuzzing RDP Client And Server - Shaked Reiner & Or Ben-Porath.eng.srt
|
80.8 KB
|
Fuzzing RDP Client And Server - Shaked Reiner & Or Ben-Porath.mp4
|
32.2 MB
|
Going Deeper Into Schneider Modicon PAC Security - Gao Jian.eng.srt
|
64.5 KB
|
Going Deeper Into Schneider Modicon PAC Security - Gao Jian.mp4
|
53.1 MB
|
IDA2Obj Static Binary Instrumentation On Steroids - Mickey Jin.eng.srt
|
48.5 KB
|
IDA2Obj Static Binary Instrumentation On Steroids - Mickey Jin.mp4
|
42.0 MB
|
Is Attestation All We Need Fooling Apple’s AppAttest API - Igor Lyrchikov.eng.srt
|
72.4 KB
|
Is Attestation All We Need Fooling Apple’s AppAttest API - Igor Lyrchikov.mp4
|
29.8 MB
|
Make JDBC Attacks Brilliant Again - Xu Yuanzhen & Chen Hongkun.eng.srt
|
54.3 KB
|
Make JDBC Attacks Brilliant Again - Xu Yuanzhen & Chen Hongkun.mp4
|
40.7 MB
|
Malware Protocol Simulations In Distributed Networks - Fatih Ozavci.eng.srt
|
114.6 KB
|
Malware Protocol Simulations In Distributed Networks - Fatih Ozavci.mp4
|
70.9 MB
|
Post Talk Q&A With Alex Polyakov.eng.srt
|
39.9 KB
|
Post Talk Q&A With Alex Polyakov.mp4
|
33.0 MB
|
Post Talk Q&A with Harshit Agrawal.mp4
|
21.3 MB
|
Post Talk Q&A With Jeremy Brown.eng.srt
|
21.4 KB
|
Post Talk Q&A With Jeremy Brown.mp4
|
15.3 MB
|
Post Talk Q&A with Mark Dowd.eng.srt
|
46.0 KB
|
Post Talk Q&A with Mark Dowd.mp4
|
33.6 MB
|
Post Talk Q&A With Paul Vixie.eng.srt
|
45.4 KB
|
Post Talk Q&A With Paul Vixie.mp4
|
38.0 MB
|
Post Talk Q&A With Xingyu Jin & Richard Neal.eng.srt
|
25.4 KB
|
Post Talk Q&A With Xingyu Jin & Richard Neal.mp4
|
19.5 MB
|
Post-Talk Q&A with Imdadullah Mohammed & Shiv Sahni.eng.srt
|
30.5 KB
|
Post-Talk Q&A with Imdadullah Mohammed & Shiv Sahni.mp4
|
24.6 MB
|
Practical AI Red Teaming A Facial Recognition Case Study - Alex Polyakov.eng.srt
|
76.8 KB
|
Practical AI Red Teaming A Facial Recognition Case Study - Alex Polyakov.mp4
|
39.4 MB
|
Pre-CTF Training Session - Day 1.eng.srt
|
283.8 KB
|
Pre-CTF Training Session - Day 1.mp4
|
191.3 MB
|
Pre-CTF Training Session - Day 2.eng.srt
|
245.0 KB
|
Pre-CTF Training Session - Day 2.mp4
|
205.4 MB
|
Protective DNS Why It Matters And Deploying It With No Cloud - Paul Vixie.eng.srt
|
96.6 KB
|
Protective DNS Why It Matters And Deploying It With No Cloud - Paul Vixie.mp4
|
41.1 MB
|
Scaling Up Offensive Pipelines - Gil Biton.eng.srt
|
89.6 KB
|
Scaling Up Offensive Pipelines - Gil Biton.mp4
|
72.7 MB
|
Securing Webviews and The Story Behind CVE-2021-21136 - Imdadullah M. - & Shiv S..eng.srt
|
89.4 KB
|
Securing Webviews and The Story Behind CVE-2021-21136 - Imdadullah M. - & Shiv S.mp4
|
46.5 MB
|
Security Technology Arms Race 2021 - Medal Event - Mark Dowd.eng.srt
|
119.9 KB
|
Security Technology Arms Race 2021 - Medal Event - Mark Dowd.mp4
|
52.0 MB
|
SHADOWPAD Chinese Espionage Malware-as-a-Service - Yi-Jhen Hsieh & Joey Chen.eng.srt
|
66.4 KB
|
SHADOWPAD Chinese Espionage Malware-as-a-Service - Yi-Jhen Hsieh & Joey Chen.mp4
|
25.9 MB
|
Squashing Low-hanging Fruit In Embedded Software - D. Dos Santos & S. Menashe.eng.srt
|
118.4 KB
|
Squashing Low-hanging Fruit In Embedded Software - D. Dos Santos & S. Menashe.mp4
|
63.7 MB
|
Summer Of Fuzz MacOS - Jeremy Brown.eng.srt
|
72.8 KB
|
Summer Of Fuzz MacOS - Jeremy Brown.mp4
|
27.3 MB
|
Taking Ghidra To The Next Level - Zhanzhao Ding.eng.srt
|
86.1 KB
|
Taking Ghidra To The Next Level - Zhanzhao Ding.mp4
|
27.8 MB
|
The Road to PRO CTF Finals Starts Now with Y Awad, A Attalla and K Plotnikov.eng.srt
|
26.2 KB
|
The Road to PRO CTF Finals Starts Now with Y Awad, A Attalla and K Plotnikov.mp4
|
20.2 MB
|
trapfuzzer Coverage-guided Binary Fuzzing with Breakpoints - Sili Luo.eng.srt
|
74.3 KB
|
trapfuzzer Coverage-guided Binary Fuzzing with Breakpoints - Sili Luo.mp4
|
38.4 MB
|
Welcome to Day 1.eng.srt
|
10.9 KB
|
Welcome to Day 1.mp4
|
8.5 MB
|
Welcome To Day 2.eng.srt
|
10.7 KB
|
Welcome To Day 2.mp4
|
8.0 MB
|
What Modern RF Combat Looks Like In The Next Decade - Harshit Agrawal.eng.srt
|
122.4 KB
|
What Modern RF Combat Looks Like In The Next Decade - Harshit Agrawal.mp4
|
66.0 MB
|
/HITB 2022 - Singapore/
|
API Security Through External Attack Surface Management - Phillip Wylie.eng.srt
|
59.7 KB
|
API Security Through External Attack Surface Management - Phillip Wylie.mp4
|
35.8 MB
|
Attacking WPA3 New Vulnerabilities And Exploit Framework - Mathy Vanhoef.eng.srt
|
107.9 KB
|
Attacking WPA3 New Vulnerabilities And Exploit Framework - Mathy Vanhoef.mp4
|
74.5 MB
|
Biometrics System Hacking In The Age Of The Smart Vehicle - K. Chen & L. Siwei.eng.srt
|
44.7 KB
|
Biometrics System Hacking In The Age Of The Smart Vehicle - K. Chen & L. Siwei.mp4
|
33.9 MB
|
Breaking Web3 Exploitation Techniques For Cryptocurrency Hacking - David Pethes.eng.srt
|
86.9 KB
|
Breaking Web3 Exploitation Techniques For Cryptocurrency Hacking - David Pethes.mp4
|
85.2 MB
|
Browser Hacking With ANGLE - Jeonghoon Shin.eng.srt
|
60.8 KB
|
Browser Hacking With ANGLE - Jeonghoon Shin.mp4
|
58.4 MB
|
Building An Army Of Bots By Hijacking a Twitter Handle - R. Sasi & V. Singh.eng.srt
|
61.7 KB
|
Building An Army Of Bots By Hijacking a Twitter Handle - R. Sasi & V. Singh.mp4
|
51.7 MB
|
Can A Fuzzer Match A Human - Bhargava Shastry.eng.srt
|
51.8 KB
|
Can A Fuzzer Match A Human - Bhargava Shastry.mp4
|
35.2 MB
|
Cracking Kyocera Printers - Yue Liu and Juyang Gao & Minghang Shen.mp4
|
25.7 MB
|
E'rybody Gettin' TIPC Demystifying Remote Linux Kernel Exploitation - Sam Page.eng.srt
|
118.1 KB
|
E'rybody Gettin' TIPC Demystifying Remote Linux Kernel Exploitation - Sam Page.mp4
|
71.4 MB
|
EDR Evasion Primer For Red Teamers - Jorge Gimenez & Karsten Nohl.eng.srt
|
119.2 KB
|
EDR Evasion Primer For Red Teamers - Jorge Gimenez & Karsten Nohl.mp4
|
96.0 MB
|
Exploiting A Limited UAF On Ubuntu 22.04 To Achieve LPE - Aaron Adams.eng.srt
|
110.3 KB
|
Exploiting A Limited UAF On Ubuntu 22.04 To Achieve LPE - Aaron Adams.mp4
|
73.7 MB
|
Exploiting Race Condition Vulnerabilities In Web Applications - Javan Rasokat.eng.srt
|
48.3 KB
|
Exploiting Race Condition Vulnerabilities In Web Applications - Javan Rasokat.mp4
|
39.4 MB
|
Faking At Level 1 How Digital Twins Save Your PLCs - Thomas Weber.eng.srt
|
48.5 KB
|
Faking At Level 1 How Digital Twins Save Your PLCs - Thomas Weber.mp4
|
40.6 MB
|
Fuzzing The MCU Of Connected Vehicles For Security And Safety - Hao Chen.eng.srt
|
31.3 KB
|
Fuzzing The MCU Of Connected Vehicles For Security And Safety - Hao Chen.mp4
|
16.2 MB
|
Getting Clear Text Passwords From An IdP & More - Gal Diskin.eng.srt
|
55.6 KB
|
Getting Clear Text Passwords From An IdP & More - Gal Diskin.mp4
|
46.8 MB
|
ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices - Jos Wetzels.eng.srt
|
109.1 KB
|
ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices - Jos Wetzels.mp4
|
55.9 MB
|
Information Collection Of Third-party SDKs - W. Kailong W. Zeyu B. Guangdong & Z. Qing.eng.srt
|
59.5 KB
|
Information Collection Of Third-party SDKs - W. Kailong W. Zeyu B. Guangdong & Z. Qing.mp4
|
52.4 MB
|
KEYNOTE 1 - Random Walk Through A Few Million Things - Chris Rouland.eng.srt
|
128.0 KB
|
KEYNOTE 1 - Random Walk Through A Few Million Things - Chris Rouland.mp4
|
107.9 MB
|
KEYNOTE 2 Adventures In Security Research - Runa Sandvik.eng.srt
|
112.0 KB
|
KEYNOTE 2 Adventures In Security Research - Runa Sandvik.mp4
|
102.9 MB
|
LAB Advanced Code Obfuscation With MBA Expressions - Arnau Gàmez Montolio.eng.srt
|
215.8 KB
|
LAB Advanced Code Obfuscation With MBA Expressions - Arnau Gàmez Montolio.mp4
|
166.3 MB
|
LAB Template Injection On Hardened Targets - Lucas ‘BitK’ Philippe.eng.srt
|
117.5 KB
|
LAB Template Injection On Hardened Targets - Lucas ‘BitK’ Philippe.mp4
|
136.0 MB
|
MPT Pentest In Action - Jyoti Raval.eng.srt
|
46.1 KB
|
MPT Pentest In Action - Jyoti Raval.mp4
|
37.9 MB
|
One-Click To Completely Takeover A MacOS Device - Mickey Jin.eng.srt
|
67.5 KB
|
One-Click To Completely Takeover A MacOS Device - Mickey Jin.mp4
|
62.3 MB
|
Scripts-behavioral ML Classification Using Windows 10 AMSI-instrumentation - Ankit Garg.eng.srt
|
85.9 KB
|
Scripts-behavioral ML Classification Using Windows 10 AMSI-instrumentation - Ankit Garg.mp4
|
71.4 MB
|
Simulating Execution In Malicious Text Detection - S. Wang & Y Sun.mp4
|
18.6 MB
|
Suborner Windows Bribery For Invisible Persistence - Sebastian Castro.eng.srt
|
105.7 KB
|
Suborner Windows Bribery For Invisible Persistence - Sebastian Castro.mp4
|
93.6 MB
|
The Ransomware Protection Full Of Holes - Soya Aoyama.eng.srt
|
32.5 KB
|
The Ransomware Protection Full Of Holes - Soya Aoyama.mp4
|
58.8 MB
|
Unlocking KeeLoq A Reverse Engineering Story - Rogan Dawes.eng.srt
|
94.6 KB
|
Unlocking KeeLoq A Reverse Engineering Story - Rogan Dawes.mp4
|
76.2 MB
|
Web3 - Scams = It’s A Match - Zoltan Balazs.eng.srt
|
51.3 KB
|
Web3 - Scams = It’s A Match - Zoltan Balazs.mp4
|
53.4 MB
|
/HITB 2023 - Amsterdam/
|
A Deep Dive Into GarminOS And Its MonkeyC Virtual Machine - Tao Sauvage.eng.srt
|
95.3 KB
|
A Deep Dive Into GarminOS And Its MonkeyC Virtual Machine - Tao Sauvage.mp4
|
71.0 MB
|
A Tale Of Building A REAL Full Speed Anti-Censorship Router - KaiJern Lau.eng.srt
|
83.0 KB
|
A Tale Of Building A REAL Full Speed Anti-Censorship Router - KaiJern Lau.mp4
|
79.6 MB
|
Active Directory Abuse Primitives And Operation Security - M. Cheng & D. Chen.eng.srt
|
98.4 KB
|
Active Directory Abuse Primitives And Operation Security - M. Cheng & D. Chen.mp4
|
88.2 MB
|
Advanced DMA Reentrancy Techniques To Escape QEMU - A. Wang & Q. Jin.mp4
|
41.1 MB
|
An Analysis Of Computer Numerical Control Machines In Industry 4.0 - M. Balduzzi.eng.srt
|
83.6 KB
|
An Analysis Of Computer Numerical Control Machines In Industry 4.0 - M. Balduzzi.mp4
|
68.0 MB
|
Automated Black-box Security Testing Of Smart Embedded Devices - A. Continella.eng.srt
|
89.7 KB
|
Automated Black-box Security Testing Of Smart Embedded Devices - A. Continella.mp4
|
61.8 MB
|
Bypassing Anti-Cheats And Hacking Competitive Games - Rohan Aggarwal.eng.srt
|
78.5 KB
|
Bypassing Anti-Cheats And Hacking Competitive Games - Rohan Aggarwal.mp4
|
81.5 MB
|
ChatGPT Please Write Me A Piece Of Polymorphic Malware - E Shimony & O. Tsarfati.eng.srt
|
74.8 KB
|
ChatGPT Please Write Me A Piece Of Polymorphic Malware - E Shimony & O. Tsarfati.mp4
|
55.1 MB
|
CLOSING KEYNOTE - The Hand That Strikes, Also Blocks - Saumil Shah.eng.srt
|
63.3 KB
|
CLOSING KEYNOTE - The Hand That Strikes, Also Blocks - Saumil Shah.mp4
|
51.3 MB
|
CommSec - All You Always Wanted To Know About AntiViruses - Marcus Botacin.eng.srt
|
77.8 KB
|
CommSec - All You Always Wanted To Know About AntiViruses - Marcus Botacin.mp4
|
58.1 MB
|
CommSec - API Security In The Age Of Microservices - Ali Abdollahi.eng.srt
|
46.7 KB
|
CommSec - API Security In The Age Of Microservices - Ali Abdollahi.mp4
|
47.5 MB
|
CommSec - Exploring JARM - An Active TLS Fingerprinting Algorithm - Mohamad Mokbel.eng.srt
|
99.4 KB
|
CommSec - Exploring JARM - An Active TLS Fingerprinting Algorithm - Mohamad Mokbel.mp4
|
94.0 MB
|
CommSec - Feeding Gophers To Ghidra - Max Kersten.eng.srt
|
110.4 KB
|
CommSec - Feeding Gophers To Ghidra - Max Kersten.mp4
|
81.8 MB
|
CommSec - Kubernetes Security Detection Engineering - Madhu Akula.eng.srt
|
72.3 KB
|
CommSec - Kubernetes Security Detection Engineering - Madhu Akula.mp4
|
50.6 MB
|
CommSec - Nomadic Honeypots How To Create Actionable CTI - Laurent Oudot.eng.srt
|
108.9 KB
|
CommSec - Nomadic Honeypots How To Create Actionable CTI - Laurent Oudot.mp4
|
100.3 MB
|
CommSec - PANEL Evolution Of Learning What Cyber Security Training Looks Like In 2023.eng.srt
|
121.9 KB
|
CommSec - PANEL Evolution Of Learning What Cyber Security Training Looks Like In 2023.mp4
|
124.4 MB
|
CommSec - Red Wizard - A User-friendly Infrastructure For Red Teams - Ben Brucker.eng.srt
|
100.6 KB
|
CommSec - Red Wizard - A User-friendly Infrastructure For Red Teams - Ben Brucker.mp4
|
89.3 MB
|
CommSec - The Return Of Stack Overflows In The Linux Kernel - Davide Ornaghi.eng.srt
|
41.0 KB
|
CommSec - The Return Of Stack Overflows In The Linux Kernel - Davide Ornaghi.mp4
|
34.1 MB
|
CommSec - Upgrading Rollback Agnostic Replay Attacks - Carlos Gomez.eng.srt
|
48.8 KB
|
CommSec - Upgrading Rollback Agnostic Replay Attacks - Carlos Gomez.mp4
|
58.4 MB
|
CommSec - Welcome Note - Matteo Beccaro.eng.srt
|
5.6 KB
|
CommSec - Welcome Note - Matteo Beccaro.mp4
|
4.7 MB
|
Current State Of IOS Malware Detection - Matthias Frielingsdorf.eng.srt
|
113.6 KB
|
Current State Of IOS Malware Detection - Matthias Frielingsdorf.mp4
|
75.0 MB
|
Exploiting IPC With New Desynchronization Primitives - Martin Doyhenard.eng.srt
|
88.6 KB
|
Exploiting IPC With New Desynchronization Primitives - Martin Doyhenard.mp4
|
57.9 MB
|
How MySQL Servers Can Attack YOU - Alexander Rubin & Martin Rakhmanov.eng.srt
|
65.8 KB
|
How MySQL Servers Can Attack YOU - Alexander Rubin & Martin Rakhmanov.mp4
|
74.2 MB
|
Hunting Windows Desktop Window Manager Bugs - Z. WangJunjie, Y. He & W. Li.eng.srt
|
69.8 KB
|
Hunting Windows Desktop Window Manager Bugs - Z. WangJunjie, Y. He & W. Li.mp4
|
57.0 MB
|
Investigating Web3 With OSINT - Dhia Mahjoub.eng.srt
|
85.1 KB
|
Investigating Web3 With OSINT - Dhia Mahjoub.mp4
|
35.1 MB
|
KEYNOTE The Myths Of Software Security - Mark Curphey.eng.srt
|
86.0 KB
|
KEYNOTE The Myths Of Software Security - Mark Curphey.mp4
|
70.9 MB
|
Nakatomi Space Lateral Movement As L1 Post-Exploitation In OT - Jos Wetzels.eng.srt
|
113.8 KB
|
Nakatomi Space Lateral Movement As L1 Post-Exploitation In OT - Jos Wetzels.mp4
|
82.7 MB
|
Next Generation Virtualization-Based Obfuscators - T. Blazytko & M. Schloegel.eng.srt
|
95.3 KB
|
Next Generation Virtualization-Based Obfuscators - T. Blazytko & M. Schloegel.mp4
|
89.8 MB
|
PANEL DISCUSSION iOS OS X Security (moderated by Dhillon 'L33tdawg' Kannabhiran).eng.srt
|
78.8 KB
|
PANEL DISCUSSION iOS OS X Security (moderated by Dhillon 'L33tdawg' Kannabhiran).mp4
|
75.7 MB
|
Privilege Escalation Using DOP In MacOS - Y. Lee, J. Choi, J. Lee & S. Song.eng.srt
|
36.8 KB
|
Privilege Escalation Using DOP In MacOS - Y. Lee, J. Choi, J. Lee & S. Song.mp4
|
36.5 MB
|
Prize Giving & Closing Note by Dhillon 'L33tdawg' Kannabhiran.eng.srt
|
35.7 KB
|
Prize Giving & Closing Note by Dhillon 'L33tdawg' Kannabhiran.mp4
|
31.0 MB
|
Smart Speaker Shenanigans Making The SONOS One Sing - Peter Geissler.eng.srt
|
89.8 KB
|
Smart Speaker Shenanigans Making The SONOS One Sing - Peter Geissler.mp4
|
74.9 MB
|
SOHO Hacking At Pwn2Own - Alex Plaskett & McCaulay Hudson.eng.srt
|
102.1 KB
|
SOHO Hacking At Pwn2Own - Alex Plaskett & McCaulay Hudson.mp4
|
83.8 MB
|
Syscalls In Shellcode Techniques For Malicious Functionality - B. Brizendine.eng.srt
|
119.4 KB
|
Syscalls In Shellcode Techniques For Malicious Functionality - B. Brizendine.mp4
|
94.7 MB
|
XRP Raid Protector Killing A Critical Bug Worth 40 Billion Dollars - Haoyu Yang.eng.srt
|
38.2 KB
|
XRP Raid Protector Killing A Critical Bug Worth 40 Billion Dollars - Haoyu Yang.mp4
|
40.7 MB
|
Total files 1660
|