FileMood

Download Hack In The Box

Hack In The Box

Name

Hack In The Box

 DOWNLOAD Copy Link

Total Size

56.0 GB

Total Files

1660

Hash

F60DAE99686BF549BEEA471A30CB77337FB3B980

/

Hack in the Box thank you.txt

1.0 KB

hitb logo.png

29.6 KB

/HITB 2003 - Malaysia/

bt1.mp4

66.6 MB

bt2.mp4

42.8 MB

bt3.mp4

34.2 MB

bt4.mp4

39.8 MB

bt5.mp4

46.3 MB

bt6.mp4

18.6 MB

panel.mp4

80.5 MB

tt1.mp4

108.6 MB

tt2.mp4

56.0 MB

tt3.mp4

68.2 MB

tt4.mp4

60.0 MB

tt5.mp4

61.4 MB

tt6.mp4

76.3 MB

tt7.mp4

89.8 MB

tt8.mp4

48.1 MB

tt9.mp4

80.3 MB

/proceedings/

hitb04-adam-gowdiak.pdf

56.4 MB

hitb04-captain-crunch-01.pdf

41.7 KB

hitb04-captain-crunch-02.pdf

38.6 KB

hitb04-chew-keong-tan.pdf

9.0 MB

hitb04-emmanuel-gadaix.pdf

43.8 MB

hitb04-fyodor-meder.pdf

880.4 KB

hitb04-gareth-davies.pdf

589.7 KB

hitb04-grugq.pdf

1.1 MB

hitb04-jose-nazario.pdf

458.4 KB

hitb04-kamal-hilmi.tgz

657.1 KB

hitb04-roberto-fabio.pdf

2.1 MB

hitb04-shreeraj-shah.pdf

583.6 KB

hitb04-sk-chong.pdf

988.5 KB

hitb04-sukhdev-singh.pdf

13.8 MB

hitb04-teo-sze-siong.zip

364.7 KB

hitb04-theo-deraadt.zip

2.7 MB

hitb04-toh-swee-hoe.pdf

6.7 MB

/videos/

adam gowdiak.mp4

97.6 MB

emmanuel gadaix.mp4

94.1 MB

fyodor and meder.mp4

46.0 MB

gareth davies.mp4

31.0 MB

grugq.mp4

48.0 MB

jorge sebastiao.mp4

33.5 MB

jose nazario.mp4

55.8 MB

keynote 1 theo de raadt.mp4

48.3 MB

panel discussion.mp4

53.6 MB

roberto and fabio.mp4

69.9 MB

shreeraj shah.mp4

69.2 MB

sk chong.mp4

82.1 MB

sukdev singh.mp4

47.9 MB

suresh ramasamy.mp4

31.9 MB

teo sze siong.mp4

48.0 MB

toh swee hoe.mp4

60.8 MB

/proceedings/

BT-Anthony-Zboralski-Social-Engineering.pdf

1.1 MB

BT-Fabrice-Marie-Hacking-Internet-Banking-Applications.pdf

1.2 MB

BT-Raoul-Chiesa-X25-Security.pdf

1.1 MB

BT-Roberto-Preatoni-Fabio-Ghioni-Corp-vs-Corp.ppt

7.5 MB

BT-Tim-Pritlove-Blinkenlights-Arcade-Project.pdf

5.3 MB

HITB.gif

14.4 KB

Keynote-Mikko-Hypponen-Mobile-Malware.pdf

3.6 MB

Keynote-Tony-Chor-IE-Security-Past-Present-and-Future.ppt

5.1 MB

Mark Schoenefeld - Java and Secure Programming.pdf

3.7 MB

TT-Dave-Aitel-Nematodes.zip

63.3 KB

TT-Fyodor-Yarochkin-Meder-Kydyraliev-STIFware-Evolution.ppt

491.0 KB

TT-Jim-Geovedi-Hotspot-Security.pdf

789.6 KB

TT-Joanna-Rutkowska-HITB-Virginity-Verifier.ppt

540.7 KB

TT-Jose-Nazario-Analyzing-all-that-data.pdf

806.3 KB

TT-Nish-Bhalla-Defects-Overview.pdf

614.9 KB

TT-Roelof-Temmingh-State-of-the-art.ppt

2.6 MB

TT-San-Hacking-Windows-CE.ppt

900.1 KB

TT-Shreeraj-Shah-Webhacking-Kungfu.pdf

294.0 KB

TT-The-Grugq-VoIPPhreaking.ppt

137.2 KB

/video/

Analyzing Code.mp4

34.1 MB

Assesing Srv Sec.mp4

59.9 MB

Beneficial Worms.mp4

60.5 MB

Build Sec Oper Center.mp4

60.4 MB

CCC.mp4

62.2 MB

Cyber Skirmishes.mp4

45.3 MB

Fabrice M.mp4

87.1 MB

Fyodor Y.mp4

81.2 MB

Hacking WinCE.mp4

63.0 MB

HckInternet Banking App.mp4

59.5 MB

IE-Security.mp4

90.1 MB

Java & Sec Programming.mp4

58.9 MB

Jim Geove.mp4

50.7 MB

Joanna Ru.mp4

87.0 MB

Marc Scho.mp4

87.1 MB

Mobile Malware.mp4

81.0 MB

Modern Espionage.mp4

54.9 MB

Raoul Chi.mp4

98.1 MB

Real World Attacks.mp4

36.6 MB

Roberto P.mp4

80.0 MB

Roelof T.mp4

87.3 MB

Rohyt Bel.mp4

53.1 MB

Social Engineering Fundam.mp4

68.2 MB

STIF-wareEvol.mp4

55.9 MB

Stifting Haystacks.mp4

43.8 MB

The Grugq.mp4

99.6 MB

VoIPhreaking.mp4

65.6 MB

WHcking Kung FU.mp4

50.5 MB

wifi Hotspot Sec.mp4

32.8 MB

Windows Malware Detection.mp4

59.1 MB

x25 Security Wwwww.mp4

67.8 MB

/HITB 2006 - Malaysia/

Anthony Zboralski & Dave McKay - Hacking Trust.mp4

69.7 MB

Carlos Sarraute & Javier Burroni - Neural Networks.mp4

43.1 MB

Ching Tim Meng - X.805 Standard.mp4

67.5 MB

CTF Prize Giving & Charity Auction.mp4

70.7 MB

Douglas MacIver - Pen Testing Windows Vista BitLocker.mp4

57.3 MB

Fabrice Marie - Application Intrusion Prevention....mp4

70.6 MB

Fyodor Yarochkin & - Meder Kydyraliev - YAWATT.mp4

11.7 MB

Jim Geovedi & - Raditya Iryandi - Hacking VSAT.mp4

57.4 MB

Joanna Rutkowska - Subverting Vista Kernel for Fun...mp4

67.2 MB

Jonathan Limbo - The world through the eyes of a .....mp4

28.6 MB

Lisa Thalheim - Visualization of Source Code.mp4

39.6 MB

Marc Schonefeld - Pentesting Java J2EE.mp4

60.8 MB

Mark Curphey & John Viega - Keynote.mp4

16.1 MB

Michael Davis - Client Honeypots - Its not only ....mp4

43.5 MB

Nguyen Anh Quynh - Invisible Honeypot Monitoring.mp4

50.2 MB

Nish Balla - Finding Secrets in ISAPI.mp4

52.3 MB

Paul Boehm - Taming Bugs.mp4

8.7 MB

Philippe Biondi & - Arnaud Ebalard - Scapy and IPv6.mp4

62.7 MB

Raoul Chiesa - Hacker's Profiling Project (HPP).mp4

14.7 MB

Roberto Preatoni & Fabio Ghioni - The Biggest Brother.mp4

15.8 MB

Rohyt Belani - Smashing the stack for profit - period.mp4

58.5 MB

Saumil Shah - - Writing Metasploit Plugins.mp4

57.3 MB

The Grugq - VoIPhreaking SIPhallis Unveiled.mp4

71.3 MB

Thorsten Holz - Playing with Botnets.mp4

7.1 MB

Van Hauser - Attacking the IPv6 Protocol Suite.mp4

64.4 MB

Wes Brown - MOSREF.mp4

59.0 MB

Window Snyder - Firefox Security.mp4

7.2 MB

Yen Min Cheng - Triple Play Triple Threats .mp4

65.7 MB

/HITB 2007 - Malaysia/

Alexander Kornbrust - Hacking Hardend and Secured Oracle Servers.mp4

53.6 MB

Andrea Barisani and Daniele Bianco - Injecting RDS-TMC.mp4

64.1 MB

Billy Rios and Nathan McFeters - Slipping Past the Firewall.mp4

48.5 MB

CTF Prize Giving and Charity Auction.mp4

87.6 MB

Felix FX Lindner - Attack Surface of Modern Applications.mp4

56.1 MB

Frank Yuan Fan - Advanced Web Application and Database Threat Analysis with MatriXay.mp4

47.8 MB

Grugq - Meta Anti Forensics - The Hash Hacking Harness.mp4

44.6 MB

KEYNOTE 1 - Lance Spitzner - Honeypots - Past Present and Future.mp4

53.4 MB

KEYNOTE 2 - Mikko Hypponen - Online Crime and Crime Online.mp4

68.1 MB

KEYNOTE 3 - Mark Phiber Optik Abene.mp4

245.8 KB

KEYNOTE 4 - Emmanuel Goldstein.mp4

284.5 KB

Luiz Eduardo - Protocol Fuzzing.mp4

58.3 MB

Marc Weber Tobias and TOOOL USA - High Security Locks.mp4

84.8 MB

Martin Johns - Hacking the Intranet with a Webpage.mp4

42.1 MB

Raffael Marty - Insider Threat Visualization.mp4

37.9 MB

Raoul Chiesa and Mayhem - Hacking SCADA.mp4

25.3 MB

Roberto Preatoni - WabiSabiLabi - The Exploit Marketplace.mp4

62.9 MB

Sarb Sembhi - An End to End Analysis of Securing Networked CCTV Systems.mp4

58.4 MB

Shreeraj Shah - Hacking AJAX and Web Services.mp4

54.4 MB

Starbug - Hacking Biometric Passports.mp4

46.4 MB

Stefano Zanero - Anomaly Based Intrusion Detection.mp4

55.5 MB

Window Snyder - Tools and Strategies for Securing a Large Development Project.mp4

60.1 MB

/HITB 2008 - Dubai/

Adrian Pastor - Cracking Into Embeded Devices and Beyond.zip

40.1 MB

Alessio Penasilico - VoIP INsecurities - Italians Do It Better.zip

12.9 MB

Alexander Kornbrust - Practical Oracle Forensics.zip

1.3 MB

Benjamin Hagen and Walter Goulet - Real World Attacks Against 3G Networks Using Subscriber Devices.zip

385.0 KB

Cesar Cerrudo - Token Kidnapping.zip

174.8 KB

Daniel Ingevaldson - Virtualization = Security.zip

10.6 MB

Dino Covotsos - Hacking the Bluetooth Stack for Fun Fame and Mayhem.zip

60.6 MB

Domingo Montanaro - In-depth Anti-Forensics - Challenges of Steganography and Discovering Hidden Data.zip

1.5 MB

Ero Carrera - Malware Behavior Tools Scripting and Adavanced Analysis.zip

2.3 MB

Hacking the bluetooth stack.mp4

3.0 MB

Jamie Butler - Computer Forensics and Incident Response.zip

172.8 KB

Jim Geovedi - Hijacking VSAT Connections.zip

1.9 MB

KEYNOTE - Jeremiah Grossman.zip

5.6 MB

Meling Mudin and Lee Chin Sheng - Defensive Network Security.pdf

1.0 MB

Michael Thumann - Hacking Second Life.zip

106.7 MB

Petko Petkov - For My Next Trick - Client Side Hacking.zip

7.5 MB

Raoul Chiesa and Alessio Pennasillico - Penetration Testing SCADA.zip

7.7 MB

Rodrigo Rubira Branco - Hacking The Cell Architecture.zip

1.5 MB

Shreeraj Shah - Securing Next Generation Applications - Scan Detect and Mitigate.zip

408.8 KB

Skyper - Cracking the GSM A5-1 Encryption in Seconds.zip

3.2 MB

/HITB 2008 - Malaysia/

Adrian Pagvac Pastor - Cracking into Embedded Devices and Beyond.mp4

55.7 MB

Alexander Tereskin - Bluepilling the Xen Hypervisor.mp4

44.8 MB

Charl Van Der Walt - Pushing the Camel Through the Eye of a Needle.mp4

61.1 MB

Charlie Miller - iPwning the iPhone.mp4

56.4 MB

CTF Prize Giving & Charity Auction.mp4

87.5 MB

DinoDaiZovi-Mac OS X Exploitation.mp4

57.3 MB

Eric Lawrence - Internet Explorer 8 - Trustworthy Engineering and Browsing.mp4

61.0 MB

Ero Carrera - Analysis and Visualization of Common Packers.mp4

54.6 MB

HernanOchoa-Pass The Hass Toolkit for Windows.mp4

52.0 MB

Ilfak Guilfanov - Decompilers and Beyond.mp4

56.5 MB

JeremiahGrossman-The Art Of Click Jacking.mp4

55.2 MB

Jim Geovedi & Raditya Iryandi - Hacking a Bird in the Sky 2.0.mp4

36.0 MB

Jonathan Squire - A Fox in the Hen House - UPnP IGD.mp4

54.7 MB

Julian Ho - MoocherHunting - Real-Time Geo-Location Unauthorized WiFi Users.mp4

49.7 MB

Kris Kaspersky - Remote Code Execution Through Intel CPU Bugs.mp4

31.7 MB

MarcusRanum-Cyberwar Is Bullshit.mp4

54.4 MB

Matthew Geiger - How to Build Your Own Password Cracker with a VM.mp4

51.0 MB

Next Generation Reverse Shell.mp4

62.0 MB

Paul Craig - Hacking Internet Kiosks.mp4

60.4 MB

Peter Silberman - Full Process Reconsitution from Memory.mp4

51.2 MB

Petko D Petkov - Client-Side Security.mp4

38.7 MB

Roberto Preatoni - Time for a free hardware foundation.mp4

50.5 MB

Saumil Shah - Browser Exploits - A New Model For Browser Security.mp4

53.9 MB

Shreeraj Shah - Top 10 Web 2.0 Attacks.mp4

62.9 MB

The Grugq - How The Leopard Hides His Spots - OS X Anti-Forensics Techniques.mp4

51.6 MB

The Pirate Bay - Dissolving an Industry as a Hobby.mp4

77.9 MB

ThomasVarghese-Delivering Identity Management 2.0 by Leveraging OPSS.mp4

44.9 MB

/HITB 2009 - Malaysia/

Alexander Gazet & Yoann Guilot - Defeating Software Protection with Metasm.mp4

60.4 MB

Announcement of CTF Winners and Final HITB Charity Auction.mp4

45.0 MB

Bruno Goncalves - Hacking From The Restroom.mp4

55.8 MB

ctf-clip1.mp4

1.1 MB

CTF.mp4

478.4 KB

Dimitrious Petroulos - Having Fun With ATMs and HSMs.mp4

58.7 MB

Ed Skoudis - The Bad Guys Are Winning. So Now What.mp4

66.1 MB

Frederic Raynal, Guillaume Deluge, Damien Aumaitre - PDF Origami Strikes Back.mp4

49.2 MB

Fyodor Yarochkin and The Grugq - From Russia With Love.exe.mp4

64.8 MB

Harron Meer - Clobbering The Cloud.mp4

67.8 MB

Job De Haas - Side Channel Analysis on Embedded Systems.mp4

64.6 MB

Joe Grand - Hardware Is The New Software.mp4

55.3 MB

Julian Assage - Publishing the Unpublished.mp4

68.1 MB

Julien Tinnes, Chris Evans - Security In-Depth for Linux Software.mp4

61.4 MB

Kuza55 - Implementing a Blind TCPIP Hijacking Tool.mp4

41.5 MB

Lucas Adamski - Freeing Sisyphus, Declaratively Address Web Security Issue.mp4

46.8 MB

MARES - APRS,HAM Radio.mp4

61.9 MB

Mark Dowd - Attacking Interoperability.mp4

58.4 MB

Meling Mudin & CS Lee - Network Forensics.mp4

77.5 MB

Nguyen Anh Quyuh - eKimono, A Malware Scanner for Virtual Machines.mp4

59.7 MB

Nishad Herath - How Low Will Malware Go.mp4

59.5 MB

Paul Theriault - Browser Ghosting Attacks.mp4

43.9 MB

Rop Gonggip - Modern Day Robin Hoods.mp4

47.0 MB

Saumil Shah - How To Own The World, One Desktop At A Time.mp4

59.1 MB

Sheran Gunasekera - Bugs and Kisses, Spying on Blackberry Users for Fun.mp4

58.2 MB

Steve Anson - Detecting Computer Intrusions.mp4

41.0 MB

The Secret History Of Hacking.DivxMp3.mp4

51.2 MB

Travis Ormandy - Making Software Dumber.mp4

33.5 MB

/HITB 2010 - Malaysia/

Future of Mobile Malware & Cloud Computing Part 1.mp4

10.1 MB

Future of Mobile Malware & Cloud Computing Part 1.srt

8.6 KB

Future of Mobile Malware & Cloud Computing Part 2.mp4

10.1 MB

Future of Mobile Malware & Cloud Computing Part 3.mp4

12.5 MB

Future of Mobile Malware & Cloud Computing Part 3.srt

11.0 KB

Future of Mobile Malware & Cloud Computing Part 4.mp4

10.4 MB

Future of Mobile Malware & Cloud Computing Part 4.srt

8.9 KB

Future of Mobile Malware & Cloud Computing Part 5.mp4

10.0 MB

Future of Mobile Malware & Cloud Computing Part 5.srt

9.5 KB

Future of Mobile Malware & Cloud Computing Part 6.mp4

12.8 MB

Future of Mobile Malware & Cloud Computing Part 7.mp4

9.7 MB

Future of Mobile Malware & Cloud Computing Part 8.mp4

9.7 MB

Future of Mobile Malware & Cloud Computing Part 8.srt

8.5 KB

Future of Mobile Malware & Cloud Computing Part 9.mp4

12.4 MB

Future of Mobile Malware & Cloud Computing Part 9.srt

11.0 KB

Future of Mobile Malware & Cloud Computing Part 10.mp4

12.7 MB

Future of Mobile Malware & Cloud Computing Part 10.srt

10.2 KB

Perpetual Insecurity Machine Part 1.mp4

9.8 MB

Perpetual Insecurity Machine Part 1.srt

9.0 KB

Perpetual Insecurity Machine Part 2.mp4

10.0 MB

Perpetual Insecurity Machine Part 2.srt

8.0 KB

Perpetual Insecurity Machine Part 3.mp4

13.6 MB

Perpetual Insecurity Machine Part 3.srt

11.1 KB

Perpetual Insecurity Machine Part 4.mp4

10.0 MB

Perpetual Insecurity Machine Part 4.srt

7.3 KB

Perpetual Insecurity Machine Part 5.mp4

8.1 MB

Perpetual Insecurity Machine Part 5.srt

7.2 KB

Taking Back the DNS Part 1.mp4

9.7 MB

Taking Back the DNS Part 2.mp4

9.7 MB

Taking Back the DNS Part 3.mp4

13.4 MB

Taking Back the DNS Part 4.mp4

14.3 MB

Taking Back the DNS Part 5.mp4

11.2 MB

/HITB 2011 - Amsterdam/

Hackers Op De Gracht.mp4

9.2 MB

/Presentations/

D1 LABS - VoIP Attacking CUCM.pdf

2.8 MB

D1 SIGINT - Adnan Mohd Shukor - Fun With Javascript DeObfuscation.pdf

4.2 MB

D1 SIGINT - Elger Stitch Jonker - Building the Hackerspace.pdf

8.8 MB

D1 SIGINT - Jurre van Bergen and Youri van der Zwart - Abusing RFID.pdf

790.1 KB

D1 SIGINT - Muhammad Najmi Ahmad Zabidi - Compiling Features for Malcious Binaries.pdf

420.2 KB

D1 SIGINT - Raoul Chiesa - Cyber Weapons in 2011.pdf

7.4 MB

D1T1 - Alex Kirk - Mobile Malware Analysis.pdf

1.9 MB

D1T1 - Andrea Barisani and Daniele Bianco - EMV Protocol and POS Physical Analysis.pdf

2.1 MB

D1T1 - Elena K and Joffrey C - Webshells - A Framework for Pentesting.pdf

5.4 MB

D1T1 - Jonathan Brossard - Post Memory Corruption Analysis.pdf

284.6 KB

D1T1 - Mahmud Ab Rahman - Reverse Engineering Android Malware.pdf

9.7 MB

D1T1 - Marco Balduzzi - Attacking the Privacy of Social Network Users.pdf

6.7 MB

D1T1 - Mariano Nunez - Attacks Against SAP Web Applications.pdf

1.4 MB

D1T1 - Riley Hassell - Exploiting Androids for Fun and Profit.pdf

9.4 MB

D1T1 - Stefan Esser - Antid0te 2.0 - ASLR in iOS.pdf

5.0 MB

D1T2 - Alexander Polyakov and Dimitry Chastuhin - SAPocalypse Now.pdf

15.9 MB

D1T2 - Asia Slowinka - Excavating Data Structures from Stripped Binaries.pdf

902.7 KB

D1T2 - biatch0 and RuFI0 - Pwning a 4G Device for the LuLz.pdf

3.7 MB

D1T2 - Claudio Criscione - MetaXSSploit - Bringing XSS to Pentesting.pdf

3.2 MB

D1T2 - Don Bailey - GoodFUN - The GoodFET.pdf

991.1 KB

D1T2 - Guillaume Prigent - Really Open Source Information Gathering.pdf

5.6 MB

D1T2 - Jim Geovedi - Satellite Telephony Security.pdf

5.7 MB

D1T2 - Laurent Oudot - Extracting Senstive Data from Your iPhone.pdf

14.6 MB

D1T2 - Laurent Weber - All your Base Stations Are Belong To Us.pdf

320.0 KB

D1T2 - The Grugq - Smashing the Slack for Fun and Profit.pdf

14.7 MB

D1T2 - Thomas Caplin - Silverlight - A New Way to Surf .Net Holes.pdf

1.5 MB

D1T3 - Barry van Kampen - DIY Video Surveillance.pdf

915.7 KB

D1T3 - Itzhak Zuk Avraham - Popping Shell On Android Devices.pdf

1.3 MB

D1T3 - Jimmy Shah - Mobile App Moolah.pdf

1.7 MB

D1T3 - Mitja Kolsek - Remote Binary Planting.pdf

4.4 MB

D2 LABS - Daniel Mende and Jim Geovedi - Practical 3G-4G Attacks.pdf

2.3 MB

D2 SIGINT - Jim Manico - Ghost of XSS Past Present and Future.pdf

2.2 MB

D2 SIGINT - Keith Lee - iPhone Espionage.pdf

5.1 MB

D2 SIGINT - Martin Knobloch - Secure Your Software Using OWASP.pdf

1.6 MB

D2 SIGINT - Nur Muhammed Kamil - MyKotakPasir.pdf

1.2 MB

D2T1 - Andreas Weigenstein - SQL Injection with ABAP.pdf

1.3 MB

D2T1 - Andrew Gavin - Stealing Sensitive Data from Thousands of Systems.pdf

65.9 KB

D2T1 - Daniele Bianco and Adam Laurie - Credit Card Skimming and PIN Harvesting in an EMV World.pdf

3.6 MB

D2T1 - Hendrik Scholz - Air Travel Hacking.pdf

5.7 MB

D2T1 - Itzik Kotler - Let Me Stuxnet You.pdf

542.6 KB

D2T1 - Ivan Ristic - A Study of What Really Breaks SSL.pdf

3.2 MB

D2T1 - Marc Blanchou and Mathew Solnik - Blackbox Android.pdf

3.7 MB

D2T1 - Ravi B Kevin R and Nico G - Femtocells.pdf

6.2 MB

D2T1 - Stefan Esser - iPhone Exploitation - One ROPe to Bind Them All.pdf

8.6 MB

D2T2 - D. Mende & Enno Rey - Attacking 3G and 4G Networks.pdf

2.4 MB

D2T2 - Jim Geovedi and Raoul Chiesa - Hacking a Bird in the Sky.pdf

18.1 MB

D2T2 - KaiJern Lau - Malware Sandboxing the Xandora Way.pdf

16.2 MB

D2T2 - Paul Sebastian Ziegler - Stenographic AVI FIlesystems.pdf

3.1 MB

D2T2 - Philippe Langlois - Attacking the GPRS Roaming Exchange.pdf

13.5 MB

D2T2 - Rosario Valotta - Cookie Jacking.pdf

2.6 MB

D2T2 - Shreeraj Shah - Next Generation Web Attacks.pdf

752.9 KB

D2T2 - Travis Goodspeed - Remotely Exploiting Layer One.pdf

318.5 KB

D2T3 - Aditya K Sood - Spying on SpyEye.pdf

2.8 MB

D2T3 - Bert Hubert - DNSSEC - The Good The Bad and The Very Bad.pdf

407.0 KB

D2T3 - Guillaume Delugre - Reverse Engineering Broadcom NetExtreme Firmware.pdf

1.3 MB

D2T3 - Maarten Oosterink - Attacking Critical Infrastructure.pdf

2.5 MB

D2T3 - Travis Goodspeed - Building a Promiscious nRF24L01 Packet Sniffer.pdf

32.2 MB

HackWEEKDAY - Arzumy.pdf

250.1 KB

KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.pdf

1.6 MB

/.../D1T3 - Didier Stevens - Malicious PDF Analysis Lab/

HITB2011AMS - PDF Chapter.pdf

272.0 KB

HITB2011AMS - Slides.pdf

42.4 KB

HITB2011AMS - Solutions.txt

2.7 KB

/.../D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities/

D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities.zip

50.6 MB

/Videos/

Air Travel Hacking Understanding and (Ab) Using the .....mp4

43.1 MB

Alexander Kirk - Mobile Malware Analysis.eng.srt

102.7 KB

Alexander Kirk - Mobile Malware Analysis.mp4

40.5 MB

Alexander Polyakov, Dimitry Chastuhin - SAPocalypse Now, CrushingSAPs J2EE....mp4

46.4 MB

Andrea Barisani & Daniele Bianco - Chip & PIN is Definitely Broken....eng.srt

97.3 KB

Andrea Barisani & Daniele Bianco - Chip & PIN is Definitely Broken....mp4

44.0 MB

CLOSING KEYNOTE - Richard Thieme - Conspiracy Theories, Counter-Intelligence & K.....eng.srt

120.6 KB

CLOSING KEYNOTE - Richard Thieme - Conspiracy Theories, Counter-Intelligence & K.....mp4

50.9 MB

Jim Geovedi - Satellite Telephony Security - What Is and What Will Never Be.eng.srt

38.6 KB

Jim Geovedi - Satellite Telephony Security - What Is and What Will Never Be.mp4

24.2 MB

Jonathan Brossard - Post Memory Corruption Analysis & Exploitation.mp4

44.3 MB

KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.eng.srt

119.3 KB

KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.mp4

54.5 MB

KEYNOTE 2 - Jennifer Granick - Privacy, Secrecy, Freedom and Power.eng.srt

108.9 KB

KEYNOTE 2 - Jennifer Granick - Privacy, Secrecy, Freedom and Power.mp4

40.7 MB

Mahmud Ab Rahman - Reverse Engineering Android Malware.eng.srt

78.6 KB

Mahmud Ab Rahman - Reverse Engineering Android Malware.mp4

37.3 MB

Marc Blanchou & Mathew Solnik - BlackBox Android Breaking En.eng.srt

85.0 KB

Marc Blanchou & Mathew Solnik - BlackBox Android Breaking En.mp4

34.1 MB

Marco 'embyte' Balduzzi - Attacking the Privacy of Social Network Users.eng.srt

80.3 KB

Marco 'embyte' Balduzzi - Attacking the Privacy of Social Network Users.mp4

40.4 MB

Riley Hassell - Hacking Androids for Profit.eng.srt

98.0 KB

Riley Hassell - Hacking Androids for Profit.mp4

34.1 MB

Skype Software Vulnerabilities 0 Day Exploitation 2011.eng.mp4

48.3 MB

Skype Software Vulnerabilities 0 Day Exploitation 2011.eng.srt

56.3 KB

Stefan Esser - IPhone Exploitation. One ROPe to Bind Them All.eng.srt

90.0 KB

Stefan Esser - IPhone Exploitation. One ROPe to Bind Them All.mp4

34.1 MB

Track 1- Femtocells - Kevin Redon & Nico Golde - A Poisonous Needle in the...mp4

175.3 MB

/HITB 2012 - Amsterdam/

A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities.mp4

72.9 MB

A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities.srt

107.2 KB

Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV.mp4

76.9 MB

Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV.srt

95.9 KB

Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets.mp4

57.1 MB

Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets.srt

76.8 KB

Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond.mp4

57.8 MB

Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond.srt

82.9 KB

Arnauld Mascret - Whistling Over the Wire.mp4

62.8 MB

Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis.mp4

57.1 MB

Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis.srt

66.3 KB

Dr Marco Balduzzi - SatanCloud.mp4

56.5 MB

Dr Marco Balduzzi - SatanCloud.srt

68.0 KB

Dream Team - Part 1 - Corona for iOS 5.0.1.mp4

55.7 MB

Dream Team - Part 1 - Corona for iOS 5.0.1.srt

59.7 KB

Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing).mp4

58.9 MB

Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing).srt

68.7 KB

Georgia Weidman - Bypassing the Android Permission Model.mp4

66.8 MB

Georgia Weidman - Bypassing the Android Permission Model.srt

84.4 KB

Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE.mp4

67.3 MB

Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE.srt

68.7 KB

Ivo Pooters - Turning Android Inside Out.mp4

56.7 MB

Ivo Pooters - Turning Android Inside Out.srt

72.1 KB

Juan Pablo Echtegoyen - Attacking the SAP Solution Manager.mp4

57.1 MB

Juan Pablo Echtegoyen - Attacking the SAP Solution Manager.srt

64.2 KB

Kenneth White - A Deep Analysis of Amazon Web Services.mp4

49.6 MB

Kenneth White - A Deep Analysis of Amazon Web Services.srt

75.6 KB

KEYNOTE - Ms Jaya Baloo - Identity, Privacy and Security.mp4

72.8 MB

KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line.mp4

64.7 MB

KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line.srt

89.7 KB

KEYNOTE 2 - Bruce Schneier - Trust Security and Society.mp4

66.8 MB

KEYNOTE 2 - Bruce Schneier - Trust Security and Society.srt

72.4 KB

MuscleNerd - Evolution of iPhone Baseband and Unlocks.mp4

43.4 MB

MuscleNerd - Evolution of iPhone Baseband and Unlocks.srt

60.5 KB

Nicolas Gregoire - Attacking XML Preprocessing.mp4

65.6 MB

Nicolas Gregoire - Attacking XML Preprocessing.srt

62.3 KB

Rahul Sasi - CXML VXML IVR Pentesting for Auditors.mp4

53.3 MB

Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012.mp4

66.7 MB

Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012.srt

76.4 KB

Sebastien Renaud and Kevin Szkudlapski - WinRT.mp4

38.6 MB

Sebastien Renaud and Kevin Szkudlapski - WinRT.srt

44.2 KB

SPECIAL CLOSING - Rop Gonggrijp.mp4

38.4 MB

SPECIAL CLOSING - Rop Gonggrijp.srt

46.2 KB

Steven Seeley - Ghost in the Windows 7 Allocator.mp4

64.0 MB

Steven Seeley - Ghost in the Windows 7 Allocator.srt

81.6 KB

/HITB 2012 - Malaysia/

A. Barisani & D. Bianco - Practical Exploitation of Embedded Systems.mp4

68.7 MB

A. Barisani & D. Bianco - Practical Exploitation of Embedded Systems.srt

84.4 KB

Chris Evans - Element 1337 in the Periodic Table - Pwnium.mp4

69.6 MB

Chris Evans - Element 1337 in the Periodic Table - Pwnium.srt

75.4 KB

Chris Wysopal - Data Mining a Mountain of Vulnerabilities.mp4

50.2 MB

Chris Wysopal - Data Mining a Mountain of Vulnerabilities.srt

89.2 KB

Don Bailey - Hackers the Movie - A Retrospective.mp4

69.4 MB

Don Bailey - Hackers the Movie - A Retrospective.srt

79.5 KB

Emmanuel Gadaix - Something MEGA.mp4

70.8 MB

Emmanuel Gadaix - Something MEGA.srt

56.1 KB

Felix - FX - Lindner - Hacking Huawei VRP.mp4

62.4 MB

Felix - FX - Lindner - Hacking Huawei VRP.srt

51.8 KB

Fyodor Yarochkin - Messing Up the Kids Playground.mp4

111.6 MB

Fyodor Yarochkin - Messing Up the Kids Playground.srt

93.5 KB

Haroon Meer - You and Your Research.mp4

67.5 MB

Haroon Meer - You and Your Research.srt

72.7 KB

Jeremiah Grossman - Why Web Security is Fundamentally Broken.mp4

79.2 MB

Jeremiah Grossman - Why Web Security is Fundamentally Broken.srt

73.4 KB

John Captain Crunch Draper - A Historical Look at the Phreaking Scene.mp4

85.2 MB

John Captain Crunch Draper - A Historical Look at the Phreaking Scene.srt

75.5 KB

John Viega - Crypto for the Public Cloud.mp4

86.3 MB

John Viega - Crypto for the Public Cloud.srt

71.2 KB

Katie Moussouris - How to Get Along With Vendors Without Really Trying.mp4

70.8 MB

Katie Moussouris - How to Get Along With Vendors Without Really Trying.srt

92.1 KB

Lucas Adamski - Mozilla Apps, Firefox OS and You.mp4

57.0 MB

Lucas Adamski - Mozilla Apps, Firefox OS and You.srt

72.9 KB

Marc - Van Hauser - Heuse - IPv6 Insecurity Revolutions.mp4

118.6 MB

Marc - Van Hauser - Heuse - IPv6 Insecurity Revolutions.srt

92.0 KB

Mark Dowd & Tarjei Mandt - iOS 6 Security.mp4

76.8 MB

Mark Dowd & Tarjei Mandt - iOS 6 Security.srt

81.3 KB

Meder Kydyraliev - Defibrilating Web Security.mp4

72.2 MB

Meder Kydyraliev - Defibrilating Web Security.srt

80.0 KB

Mikko Hypponen - Behind Enemy Lines.mp4

101.2 MB

Mikko Hypponen - Behind Enemy Lines.srt

80.7 KB

Ollie Whitehouse - Finding the Weak Link in Binaries.mp4

43.9 MB

Ollie Whitehouse - Finding the Weak Link in Binaries.srt

59.5 KB

OPEN BOTTLE - - Security Industry Panel Discussion.mp4

192.5 MB

P. Langlois & E. Gadaix - Why Telcos Keep Getting Hacked.mp4

90.0 MB

P. Langlois & E. Gadaix - Why Telcos Keep Getting Hacked.srt

94.8 KB

PANEL DISCUSSION - iOS - OS X Security.mp4

96.5 MB

PANEL DISCUSSION - iOS - OS X Security.srt

75.8 KB

Paul Sebastian Ziegler - Hacking in The Far East.mp4

95.5 MB

Paul Sebastian Ziegler - Hacking in The Far East.srt

97.0 KB

Paul Vixie - Silo Busting in Information Security - The ISC SIE Approach.mp4

84.2 MB

Paul Vixie - Silo Busting in Information Security - The ISC SIE Approach.srt

85.3 KB

Petko D. Petkov - A Short History of the JavaScript Security Arsenal.mp4

82.7 MB

Petko D. Petkov - A Short History of the JavaScript Security Arsenal.srt

90.2 KB

Rodrigo Rubira Branco - Study of Malware Obfuscation Techniques.mp4

95.3 MB

Rodrigo Rubira Branco - Study of Malware Obfuscation Techniques.srt

89.4 KB

Saumil Shah - Innovative Approaches to Exploit Delivery.mp4

86.5 MB

Saumil Shah - Innovative Approaches to Exploit Delivery.srt

66.6 KB

Shreeraj Shah - XSS & CSRF Strike Back - Powered by HTML5.mp4

68.8 MB

Shreeraj Shah - XSS & CSRF Strike Back - Powered by HTML5.srt

80.6 KB

Stefano Zanero - Scalable Malware Analysis.mp4

103.9 MB

Stefano Zanero - Scalable Malware Analysis.srt

75.1 KB

The Grugq - OPSEC - Because Jail is for wuftpd.mp4

101.1 MB

The Grugq - OPSEC - Because Jail is for wuftpd.srt

91.7 KB

Wes Brown - Supercomputing, Malware and Correlation.mp4

86.5 MB

Wes Brown - Supercomputing, Malware and Correlation.srt

49.3 KB

/HITB 2013 - Amsterdam/

Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.mp4

33.9 MB

Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.srt

40.4 KB

Bob Lord - Rethinking the Front Lines.mp4

68.8 MB

Bob Lord - Rethinking the Front Lines.srt

98.8 KB

Chilik Tamir - iNalyzer - No More Blackbox iOS Analysis.mp4

72.4 MB

Coverage on RSI Telegiornale (Italian).mp4

2.5 MB

Dan Tentler - System Shock - The Shodan Computer Search Engine.mp4

55.4 MB

Daniel Mende - Paparazzi over IP.mp4

58.8 MB

Daniel Mende - Paparazzi over IP.srt

70.1 KB

E. Schwartz - Embracing the Uncertain'ty of Attacks with Big Data Analytics.mp4

75.0 MB

E. Schwartz - Embracing the Uncertain'ty of Attacks with Big Data Analytics.srt

95.1 KB

Evad3rs - Swiping Through Modern Security Features.mp4

74.5 MB

Evad3rs - Swiping Through Modern Security Features.srt

87.7 KB

Hugo Teso - Aircraft Hacking - Practical Aero Series.mp4

74.6 MB

Hugo Teso - Aircraft Hacking - Practical Aero Series.srt

97.5 KB

KEYNOTE Winn Schwartau - The History of the Future of InfoSec.mp4

73.8 MB

KEYNOTE Winn Schwartau - The History of the Future of InfoSec.srt

90.8 KB

Nicolas Seriot - Abusing Twitter s API and OAuth Implementation.mp4

39.8 MB

Nicolas Seriot - Abusing Twitter s API and OAuth Implementation.srt

52.4 KB

Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in MS Windows Kernel.mp4

39.3 MB

Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in MS Windows Kernel.srt

49.2 KB

Ofer Shezaf - The Infosec Risks of Charging Electric Cars.mp4

70.9 MB

Ofer Shezaf - The Infosec Risks of Charging Electric Cars.srt

77.8 KB

P Uhley and K Raman - Security Response in the Age of Mass Customized Attacks.mp4

65.8 MB

P Uhley and K Raman - Security Response in the Age of Mass Customized Attacks.srt

108.8 KB

Peter Geissler and Steven Ketelaar - How I Met Your Modem.mp4

66.0 MB

Peter Geissler and Steven Ketelaar - How I Met Your Modem.srt

71.3 KB

Petko D Petkov - Defeating the Intercepting Web Proxy.mp4

69.6 MB

Petko D Petkov - Defeating the Intercepting Web Proxy.srt

100.7 KB

Petukhov, Noseevich and Gamayunov - Breaking Certified Crypto in Banking Apps.mp4

54.4 MB

Petukhov, Noseevich and Gamayunov - Breaking Certified Crypto in Banking Apps.srt

52.6 KB

Philippe Langlois - LTE Pwnage - Hacking Core Network Elements.mp4

51.6 MB

Philippe Langlois - LTE Pwnage - Hacking Core Network Elements.srt

75.5 KB

Press Briefing - 11th April 2013.mp4

38.7 MB

Press Briefing - 11th April 2013.srt

18.8 KB

Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.mp4

44.3 MB

Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.srt

56.4 KB

S. Shekyan and A. Harutyunyan - Turning Your Surveillance Camera Against You.mp4

53.2 MB

S. Shekyan and A. Harutyunyan - Turning Your Surveillance Camera Against You.srt

56.3 KB

Sebastien Kaczmarek - Dreamboot - A UEFI Bootkit.mp4

60.4 MB

Sebastien Kaczmarek - Dreamboot - A UEFI Bootkit.srt

64.8 KB

Sergey Bratus and Julian Bangert - Page Fault Liberation Army.mp4

69.2 MB

Sergey Bratus and Julian Bangert - Page Fault Liberation Army.srt

90.4 KB

Tal Zeltzer - Analysis to Remote Root 0day in a SSL-VPN Appliance.mp4

37.5 MB

Tal Zeltzer - Analysis to Remote Root 0day in a SSL-VPN Appliance.srt

56.0 KB

Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.mp4

61.1 MB

Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.srt

85.8 KB

V. Vorontsov and A. Golovko - SSRF PWNs - New Techniques and Stories.mp4

53.0 MB

V. Vorontsov and A. Golovko - SSRF PWNs - New Techniques and Stories.srt

59.5 KB

Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.mp4

52.7 MB

Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.srt

59.4 KB

/presentations/

D1-LAB-Sniffing-the-Airwaves-with-RTL-SDR.pdf

6.2 MB

D1T1-AIS-Exposed-New-Vulnerabilities-and-Attacks.pdf

4.5 MB

D1T1-Compromise-as-a-Service-Our-PleAZURE.pdf

8.2 MB

D1T1-Escaping-IE11-Enhanced-Protected-Mode.pdf

2.3 MB

D1T1-Hacking-Your-Cable-TV-Network-Die-Hard-Style.pdf

39.2 MB

D1T1-The-NSA-Playset.pdf

10.4 MB

D1T1-Vulnerabilities-Exposed-at-the-Protocol-Level-in-TN3270-based-Applications.pdf

17.3 MB

D1T2-Bypassing-Endpoint-Security-for-Fun-and-Profit.pdf

28.2 MB

D1T2-More-Ways-to-Defeat-Secure-Boot.pdf

7.3 MB

D1T2-REboot-Bootkits-Revisited.pdf

924.3 KB

D1T2-State-of-the-Art-Exploring-the-New-Android-KitKat-Runtime.pdf

641.8 KB

D1T3-Exploiting-NoSQL-Like-Never-Before.pdf

2.5 MB

D1T3-XSSing-Your-Way-to-Shell.pdf

5.0 MB

D2-LAB-Attack-Surface-Intelligence-of-Source-Code.pdf

12.5 MB

D2T1-Alices-Adventures-in-Smart-Building-Land.pdf

7.2 MB

D2T1-Exploiting-Passbook-to-Fly-for-Free.pdf

19.8 MB

D2T1-G-Jacking-AppEngine-based-Applications.pdf

784.7 KB

D2T1-GRX-and-a-Spy-Agency.pdf

7.7 MB

D2T1-Why-Port-Scans-are-for-Pussies.pdf

2.4 MB

D2T2-Bitcoin-Forensics-Fact-or-Fiction.pdf

24.7 MB

D2T2-Breaking-Cloud-Isolation.pdf

1.1 MB

D2T2-Exploring-and-Exploiting-iOS-Web-Browsers.pdf

2.8 MB

D2T2-Shellcodes-for-ARM-Your-Pills-Dont-Work-on-Me-x86.pdf

4.3 MB

D2T2-The-InSecurity-of-Pull-Printing-Solutions.pdf

4.2 MB

D2T3-Exploit-Development-for-New-Platforms-Based-on-64-bits.pdf

74.1 KB

D2T3-Format-Reverser-of-Data-Objects.pdf

23.0 MB

D2T3-Using-Javascript-Security-Features-to-Kill-Itself.pdf

2.0 MB

/HITB 2014 - Malaysia/

CLOSING KEYNOTE - Richard Thieme.mp4

114.7 MB

CLOSING KEYNOTE - Richard Thieme.srt

81.4 KB

/HITB 2015 - Singapore/

Alfonso De Gregorio - Extortion and Cooperation in the Zero-day Market.mp4

53.5 MB

Alfonso De Gregorio - Extortion and Cooperation in the Zero-day Market.srt

40.5 KB

Barry Greene - Closing Keynote - Can Vendors Ever Provide Secure Solutions.mp4

86.5 MB

Chris Rouland - Understanding the IoT from DC to 10GhZ.mp4

93.9 MB

Chris Rouland - Understanding the IoT from DC to 10GhZ.srt

65.2 KB

Dawid Czagan - Hacking Cookies in Modern Web Applications and Browsers.mp4

67.2 MB

Dawid Czagan - Hacking Cookies in Modern Web Applications and Browsers.srt

49.2 KB

Dhillon ‘l33tdawg Kannabhiran - Welcome Note.mp4

4.7 MB

Dhillon ‘l33tdawg Kannabhiran - Welcome Note.srt

3.5 KB

Dmitry Chastuhin - SAP Afaria. One SMS To Hack A Company.mp4

65.1 MB

Dmitry Chastuhin - SAP Afaria. One SMS To Hack A Company.srt

25.1 KB

Dr. Marco Balduzzi & Dr. Vincenzo Ciancaglini - Cybercrime In The Deep Web.mp4

86.9 MB

Dr. Marco Balduzzi & Dr. Vincenzo Ciancaglini - Cybercrime In The Deep Web.srt

62.4 KB

Eleanor Saitta - Security Design and High Risk Users.mp4

37.7 MB

Eleanor Saitta - Security Design and High Risk Users.srt

50.4 KB

Fatih Ozavci - VoIP Wars - Destroying Jar Jar Lync.mp4

120.8 MB

Julien Lenoir - Implementing Your Own Generic Unpacker.mp4

67.0 MB

Katie Kleemola & Anthony Lai - Targeted attacks in Asia.mp4

74.7 MB

Katie Kleemola & Anthony Lai - Targeted attacks in Asia.srt

55.0 KB

Kristin Lovejoy - Keynote 1 - Security vs Privacy.mp4

94.8 MB

Kristin Lovejoy - Keynote 1 - Security vs Privacy.srt

78.9 KB

Lyon Yang - Advanced SOHO Router Exploitation.mp4

61.7 MB

Marc Heuse - Hiding in Complexity.mp4

76.0 MB

Marc Heuse - Hiding in Complexity.srt

59.9 KB

Marina Krotofil - Hacking Chemical Plants for Competition and Extortion.mp4

89.2 MB

Ofir Arkin - Keynote 2 - Security in A World Out of Our Control.mp4

65.6 MB

Ofir Arkin - Keynote 2 - Security in A World Out of Our Control.srt

3.2 KB

Valerie Thomas - All Your Door Belong To Me.mp4

73.9 MB

Valerie Thomas - All Your Door Belong To Me.srt

72.4 KB

Winn Schwartau - Keynote 3 - Analogue Network Security.mp4

85.4 MB

Winn Schwartau - Keynote 3 - Analogue Network Security.srt

57.7 KB

Xeno Kovah - ThunderStrike 2 - Sith Strike.mp4

75.9 MB

Xeno Kovah - ThunderStrike 2 - Sith Strike.srt

81.7 KB

/HITB 2016 - Amsterdam/

Adaptive Android Kernel Live Patching - Tim Xia and Yulong Zhang.mp4

86.8 MB

Adaptive Android Kernel Live Patching - Tim Xia and Yulong Zhang.srt

59.3 KB

Advanced Exploitation - Xen Hypervisor VM Escape - Shangcong Luan.mp4

72.6 MB

Advanced Exploitation - Xen Hypervisor VM Escape - Shangcong Luan.srt

36.6 KB

Attacking Next Generation Firewalls - Breaking PAN OS - Felix Wilhelm.mp4

125.5 MB

Attacking Next Generation Firewalls - Breaking PAN OS - Felix Wilhelm.srt

73.3 KB

Beyond FBI vs Apple - What s Next For The Crypto Wars - John Adams.mp4

47.9 MB

Beyond FBI vs Apple - What s Next For The Crypto Wars - John Adams.srt

43.5 KB

Breaking Naive ESSID WPA2 Key Generation Algorithms - Peter - Blasty - Geissler.mp4

97.2 MB

Breaking Naive ESSID WPA2 Key Generation Algorithms - Peter - Blasty - Geissler.srt

70.2 KB

Cache Side Channel Attacks - CPU Design As A Security Problem - Anders Fogh.mp4

96.9 MB

Cache Side Channel Attacks - CPU Design As A Security Problem - Anders Fogh.srt

71.1 KB

CANsee - An Automobile Intrusion Detection System - Jun Li.mp4

126.2 MB

CANsee - An Automobile Intrusion Detection System - Jun Li.srt

63.0 KB

CommSec - Anatomy Of An APT Attack - Paul Mason.mp4

54.4 MB

CommSec - Anatomy Of An APT Attack - Paul Mason.srt

33.1 KB

CommSec - Applying Regulatory Data to IoT RF Reverse Engineering - Marc Newlin.mp4

64.5 MB

CommSec - Applying Regulatory Data to IoT RF Reverse Engineering - Marc Newlin.srt

77.5 KB

CommSec - CLOSING COMMENTS - Martin Knobloch.mp4

2.9 MB

CommSec - CLOSING COMMENTS - Martin Knobloch.srt

2.6 KB

CommSec - don't Feed The Hippos - Martin Knobloch.mp4

31.2 MB

CommSec - don't Feed The Hippos - Martin Knobloch.srt

31.3 KB

CommSec - Exploiting GLIBC - Hacking Everything - Gal De Leon and Nadav Markus.mp4

83.6 MB

CommSec - Exploiting GLIBC - Hacking Everything - Gal De Leon and Nadav Markus.srt

62.9 KB

CommSec - Facebook Presents Capture The Flag - Paul Marinescu.mp4

31.0 MB

CommSec - Facebook Presents Capture The Flag - Paul Marinescu.srt

20.2 KB

CommSec - Hack In The Class - Barry - Fish - van Kampen.mp4

30.7 MB

CommSec - Hack In The Class - Barry - Fish - van Kampen.srt

31.8 KB

CommSec - Inspeckage - Android Package Inspector - Antonio Martins.mp4

53.9 MB

CommSec - Inspeckage - Android Package Inspector - Antonio Martins.srt

18.1 KB

CommSec - Park This Yet Another Parking Meter Talk - Paul Moreno.mp4

38.9 MB

CommSec - Park This Yet Another Parking Meter Talk - Paul Moreno.srt

45.4 KB

CommSec - Pentesting Chatops - Melanie Rieback.mp4

66.9 MB

CommSec - Pentesting Chatops - Melanie Rieback.srt

50.5 KB

CommSec - Unformation In The Era Of Hyperconnectivity - Elisabeth De Leeuw.mp4

46.2 MB

CommSec - Unformation In The Era Of Hyperconnectivity - Elisabeth De Leeuw.srt

23.4 KB

CommSec - Where Malware Meets Murphy - Mattijs Van Ommeren.mp4

45.9 MB

CommSec - Where Malware Meets Murphy - Mattijs Van Ommeren.srt

24.6 KB

CommSec - Women In Cyber Security Woman Of The Year 2016 Award Ceremony.mp4

28.5 MB

CommSec - Women In Cyber Security Woman Of The Year 2016 Award Ceremony.srt

11.1 KB

CSP Oddities - Michele Spagnuolo and Lukas Weichselbaum.mp4

114.5 MB

CSP Oddities - Michele Spagnuolo and Lukas Weichselbaum.srt

79.4 KB

Escape From The Docker KVM QEMU Machine - Shengping Wang and Xu Liu.mp4

61.2 MB

Escape From The Docker KVM QEMU Machine - Shengping Wang and Xu Liu.srt

36.7 KB

Exploit Kits - Hunting The Hunters - Nick Biasini.mp4

87.1 MB

Exploit Kits - Hunting The Hunters - Nick Biasini.srt

74.9 KB

Forcing A Targeted LTE Cellphone Into An Eavesdropping Network - Lin Huang.mp4

76.3 MB

Forcing A Targeted LTE Cellphone Into An Eavesdropping Network - Lin Huang.srt

33.6 KB

Forging a Wireless Time Signal to Attack NTP Servers - Y. Zheng & H. Shan.mp4

90.6 MB

Forging a Wireless Time Signal to Attack NTP Servers - Y. Zheng & H. Shan.srt

36.0 KB

Go Speed Tracer Guided Fuzzing - Richard Johnson.mp4

136.6 MB

Go Speed Tracer Guided Fuzzing - Richard Johnson.srt

94.6 KB

Hardsploit Project - Yann Allain and Julien Moinard.mp4

116.2 MB

Hardsploit Project - Yann Allain and Julien Moinard.srt

54.5 KB

Hardware Side Channels in Virtualized Environments - Sophia D Antoine.mp4

91.4 MB

Hardware Side Channels in Virtualized Environments - Sophia D Antoine.srt

60.3 KB

In Plain Sight - The Perfect Exfiltration Technique - Itzik Kotler and Amit Klein.mp4

129.2 MB

In Plain Sight - The Perfect Exfiltration Technique - Itzik Kotler and Amit Klein.srt

66.8 KB

IRON HID - Create Your Own Bad USB Device - Seunghun Han.mp4

71.2 MB

IRON HID - Create Your Own Bad USB Device - Seunghun Han.srt

35.6 KB

Kernel Exploit Hunting And Mitigation - Broderick Aquilino and Wayne Low.mp4

107.2 MB

Kernel Exploit Hunting And Mitigation - Broderick Aquilino and Wayne Low.srt

54.5 KB

New Methods For Exploiting ORM Injections - Mikhail Egorov and Sergey Soldatov.mp4

110.1 MB

New Methods For Exploiting ORM Injections - Mikhail Egorov and Sergey Soldatov.srt

47.7 KB

Patricia M Zorko.mp4

27.2 MB

Patricia M Zorko.srt

14.9 KB

Perf - From Profiling To Kernel Exploiting - Wish Wu.mp4

75.7 MB

Perf - From Profiling To Kernel Exploiting - Wish Wu.srt

28.4 KB

Sandjacking - Profiting From iOS Malware - Chilik Tamir.mp4

105.9 MB

Sandjacking - Profiting From iOS Malware - Chilik Tamir.srt

66.0 KB

TeLeScope - Peering Into The Depths Of TLS Traffic In Real Time - Radu Caragea.mp4

92.7 MB

TeLeScope - Peering Into The Depths Of TLS Traffic In Real Time - Radu Caragea.srt

53.5 KB

The Future Has Arrived And It s Effin - Hilarious - Adam Laurie.mp4

110.8 MB

The Future Has Arrived And It s Effin - Hilarious - Adam Laurie.srt

60.2 KB

Using The Observer Effect And Cyber Feng Shui - Jacob Torrey.mp4

109.8 MB

Using The Observer Effect And Cyber Feng Shui - Jacob Torrey.srt

79.1 KB

Virtualization System Vulnerability Discovery Framework - Tang Qinghao.mp4

77.3 MB

Virtualization System Vulnerability Discovery Framework - Tang Qinghao.srt

46.2 KB

/HITB 2016 - Singapore/

(Ab)using Smart Cities - Matteo Beccaro & Matteo Collura.mp4

73.4 MB

(Ab)using Smart Cities - Matteo Beccaro & Matteo Collura.srt

39.8 KB

Breaking Exploits - Shlomi Oberman & Ron Shina.mp4

95.4 MB

Breaking Exploits - Shlomi Oberman & Ron Shina.srt

58.3 KB

CLOSING KEYNOTE - Hacking in Song - Fabienne Serriere.mp4

61.7 MB

CLOSING KEYNOTE - Hacking in Song - Fabienne Serriere.srt

27.3 KB

CommSec - Copy-paste Vulnerabilities - Vanessa Henderson.mp4

37.6 MB

CommSec - Data Driven Software Security - Sweety Chauhan.mp4

125.3 MB

CommSec - Fake President Fraud Defrauded - Florian Lukavsky.mp4

44.5 MB

CommSec - Forensic Analysis of Android Banking Apps - Rajchada Chanajitt.mp4

45.0 MB

CommSec - IoT Honeypots - Tan Kean Siong.mp4

62.8 MB

CommSec - Local Privilege Escalation in 2016 - Paul Craig.mp4

44.5 MB

CommSec - Reverse Engineering Swift Applications - Michael Gianarakis.mp4

53.4 MB

CommSec - Vulnerabilities and Ethics - Alfonso De Gregorio.mp4

55.5 MB

CommSec Track D1- Halcyon - An IDE for Faster NSE Development - Sanoop Thomas.mp4

44.2 MB

Conference - A Next Generation Assembler Framework - Nguyen Anh Quynh.mp4

114.9 MB

Conference - Attacking NVidia s Tegra Platform - Peter Pi.mp4

61.9 MB

Conference - Attacking NVidia s Tegra Platform - Peter Pi.srt

24.1 KB

Conference - Attacking Software Tokens - Bernhard Mueller.mp4

69.7 MB

Conference - Stumping The Mobile Chipset - A. Donenfeld & Y. Mordekhay.mp4

85.0 MB

Conference - Stumping The Mobile Chipset - A. Donenfeld & Y. Mordekhay.srt

51.4 KB

Conference - The Apple Sandbox - Deeper Into The Quagmire - Jonathan Levin.mp4

127.3 MB

Conference - The Apple Sandbox - Deeper Into The Quagmire - Jonathan Levin.srt

86.8 KB

Conference - Trust No One - O. Kochetova & A. Osipov.mp4

72.9 MB

Fuzzing The Windows Kernel - Koh Yong Chuan.mp4

56.2 MB

iOS 10 Kernel Heap Revisited - Stefan Esser.mp4

136.2 MB

iOS 10 Kernel Heap Revisited - Stefan Esser.srt

78.7 KB

KEYNOTE 1 - I Fight For The Users The Prequel - Erin Jacobs.mp4

61.7 MB

KEYNOTE 1 - I Fight For The Users The Prequel - Erin Jacobs.srt

52.0 KB

KEYNOTE 2 - Hacking The Pentagon - Katie Moussouris.mp4

93.5 MB

KEYNOTE 2 - Hacking The Pentagon - Katie Moussouris.srt

65.8 KB

Look Mom I don't Use Shellcode - Moritz Jodeit.mp4

83.3 MB

Look Mom I don't Use Shellcode - Moritz Jodeit.srt

61.0 KB

Replicating a RSA SecurID Token Instance (RSA SecurID 2.0.4).mp4

401.1 KB

Replicating a VASCO DIGIPASS Token Instance (DIGIPASS DEMO for Android 4.10.0).mp4

264.7 KB

/HITB 2017 - Amsterdam/

A New RISC - Don Bailey.mp4

78.3 MB

A New RISC - Don Bailey.srt

115.2 KB

Bootstrapping Systems With Open Source Firmware - Trammell Hudson.mp4

72.0 MB

Bootstrapping Systems With Open Source Firmware - Trammell Hudson.srt

71.4 KB

Bypassing Memory Mitigations Using Data Only Exploitation Techniques - Bing Sun.mp4

114.0 MB

Bypassing Memory Mitigations Using Data Only Exploitation Techniques - Bing Sun.srt

89.7 KB

Can't Touch This - Cloning Any Android HCE Contactless Card - Slawomir Jasek.mp4

113.4 MB

Can't Touch This - Cloning Any Android HCE Contactless Card - Slawomir Jasek.srt

104.2 KB

Chasing Cars - Keyless Entry System Attacks - Yingtao Zeng, Qing Yang and Jun Li.mp4

96.1 MB

Chasing Cars - Keyless Entry System Attacks - Yingtao Zeng, Qing Yang and Jun Li.srt

97.2 KB

Closing Ceremony - HITB Core Team.mp4

30.3 MB

Closing Ceremony - HITB Core Team.srt

36.5 KB

CLOSING KEYNOTE - The ECMA And The Chakra - Natalie Silvanovich.mp4

71.8 MB

CLOSING KEYNOTE - The ECMA And The Chakra - Natalie Silvanovich.srt

89.1 KB

COMMSEC A Passive Listing Ransomware Detector - Paulus Meessen and Don Mulders.mp4

55.0 MB

COMMSEC A Passive Listing Ransomware Detector - Paulus Meessen and Don Mulders.srt

54.4 KB

COMMSEC Breaking Apple's iCloud Keychain - Vladimir Katalov.mp4

76.4 MB

COMMSEC Breaking Apple's iCloud Keychain - Vladimir Katalov.srt

83.0 KB

COMMSEC Disarming EMET 5 52 - Niels Warnars.mp4

37.2 MB

COMMSEC Exploiting Windows Automatic Wireless Association - George Chatzisofroniou.mp4

62.7 MB

COMMSEC Exploiting Windows Automatic Wireless Association - George Chatzisofroniou.srt

62.4 KB

COMMSEC Fault Injection Attacks On Secure Boot - Niek Timmers and Albert Spruyt.mp4

47.9 MB

COMMSEC Fault Injection Attacks On Secure Boot - Niek Timmers and Albert Spruyt.srt

56.3 KB

COMMSEC Intel DCI Secrets - Maxim Goryachy and Mark Ermolov.mp4

41.2 MB

COMMSEC Low Cost Open Source Spectrum Monitoring - Dominic Spill.mp4

52.1 MB

COMMSEC Low Cost Open Source Spectrum Monitoring - Dominic Spill.srt

68.7 KB

COMMSEC Meet And Greet With The MacOs Malware Class Of 2016 - Patrick Wardle.mp4

57.8 MB

COMMSEC Meet And Greet With The MacOs Malware Class Of 2016 - Patrick Wardle.srt

69.8 KB

COMMSEC Pwning ARM Debug Components - Muhammad Abdul Wahab (2).mp4

45.0 MB

COMMSEC Pwning ARM Debug Components - Muhammad Abdul Wahab (2).srt

71.2 KB

COMMSEC Pwning Banks - How The Playground Evolved Over The Years - Miika Turkia.mp4

79.7 MB

COMMSEC Pwning Banks - How The Playground Evolved Over The Years - Miika Turkia.srt

69.1 KB

COMMSEC So You Want To Hack Radios Matt Knight and Marc Newlin.mp4

102.0 MB

COMMSEC So You Want To Hack Radios Matt Knight and Marc Newlin.srt

190.9 KB

COMMSEC Unauthorized Erlang - A Demonstration - Don Bailey (2).mp4

41.0 MB

COMMSEC Unauthorized Erlang - A Demonstration - Don Bailey (2).srt

79.0 KB

Drammer - The Making Of - Victor van der Veen.mp4

99.9 MB

Drammer - The Making Of - Victor van der Veen.srt

112.4 KB

Everybody Wants SOME - Advance Same Origin Method Execution - Ben Hayak.srt

147.8 KB

Hacking Customer Information Control System - Ayoub Elaassal.mp4

90.1 MB

Hacking Customer Information Control System - Ayoub Elaassal.srt

124.6 KB

Hacking Medical Devices And Healthcare Infrastructure - Anirudh Duggal.mp4

79.1 MB

Harnessing Intel Processor Trace On Windows For Vuln Discovery - Richard Johnson.mp4

91.5 MB

Harnessing Intel Processor Trace On Windows For Vuln Discovery - Richard Johnson.srt

118.2 KB

Hunting For Vulnerabilities In Signal - Markus Vervier.mp4

71.0 MB

Hunting For Vulnerabilities In Signal - Markus Vervier.srt

71.2 KB

I Got 99 Trends And A # Is All Of Them Steven Seeley and Roberto Suggi Liverani.mp4

135.2 MB

I Got 99 Trends And A # Is All Of Them Steven Seeley and Roberto Suggi Liverani.srt

147.7 KB

In Depth Analysis Of Multicast DNS And DNS Service Discovery - Antonios Atlasis.mp4

82.8 MB

KEYNOTE 1 - Redefining Defense - Saumil Shah.mp4

69.4 MB

KEYNOTE 1 - Redefining Defense - Saumil Shah.srt

83.2 KB

KEYNOTE 2 - All Fall Down - Interdependencies In The Cloud - Window Snyder.mp4

19.6 MB

KEYNOTE 2 - All Fall Down - Interdependencies In The Cloud - Window Snyder.srt

30.6 KB

Most Impressive - A Guide To Key Impressioning Attacks - Jos Weyers.mp4

84.7 MB

Most Impressive - A Guide To Key Impressioning Attacks - Jos Weyers.srt

89.1 KB

Oversight - Exposing Spies On MacOS - Patrick Wardle.mp4

110.7 MB

Oversight - Exposing Spies On MacOS - Patrick Wardle.srt

133.3 KB

Shadow Box - The Practical And Omnipotent Sandbox - Seunghun Han.mp4

70.1 MB

Shadow Box - The Practical And Omnipotent Sandbox - Seunghun Han.srt

70.1 KB

Side Channel Attacks Against iOS Crypto Libraries And More - Najwa Aaraj.mp4

63.0 MB

The Best Laid Schemes - Attacking URL Schemes - Yu Hong.mp4

76.4 MB

The Secret Of Chakracore - 10 Ways To Go Beyond The Edge - Linan Hao and Long Liu.mp4

89.6 MB

Vulnerabilities In Android Password Managers - Huber, Arzt & Rasthofer.mp4

71.3 MB

Vulnerabilities In Android Password Managers - Huber, Arzt & Rasthofer.srt

85.5 KB

We Broke All CSPs And You Won't Believe What Happened - Spagnuolo & Weichselbaum.mp4

98.0 MB

We Broke All CSPs And You Won't Believe What Happened - Spagnuolo & Weichselbaum.srt

110.4 KB

/HITB 2017 - Singapore/

A New Era Of SSRF - Exploiting Url Parsers - Orange Tsai.mp4

84.2 MB

A New Era Of SSRF - Exploiting Url Parsers - Orange Tsai.srt

84.3 KB

A Year In The Red - Dominic Chell & Vincent Yiu.mp4

97.6 MB

A Year In The Red - Dominic Chell & Vincent Yiu.srt

138.5 KB

CLOSING KEYNOTE - A Spin Around The Block - 13 Years Of Infosec Challenges - Kelly Lum.mp4

83.0 MB

CLOSING KEYNOTE - A Spin Around The Block - 13 Years Of Infosec Challenges - Kelly Lum.srt

107.6 KB

CommSec - 2FAssassin - Bypass 2FA, Stealing Private Keys, And More - Maxwell Koh.mp4

58.0 MB

CommSec - 2FAssassin - Bypass 2FA, Stealing Private Keys, And More - Maxwell Koh.srt

65.6 KB

CommSec - 200 Vulnerabilities In Android Phones - B. Guangdong & Z. Qing.mp4

56.2 MB

CommSec - 200 Vulnerabilities In Android Phones - B. Guangdong & Z. Qing.srt

46.3 KB

CommSec - Automotive Security Assessment Techniques And Tools - Keisuke Hirata.mp4

49.8 MB

CommSec - Automotive Security Assessment Techniques And Tools - Keisuke Hirata.srt

52.4 KB

CommSec - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger.mp4

94.8 MB

CommSec - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger.srt

77.3 KB

CommSec - Facebook - The Deep & Dark Web For Threat Actors In Asia - Fadli Sidek.mp4

73.1 MB

CommSec - Facebook - The Deep & Dark Web For Threat Actors In Asia - Fadli Sidek.srt

91.9 KB

CommSec - Growing Network Security Specialists For Our Enterprise - Xinhua Cai.mp4

41.2 MB

CommSec - Growing Network Security Specialists For Our Enterprise - Xinhua Cai.srt

48.2 KB

CommSec - Hacking Robots Before Skynet - Lucas Apa and Cesar Cerrudo.mp4

139.3 MB

CommSec - Hadoop Safari - Hunting For Vulnerabilities - T. Debize and M. Braik.mp4

105.3 MB

CommSec - Hadoop Safari - Hunting For Vulnerabilities - T. Debize and M. Braik.srt

113.8 KB

CommSec - Insecurity In 2017 - 0 Days Are The Least Of Our Problems - Nick Biasini.mp4

118.1 MB

CommSec - Insecurity In 2017 - 0 Days Are The Least Of Our Problems - Nick Biasini.srt

146.1 KB

CommSec - Intelligence And Counterintelligence Techniques - J. Hesse & K. Ranjan.mp4

105.0 MB

CommSec - Intelligence And Counterintelligence Techniques - J. Hesse & K. Ranjan.srt

127.2 KB

CommSec - Its Friday Evening Professor Moriarty - Nicolas Collery.mp4

70.8 MB

CommSec - Its Friday Evening Professor Moriarty - Nicolas Collery.srt

63.4 KB

CommSec - Searching For A Needle In A Remote Haystack - Vitaly Kamluk & Wayne Lee.mp4

65.7 MB

CommSec - Searching For A Needle In A Remote Haystack - Vitaly Kamluk & Wayne Lee.srt

80.7 KB

CommSec - Stealing PLC Intellectual Property - A Red Teaming Story - Matteo Beccaro.mp4

51.3 MB

CommSec - Stealing PLC Intellectual Property - A Red Teaming Story - Matteo Beccaro.srt

71.7 KB

CommSec - The Original Elevat0r - History Of A Private Jailbreak - Stefan Esser.mp4

93.9 MB

CommSec - The Original Elevat0r - History Of A Private Jailbreak - Stefan Esser.srt

114.1 KB

CommSec - Threat Hunting 101 - Become The Hunter - Hamza Beghal.mp4

60.4 MB

CommSec - Threat Hunting 101 - Become The Hunter - Hamza Beghal.srt

95.9 KB

CommSec - Unstructured Data Is The New Gold - ML - NLP Is The New Shiz - J. Geovedi.mp4

81.8 MB

CommSec - Unstructured Data Is The New Gold - ML - NLP Is The New Shiz - J. Geovedi.srt

92.1 KB

Finding Vulns And Malware In Open Source Code At Scale - Mark Curphey.mp4

108.9 MB

Finding Vulns And Malware In Open Source Code At Scale - Mark Curphey.srt

180.4 KB

Get To The Money - Hacking PoS And PoP Systems - D. Chastuhin & V. Egorov.mp4

103.6 MB

Get To The Money - Hacking PoS And PoP Systems - D. Chastuhin & V. Egorov.srt

103.3 KB

How We Broke Intel Amt - A. Ermolov, D. Evdokimov & M. Malyutin.mp4

70.1 MB

How We Broke Intel Amt - A. Ermolov, D. Evdokimov & M. Malyutin.srt

74.2 KB

Neuralfuzz - Neural Networks For Fuzzing Web Apps - Ivan Novikov.mp4

110.7 MB

Neuralfuzz - Neural Networks For Fuzzing Web Apps - Ivan Novikov.srt

131.3 KB

QEMU Attack Surface And Security Internals - Qiang Li & ZhiBin Hu.mp4

64.6 MB

Radio Exploitation 101 - Matt Knight & Marc Newlin.mp4

103.0 MB

Radio Exploitation 101 - Matt Knight & Marc Newlin.srt

153.8 KB

Rootten Apples - Vulnerability Heaven In The iOS Sandbox - Adam Donenfeld.mp4

89.8 MB

Rootten Apples - Vulnerability Heaven In The iOS Sandbox - Adam Donenfeld.srt

109.1 KB

Smart Cities Panel Discussion with M. Curphey, C. Cerrudo, E. Schwartz & M. Beccaro.mp4

125.1 MB

Smart Cities Panel Discussion with M. Curphey, C. Cerrudo, E. Schwartz & M. Beccaro.srt

188.8 KB

Spy Vs Spy - A Modern Study Of Microphone Bugs - V. Valeros & S. Garcia.mp4

121.8 MB

Spy Vs Spy - A Modern Study Of Microphone Bugs - V. Valeros & S. Garcia.srt

144.7 KB

The State Of Cyber - George Kurtz.mp4

86.7 MB

The State Of Cyber - George Kurtz.srt

146.0 KB

WELCOME ADDRESS - IoT - A Security Hole Without A Patch - Earl Carter.mp4

27.6 MB

WELCOME ADDRESS - IoT - A Security Hole Without A Patch - Earl Carter.srt

42.7 KB

XFLTReaT - A New Dimension In Tunnelling - Balazs Bucsay.mp4

120.4 MB

XFLTReaT - A New Dimension In Tunnelling - Balazs Bucsay.srt

133.8 KB

/HITB 2018 - Amsterdam/

A New Fuzzing Method for Android - Zhang Qing & Bai Guangdong.eng.srt

31.0 KB

A New Fuzzing Method for Android - Zhang Qing & Bai Guangdong.mp4

32.4 MB

Abusing The Travel Industry - V. Kropotov, F. Yarochkin, M. Fuentes & L. Gu.eng.srt

90.9 KB

Abusing The Travel Industry - V. Kropotov, F. Yarochkin, M. Fuentes & L. Gu.mp4

94.5 MB

Applying Machine Learning to User Behavior Anomaly Analysis - Eugene Neyolov.eng.srt

126.0 KB

Applying Machine Learning to User Behavior Anomaly Analysis - Eugene Neyolov.mp4

115.5 MB

Attacking Microsofts .NET Framework Through CLR - Yu Hong & Shikang Xing.eng.srt

83.6 KB

Attacking Microsofts .NET Framework Through CLR - Yu Hong & Shikang Xing.mp4

111.5 MB

Backdooring & Remotely Controlling Cars - Sheila A. Berta & Claudio Carraciolo.eng.srt

82.0 KB

Backdooring & Remotely Controlling Cars - Sheila A. Berta & Claudio Carraciolo.mp4

73.9 MB

Brida - When Burp Suite meets Frida - Federico Dotta & Piergiovanni Cipolloni.mp4

113.7 MB

CLOSING KEYNOTE - Security is What We Make of It - Blockchain and Beyond - Amber Baldet.eng.srt

163.3 KB

CLOSING KEYNOTE - Security is What We Make of It - Blockchain and Beyond - Amber Baldet.mp4

79.8 MB

CommSec - A Deep Dive Into Malicious Documents - Josh Stroschein.eng.srt

82.1 KB

CommSec - A Deep Dive Into Malicious Documents - Josh Stroschein.mp4

52.4 MB

CommSec - An Isolated Data Center Security Policy Model Using SmartNICs - Ofir Arkin.eng.srt

136.3 KB

CommSec - An Isolated Data Center Security Policy Model Using SmartNICs - Ofir Arkin.mp4

112.0 MB

CommSec - Attacking IoT Speakers - Stephen Hilt.eng.srt

77.8 KB

CommSec - Attacking IoT Speakers - Stephen Hilt.mp4

55.5 MB

CommSec - Automatic Generation of ROP Chains - Ricardo. J. Rodríguez & Daniel Uroz.eng.srt

77.8 KB

CommSec - Automatic Generation of ROP Chains - Ricardo. J. Rodríguez & Daniel Uroz.mp4

72.5 MB

CommSec - Behaviors and Patterns of Rogue Hosting Providers - D. Mahjoub & S. Brown.eng.srt

112.2 KB

CommSec - Behaviors and Patterns of Rogue Hosting Providers - D. Mahjoub & S. Brown.mp4

69.1 MB

CommSec - Faster, Wider, Greater - Modern Pentest Tricks - Thomas Debize.eng.srt

78.7 KB

CommSec - Faster, Wider, Greater - Modern Pentest Tricks - Thomas Debize.mp4

66.9 MB

CommSec - Hacking a Hospital for Fun and Profit - Asaf Cohen & Ofir Kamil.eng.srt

70.7 KB

CommSec - Hacking a Hospital for Fun and Profit - Asaf Cohen & Ofir Kamil.mp4

56.4 MB

CommSec - Hiding Tasks via Hardware Task Switching - Kyeong Joo Jung.eng.srt

48.4 KB

CommSec - Hiding Tasks via Hardware Task Switching - Kyeong Joo Jung.mp4

51.9 MB

CommSec - How to Find and Exploit Bugs in IoT Devices - Kelvin Wong.eng.srt

51.2 KB

CommSec - How to Find and Exploit Bugs in IoT Devices - Kelvin Wong.mp4

56.3 MB

CommSec - Keynterceptor - Press Any Key to Continue - Niels van Dijkhuizen.eng.srt

53.6 KB

CommSec - Keynterceptor - Press Any Key to Continue - Niels van Dijkhuizen.mp4

51.9 MB

CommSec - ProdSec - A Technical Approach - Jeremy Brown.eng.srt

107.8 KB

CommSec - ProdSec - A Technical Approach - Jeremy Brown.mp4

61.6 MB

CommSec - PyREBox - Making Dynamic Instrumentation Great Again - X. Ugarte-Pedrero.mp4

113.8 MB

CommSec - Smart Contract (In)Security - Ben Schmidt.eng.srt

59.9 KB

CommSec - Smart Contract (In)Security - Ben Schmidt.mp4

52.5 MB

CommSec - Steganography Ante Portas - Steffen Wendzel.eng.srt

71.2 KB

CommSec - Steganography Ante Portas - Steffen Wendzel.mp4

68.4 MB

CommSec - The Life & Death of Kernel Object Abuse - Salf ElSherei & Ian Kronquist.eng.srt

112.4 KB

CommSec - The Life & Death of Kernel Object Abuse - Salf ElSherei & Ian Kronquist.mp4

88.7 MB

Covert Data Exfiltration Channel - Hongjian Cao, Kunzhe Chai & Jun Li.eng.srt

53.7 KB

Covert Data Exfiltration Channel - Hongjian Cao, Kunzhe Chai & Jun Li.mp4

59.2 MB

Defense-in-Depth Techniques for Modern Web Apps - M. Spagnuolo & L. Weichselbaum.eng.srt

114.3 KB

Defense-in-Depth Techniques for Modern Web Apps - M. Spagnuolo & L. Weichselbaum.mp4

86.3 MB

Establishing Covert Channels By Abusing GSM AT Commands - A. Munoz & J. C. Saez.eng.srt

103.9 KB

Establishing Covert Channels By Abusing GSM AT Commands - A. Munoz & J. C. Saez.mp4

97.8 MB

Expanding Your WMI Lateral Movement Arsenal - Philip Tsukerman.eng.srt

89.6 KB

Expanding Your WMI Lateral Movement Arsenal - Philip Tsukerman.mp4

67.5 MB

Exposing Hidden Exploitable Behaviors Using EDF - Fernando Arnaboldi.eng.srt

135.4 KB

Exposing Hidden Exploitable Behaviors Using EDF - Fernando Arnaboldi.mp4

96.9 MB

Fuzzing Javascript Engines for Fun and Pwnage - Areum Lee & Jeonghoon Shin.eng.srt

55.6 KB

Fuzzing Javascript Engines for Fun and Pwnage - Areum Lee & Jeonghoon Shin.mp4

49.8 MB

How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers - X. Bai & M. Zheng.eng.srt

85.5 KB

How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers - X. Bai & M. Zheng.mp4

87.1 MB

KEYNOTE 1 - The Future, The Past, and Wait, Where the Hell are We Now - M. Marschalek.eng.srt

157.9 KB

KEYNOTE 1 - The Future, The Past, and Wait, Where the Hell are We Now - M. Marschalek.mp4

105.6 MB

KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio.eng.srt

120.3 KB

KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio.mp4

74.4 MB

Mallet - Towards a Generic Intercepting Proxy - Rogan Dawes.eng.srt

126.8 KB

Mallet - Towards a Generic Intercepting Proxy - Rogan Dawes.mp4

102.7 MB

Over The Edge - Pwning The Windows Kernel - Rancho Han.eng.srt

56.7 KB

Over The Edge - Pwning The Windows Kernel - Rancho Han.mp4

69.9 MB

Pwning KNX & ZigBee Networks - HuiYu Wu, YuXiang Li & Yong Yang.eng.srt

82.0 KB

Pwning KNX & ZigBee Networks - HuiYu Wu, YuXiang Li & Yong Yang.mp4

83.0 MB

Real World Attacks Against Secure Elements - Don Bailey.eng.srt

158.9 KB

Real World Attacks Against Secure Elements - Don Bailey.mp4

91.2 MB

Rooting Android 8 with a Kernel Space Mirroring Attack - Yong Wang & Yang Song.eng.srt

81.7 KB

Rooting Android 8 with a Kernel Space Mirroring Attack - Yong Wang & Yang Song.mp4

77.2 MB

Sandbox Evasion Using VBA Referencing - Aviv Grafi & Amit Dori.eng.srt

104.5 KB

Sandbox Evasion Using VBA Referencing - Aviv Grafi & Amit Dori.mp4

56.3 MB

Smashing Ethereum Smart Contracts for Fun and ACTUAL Profit - Bernhard Mueller.mp4

89.3 MB

Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) - Daniel Bohannon.eng.srt

212.6 KB

Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) - Daniel Bohannon.mp4

120.3 MB

Uncovering the Android Patch Gap - Karsten Nohl & Jakob Lell.eng.srt

134.1 KB

Uncovering the Android Patch Gap - Karsten Nohl & Jakob Lell.mp4

103.5 MB

Welcome Address - Improving Incentives for Cybersecurity - Michel van Eeten.mp4

40.1 MB

/HITB 2018 - Dubai/

A Secure And Robust Wireless Comm System For Low-Latency Applications - Dr. H. Mukhtar.mp4

15.3 MB

AI Model Security - Reverse Engineering Machine Learning Models - Kang Li.eng.srt

142.0 KB

AI Model Security - Reverse Engineering Machine Learning Models - Kang Li.mp4

43.1 MB

Attacking Industrial Wireless Mesh Networks - M. Van Ommeren and Erwin Paternotte.eng.srt

115.8 KB

Attacking Industrial Wireless Mesh Networks - M. Van Ommeren and Erwin Paternotte.mp4

50.0 MB

Auditable & Provable Privacy Of Smart Speakers - Wang Kang and Yang Bo.eng.srt

84.9 KB

Auditable & Provable Privacy Of Smart Speakers - Wang Kang and Yang Bo.mp4

42.6 MB

Blockchain, Public Chain and Contract Security - Li Jiafeng and Yang Changcheng.eng.srt

91.9 KB

Blockchain, Public Chain and Contract Security - Li Jiafeng and Yang Changcheng.mp4

37.2 MB

Building Security Beyond The Genesis Block - Ryan Shepherd.eng.srt

92.2 KB

Building Security Beyond The Genesis Block - Ryan Shepherd.mp4

25.5 MB

Building Your Own Self Driving, Self Racing Car - Dhillon 'L33tdawg' Kannabhiran.eng.srt

49.1 KB

Building Your Own Self Driving, Self Racing Car - Dhillon 'L33tdawg' Kannabhiran.mp4

14.1 MB

Capture This - Real Time Packet Processing With FPGAs - Matteo Collura.eng.srt

144.4 KB

Capture This - Real Time Packet Processing With FPGAs - Matteo Collura.mp4

45.9 MB

CLOSING KEYNOTE - Blind Digital Signatures - Dr. Manar Abu Talib and Dr. Qassim Nasir.mp4

38.7 MB

CTF Prize Giving Closing Ceremony Locknote - HitB Crew.eng.srt

38.2 KB

CTF Prize Giving Closing Ceremony Locknote - HitB Crew.mp4

22.7 MB

DHCP Is Hard - Felix Wilhelm.eng.srt

124.4 KB

DHCP Is Hard - Felix Wilhelm.mp4

41.4 MB

Enhancing DL DGA Detection Models Using Separate Character Embedding - Vikash Yadav.eng.srt

96.1 KB

Enhancing DL DGA Detection Models Using Separate Character Embedding - Vikash Yadav.mp4

27.9 MB

Evolution of Security Threats To Telecommunications Infrastructures - Emmanuel Gadaix.eng.srt

72.8 KB

Evolution of Security Threats To Telecommunications Infrastructures - Emmanuel Gadaix.mp4

23.1 MB

Extracting Messages From iCloud - Vladimir Katalov.eng.srt

128.7 KB

Extracting Messages From iCloud - Vladimir Katalov.mp4

49.2 MB

Glitch Chronicles - Turning WebGL Into A Hammer - Pietro Frigo.eng.srt

148.9 KB

Glitch Chronicles - Turning WebGL Into A Hammer - Pietro Frigo.mp4

43.1 MB

Gold Digging - Discovering Hidden Gems In APKs - Marc Schoenefeld.mp4

41.5 MB

Hacking Into Broadband And Broadcast TV Systems - C. Kasmi, P. Barre and T. Sabono.eng.srt

62.0 KB

Hacking Into Broadband And Broadcast TV Systems - C. Kasmi, P. Barre and T. Sabono.mp4

27.6 MB

Hacking Telephone Systems For Fun & Profit - Himanshu Mehta and Sachin Wagh.mp4

32.6 MB

Hacking The International RFQ Process killthebuzzwords - Dino Covotsos.eng.srt

93.6 KB

Hacking The International RFQ Process killthebuzzwords - Dino Covotsos.mp4

20.9 MB

Hacking Yachts Remotely - IoT Hacking At Sea - Stephan Gerling.mp4

38.2 MB

Horror On The Bus - Hacking COMBUS - Kirils Solovjovs.eng.srt

125.2 KB

Horror On The Bus - Hacking COMBUS - Kirils Solovjovs.mp4

51.1 MB

Hunting For Backdoors In IoT Firmware At Unprecedented Scale - John Toterhi.eng.srt

117.1 KB

Hunting For Backdoors In IoT Firmware At Unprecedented Scale - John Toterhi.mp4

31.5 MB

HWallet - The Simple Cryptocurrency Hardware Wallet - Nemanja Nikodijevic.eng.srt

53.5 KB

HWallet - The Simple Cryptocurrency Hardware Wallet - Nemanja Nikodijevic.mp4

18.2 MB

Improved Blockchain Infrastructure With IoT - Dr Qassim Nasir and Dr Manar Abu Talib.eng.srt

55.0 KB

Improved Blockchain Infrastructure With IoT - Dr Qassim Nasir and Dr Manar Abu Talib.mp4

15.6 MB

Intrusion-Detection On The HW Bus - Congyuan Xu,Wang Kang and Yang Bo.eng.srt

79.3 KB

Intrusion-Detection On The HW Bus - Congyuan Xu,Wang Kang and Yang Bo.mp4

43.0 MB

IPv666 - Address Of The Beast - Marc Newlin and Chris Grayson.eng.srt

166.9 KB

IPv666 - Address Of The Beast - Marc Newlin and Chris Grayson.mp4

48.9 MB

KEYNOTE 1 - Crouching Tiger, Sudden Keynote - Katie Moussouris.eng.srt

137.5 KB

KEYNOTE 1 - Crouching Tiger, Sudden Keynote - Katie Moussouris.mp4

61.8 MB

KEYNOTE 2 - Cyber Arms Race - Mikko Hypponen (2).eng.srt

107.4 KB

KEYNOTE 2 - Cyber Arms Race - Mikko Hypponen (2).mp4

56.4 MB

KEYNOTE 2 - Cyber Arms Race - Mikko Hypponen.eng.srt

107.4 KB

KEYNOTE 2 - Cyber Arms Race - Mikko Hypponen.mp4

81.7 MB

Multidimensional HW Attack And Defense Toolset - K. Chai, Jie Fu & Mingchuang Qin.eng.srt

63.6 KB

Multidimensional HW Attack And Defense Toolset - K. Chai, Jie Fu & Mingchuang Qin.mp4

34.5 MB

NTLM Relay Is Dead, Long Live NTLM Relay - Jianing Wang and Junyu Zhou.eng.srt

80.0 KB

NTLM Relay Is Dead, Long Live NTLM Relay - Jianing Wang and Junyu Zhou.mp4

36.3 MB

Offensive Memory Forensics - Hugo Teso.eng.srt

150.2 KB

Offensive Memory Forensics - Hugo Teso.mp4

48.9 MB

Rooting Routers Using Symbolic Execution - Mathy Vanhoef.mp4

49.3 MB

Spanish Fly - Infecting Files On-The-Fly - Leonardo Nve.eng.srt

83.4 KB

Spanish Fly - Infecting Files On-The-Fly - Leonardo Nve.mp4

47.4 MB

System-level Threats - Assumptions In Modern Product Security - Cristofaro Mune.eng.srt

98.5 KB

System-level Threats - Assumptions In Modern Product Security - Cristofaro Mune.mp4

27.0 MB

The Phantom Menace - Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.eng.srt

52.1 KB

The Phantom Menace - Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.mp4

32.6 MB

Using Machine-Learning To Investigate Web Campaigns At Large - Federico Maggi.eng.srt

133.8 KB

Using Machine-Learning To Investigate Web Campaigns At Large - Federico Maggi.mp4

55.7 MB

Virtualizing IoT With Code Coverage Guided Fuzzing - KJ Lau and Nguyen Anh Quynh.eng.srt

163.1 KB

Virtualizing IoT With Code Coverage Guided Fuzzing - KJ Lau and Nguyen Anh Quynh.mp4

61.7 MB

Vote Of No Confidence - Second Factor Correctness - Victor Mateu.eng.srt

161.0 KB

Vote Of No Confidence - Second Factor Correctness - Victor Mateu.mp4

45.6 MB

Welcome Address - H.E. Yousuf Hamad Al Shaibani.mp4

1.6 MB

/HITB 2018 - Singapore/

A First Look Into The Security Of The Apple Pencil And Smartkeyboard - S. Esser.eng.srt

138.3 KB

A First Look Into The Security Of The Apple Pencil And Smartkeyboard - S. Esser.mp4

60.2 MB

A Year Of Purple - Ryan Shepherd.eng.srt

216.2 KB

A Year Of Purple - Ryan Shepherd.mp4

64.9 MB

CLOSING KEYNOTE - Rethinking The Cyber Kill Chain - Alexis Lavi.eng.srt

58.5 KB

CLOSING KEYNOTE - Rethinking The Cyber Kill Chain - Alexis Lavi.mp4

22.2 MB

COMMSEC - Blockchain And Smart Contract Attack Vectors - Jorden Seet.eng.srt

100.9 KB

COMMSEC - Blockchain And Smart Contract Attack Vectors - Jorden Seet.mp4

33.1 MB

COMMSEC - Breaking Full Disk Encryption - Nicolas Collery and Vitaly Kamluk.eng.srt

86.2 KB

COMMSEC - Breaking Full Disk Encryption - Nicolas Collery and Vitaly Kamluk.mp4

36.9 MB

COMMSEC - Closing Remarks - Andrea Zapparoli Manzoni.eng.srt

14.8 KB

COMMSEC - Closing Remarks - Andrea Zapparoli Manzoni.mp4

7.2 MB

COMMSEC - Cognitive Automation With Machine Learning In Cybersecurity - Rishi Kant.eng.srt

54.6 KB

COMMSEC - Cognitive Automation With Machine Learning In Cybersecurity - Rishi Kant.mp4

24.0 MB

COMMSEC - Demystifying The Definitions Of Dark - Fadli. B. Sidek.eng.srt

69.1 KB

COMMSEC - Demystifying The Definitions Of Dark - Fadli. B. Sidek.mp4

26.6 MB

COMMSEC - Generic And Static Detection Of Mobile Malware Using ML - Minh Tran.eng.srt

67.2 KB

COMMSEC - Generic And Static Detection Of Mobile Malware Using ML - Minh Tran.mp4

20.4 MB

COMMSEC - Hacking Mobile Games - Closing The Gap - Nicholas Lim.eng.srt

82.2 KB

COMMSEC - Hacking Mobile Games - Closing The Gap - Nicholas Lim.mp4

28.8 MB

COMMSEC - Internet Of Things - Battle Of The Bots - Rommel D. Joven.eng.srt

62.9 KB

COMMSEC - Internet Of Things - Battle Of The Bots - Rommel D. Joven.mp4

23.9 MB

COMMSEC - KLara - Your New Friend - Dan Demeter.eng.srt

68.4 KB

COMMSEC - KLara - Your New Friend - Dan Demeter.mp4

29.4 MB

COMMSEC - Learning How To Smurf With Honeypots - Emil Tan.eng.srt

78.3 KB

COMMSEC - Learning How To Smurf With Honeypots - Emil Tan.mp4

29.5 MB

COMMSEC - Monitoring Native Execution In WoW64 Apps - Y. Shafir and A. Carlsbad.eng.srt

130.0 KB

COMMSEC - Monitoring Native Execution In WoW64 Apps - Y. Shafir and A. Carlsbad.mp4

42.0 MB

COMMSEC - RedPhishing - Wi-Fi, Phishing And Red Teaming - Matteo Beccaro.eng.srt

41.6 KB

COMMSEC - RedPhishing - Wi-Fi, Phishing And Red Teaming - Matteo Beccaro.mp4

16.1 MB

COMMSEC - SayaKenaHack - Breach Notification In Malaysia - Keith Rozario.eng.srt

93.4 KB

COMMSEC - SayaKenaHack - Breach Notification In Malaysia - Keith Rozario.mp4

29.6 MB

COMMSEC - Securing ICS SCADA - Defense In Depth - Mike Rebultan.eng.srt

39.1 KB

COMMSEC - Securing ICS SCADA - Defense In Depth - Mike Rebultan.mp4

20.9 MB

COMMSEC - Software Security Era - Past, Present, And Future - Nafiez and Jaan Yeh.mp4

25.2 MB

COMMSEC - Surprise Rant 2.0 - Joernchen.eng.srt

34.1 KB

COMMSEC - Surprise Rant 2.0 - Joernchen.mp4

15.9 MB

COMMSEC - The Trails Of WINDSHIFT APT - Taha Karim.eng.srt

130.7 KB

COMMSEC - The Trails Of WINDSHIFT APT - Taha Karim.mp4

54.0 MB

COMMSEC - Threat Impact Analyser For IoT - Simon Eng and Lim Eng Woei.eng.srt

75.4 KB

COMMSEC - Threat Impact Analyser For IoT - Simon Eng and Lim Eng Woei.mp4

29.6 MB

COMMSEC - Using ML To Identify Security Issues In Open-Source Libraries - A. Sharma.eng.srt

78.0 KB

COMMSEC - Using ML To Identify Security Issues In Open-Source Libraries - A. Sharma.mp4

19.9 MB

COMMSEC - Welcome Address - Andrea Zapparoli Manzoni.eng.srt

22.1 KB

COMMSEC - Welcome Address - Andrea Zapparoli Manzoni.mp4

8.7 MB

Exploiting Automation In LTE Mobile Networks - R. Borgaonkar and A. Shaik.eng.srt

131.7 KB

Exploiting Automation In LTE Mobile Networks - R. Borgaonkar and A. Shaik.mp4

38.3 MB

File Structures - Another Binary Exploitation Technique - An-Jie Yang (Angelboy).eng.srt

79.1 KB

File Structures - Another Binary Exploitation Technique - An-Jie Yang (Angelboy).mp4

37.5 MB

God Mode Unlocked - Hardware Backdoors In x86 CPUs - Christopher Domas.eng.srt

178.9 KB

God Mode Unlocked - Hardware Backdoors In x86 CPUs - Christopher Domas.mp4

47.3 MB

Hacking BLE Bicycle Locks For Fun And (A Small) Profit - Vincent Tan.eng.srt

74.4 KB

Hacking BLE Bicycle Locks For Fun And (A Small) Profit - Vincent Tan.mp4

30.1 MB

KEYNOTE 1 - (In)Security Is Eating The World - Michael Coates.eng.srt

130.6 KB

KEYNOTE 1 - (In)Security Is Eating The World - Michael Coates.mp4

39.9 MB

KEYNOTE 2 - OK Computer - Machine Learning In Cybersecurity - Alexander Polyakov.eng.srt

3.9 KB

KEYNOTE 2 - OK Computer - Machine Learning In Cybersecurity - Alexander Polyakov.mp4

2.0 MB

LOCK NOTE - Philippe Viola.eng.srt

20.8 KB

LOCK NOTE - Philippe Viola.mp4

9.7 MB

NFC Payments - The Art Of Relay And Replay Attacks - Salvador Mendoza.eng.srt

82.0 KB

NFC Payments - The Art Of Relay And Replay Attacks - Salvador Mendoza.mp4

34.0 MB

Owning Electronic Locks Without Leaving A Trace - Tomi Tuominen and Timo Hirvonen.eng.srt

121.3 KB

Owning Electronic Locks Without Leaving A Trace - Tomi Tuominen and Timo Hirvonen.mp4

50.2 MB

Panel Discussion - Zero Seconds To Midnight - The 0-day Market.eng.srt

156.6 KB

Panel Discussion - Zero Seconds To Midnight - The 0-day Market.mp4

70.7 MB

The Road To iOS Sandbox Escape - Rani Idan.eng.srt

89.1 KB

The Road To iOS Sandbox Escape - Rani Idan.mp4

33.3 MB

Traversing The Kill-Chain - The New Shiny In 2018 - Vincent Yiu.eng.srt

156.7 KB

Traversing The Kill-Chain - The New Shiny In 2018 - Vincent Yiu.mp4

51.7 MB

Turning Memory Errors Into Code Execution With Client-Side Compilers - R. Gawlik.mp4

30.1 MB

Viewer Discretion Advised - (De)Coding An iOS Vulnerability - Adam Donenfeld.eng.srt

149.2 KB

Viewer Discretion Advised - (De)Coding An iOS Vulnerability - Adam Donenfeld.mp4

51.7 MB

/HITB 2019 - Amsterdam/

A Successful Mess Between Hardening And Mitigation - Weichselbaum & Spagnuolo.eng.srt

97.0 KB

A Successful Mess Between Hardening And Mitigation - Weichselbaum & Spagnuolo.mp4

114.9 MB

Attacking Encrypted VOIP Protocols - Ivica Stipovic.eng.srt

39.8 KB

Attacking Encrypted VOIP Protocols - Ivica Stipovic.mp4

44.7 MB

Attacking GSM - Alarms, Smart Homes, Smart Watches And More - Alex Kolchanov.mp4

101.6 MB

Attacking Industrial Remote Controllers - Marco Balduzzi and Federico Maggi.eng.srt

85.6 KB

Attacking Industrial Remote Controllers - Marco Balduzzi and Federico Maggi.mp4

112.7 MB

Automated Discovery Of Logical Priv. Esc. Bugs In Win10 - Wenxu Wu and Shi Qin.eng.srt

53.9 KB

Automated Discovery Of Logical Priv. Esc. Bugs In Win10 - Wenxu Wu and Shi Qin.mp4

107.3 MB

Binder The Bridge To Root - Hongli Han and Mingjian Zhou.eng.srt

38.6 KB

Binder The Bridge To Root - Hongli Han and Mingjian Zhou.mp4

50.7 MB

Closing Ceremony & CTF Prize Giving Ceremony.eng.srt

23.9 KB

Closing Ceremony & CTF Prize Giving Ceremony.mp4

31.9 MB

Compiler Bugs And Bug Compilers - Marion Marschalek.eng.srt

121.6 KB

Compiler Bugs And Bug Compilers - Marion Marschalek.mp4

84.8 MB

Demystifying IoT OT Hacks With SDR - Harshit Agrawal & Himanshu Mehta.eng.srt

57.1 KB

Demystifying IoT OT Hacks With SDR - Harshit Agrawal & Himanshu Mehta.mp4

8.4 MB

Deobfuscate UEFI BIOS Malware And Virtualized Packers - Alexandre Borges.eng.srt

65.9 KB

Deobfuscate UEFI BIOS Malware And Virtualized Packers - Alexandre Borges.mp4

135.7 MB

Duplicating Black Box Machine Learning Models - Rewanth Cool and Nikhil Joshi.mp4

71.2 MB

Finding Vulnerabilities In iOS MacOS Networking Code - Kevin Backhouse.eng.srt

73.3 KB

Finding Vulnerabilities In iOS MacOS Networking Code - Kevin Backhouse.mp4

92.9 MB

fn fuzzy Fast Multiple Binary Diffing Triage With IDA - Takahiro Haruyama.mp4

62.8 MB

For The Win The Art Of The Windows Kernel Fuzzing - Guangming Liu.eng.srt

38.5 KB

For The Win The Art Of The Windows Kernel Fuzzing - Guangming Liu.mp4

93.9 MB

H(ack)DMI Pwning HDMI For Fun And Profit - Jeonghoon Shin and Changhyeon Moon.mp4

74.0 MB

Hacking LTE Public Warning Systems - Weiguang Li.eng.srt

24.1 KB

Hacking LTE Public Warning Systems - Weiguang Li.mp4

33.7 MB

Hacking The 0day Market - Andrea Zapparoli Manzoni.eng.srt

44.3 KB

Hacking The 0day Market - Andrea Zapparoli Manzoni.mp4

37.1 MB

Hidden Agendas Bypassing GSMA Recommendations On SS7 Networks - Kirill Puzankov.eng.srt

72.9 KB

Hidden Agendas Bypassing GSMA Recommendations On SS7 Networks - Kirill Puzankov.mp4

113.7 MB

Hourglass Fuzz A Quick Bug Hunting Method - M. Li, T. Han, L. Jiang and L. Wu.eng.srt

81.1 KB

Hourglass Fuzz A Quick Bug Hunting Method - M. Li, T. Han, L. Jiang and L. Wu.mp4

108.2 MB

How To Dump, Parse, And Analyze i.MX Flash Memory Chips - Damien Cauquil.eng.srt

69.5 KB

How To Dump, Parse, And Analyze i.MX Flash Memory Chips - Damien Cauquil.mp4

20.3 MB

I Own Your Building (Management System) - Gjoko Krstic.eng.srt

62.7 KB

I Own Your Building (Management System) - Gjoko Krstic.mp4

57.7 MB

Improving Unicode Attacks With Deep Learning - Muñoz, Boza & Escribano.mp4

22.1 MB

KEYNOTE 2 - Securing Journalists - Runa Sandvik.eng.srt

72.8 KB

KEYNOTE 2 - Securing Journalists - Runa Sandvik.mp4

55.6 MB

KEYNOTE The End Is The Beginning Is The End Ten Years In The NL Box - D. Kannabhiran.eng.srt

77.1 KB

KEYNOTE The End Is The Beginning Is The End Ten Years In The NL Box - D. Kannabhiran.mp4

69.5 MB

LOCKNOTE - HITBCyberWeek Announcement - Dhillon 'L33tdawg' Kannabhiran.eng.srt

22.3 KB

LOCKNOTE - HITBCyberWeek Announcement - Dhillon 'L33tdawg' Kannabhiran.mp4

19.4 MB

Make ARM Shellcode Great Again - Saumil Shah.mp4

101.7 MB

Might As Well JUMP Exploit Development For Java Serialization - Jameel Nabbo.eng.srt

30.9 KB

Might As Well JUMP Exploit Development For Java Serialization - Jameel Nabbo.mp4

44.0 MB

ModJack Hijacking The MacOS Kernel - Zhi Zhou.eng.srt

70.7 KB

ModJack Hijacking The MacOS Kernel - Zhi Zhou.mp4

111.2 MB

Muraena The Unexpected Phish - Michele Orru and Giuseppe Trotta.eng.srt

65.4 KB

Muraena The Unexpected Phish - Michele Orru and Giuseppe Trotta.mp4

221.5 MB

Overcoming Fear Reversing With Radare2 - Arnau Gamez Montolio.eng.srt

183.4 KB

Overcoming Fear Reversing With Radare2 - Arnau Gamez Montolio.mp4

204.2 MB

Panic On The Streets Of Amsterdam PanicXNU 3.0 - Juwei Lin and Junzhi Lu.eng.srt

57.9 KB

Panic On The Streets Of Amsterdam PanicXNU 3.0 - Juwei Lin and Junzhi Lu.mp4

95.6 MB

PatrOwl - The Red Flavour Of SOC Automation And Orchestration - Nicolas Mattiocco.mp4

36.6 MB

PREVIEW - The Beginning of the End A Return to the Abyss for a Quick Look.eng.srt

4.2 KB

PREVIEW - The Beginning of the End A Return to the Abyss for a Quick Look.mp4

7.8 MB

PREVIEW - The End Is The Beginning Is The End Ten Years In The NL Box.eng.srt

0.9 KB

PREVIEW - The End Is The Beginning Is The End Ten Years In The NL Box.mp4

1.7 MB

Pwning Centrally-Controlled Smart Homes - Sanghyun Park and Seongjoon Cho.mp4

58.0 MB

Researching New Attack Interfaces On iOS And OSX - Lilang Wu and Moony Li.eng.srt

61.2 KB

Researching New Attack Interfaces On iOS And OSX - Lilang Wu and Moony Li.mp4

102.4 MB

Reverse Engineering Custom ASICs By Exploiting Supply-Chain Leaks - Thomas Weber.eng.srt

35.9 KB

Reverse Engineering Custom ASICs By Exploiting Supply-Chain Leaks - Thomas Weber.mp4

55.1 MB

Reversing Cryptographic Primitives Using Quantum Computing - Renaud Lifchitz.eng.srt

76.4 KB

Reversing Cryptographic Primitives Using Quantum Computing - Renaud Lifchitz.mp4

126.6 MB

Reversing Mobile Malware - Abdullah Joseph.eng.srt

54.3 KB

Reversing Mobile Malware - Abdullah Joseph.mp4

61.7 MB

Rise Of The WarPi - Kevin McPeake.eng.srt

56.7 KB

Rise Of The WarPi - Kevin McPeake.mp4

52.1 MB

Secure And Scalable Anomaly-Based Network Intrusion Detection - Philipp Mieden.eng.srt

54.5 KB

Secure And Scalable Anomaly-Based Network Intrusion Detection - Philipp Mieden.mp4

58.0 MB

Sneaking Past Device Guard - Philip Tsukerman.eng.srt

77.4 KB

Sneaking Past Device Guard - Philip Tsukerman.mp4

107.7 MB

Social Networks Can We Fix Them - Joel Hernandez.eng.srt

29.3 KB

Social Networks Can We Fix Them - Joel Hernandez.mp4

35.7 MB

The Beginning Of The End A Return To The Abyss For A Quick Look - R. Thieme.eng.srt

105.9 KB

The Beginning Of The End A Return To The Abyss For A Quick Look - R. Thieme.mp4

28.4 MB

The Birdman Hacking Cospas-Sarsat Satellites - Hao Jingli.eng.srt

48.7 KB

The Birdman Hacking Cospas-Sarsat Satellites - Hao Jingli.mp4

70.5 MB

TOCTOU Attacks Against Secure Boot And BootGuard - Trammell Hudson & Peter Bosch.eng.srt

58.0 KB

TOCTOU Attacks Against Secure Boot And BootGuard - Trammell Hudson & Peter Bosch.mp4

72.4 MB

V1 Bounty Building A Coordinated Bug Disclosure Bridge For The EU - Benjamin Kunz.mp4

87.4 MB

WiCy Monitoring 802.11AC Networks At Scale - Vivek Ramachandran.mp4

37.2 MB

/HITB 2019 - CyberWeek/

AI HIGHLIGHT - Advances In The Trinity Of AI - Anima Anandkumar.mp4

147.2 MB

AI HIGHLIGHT - Reputation Systems Against Social Engineering - Anton Kolonin.mp4

133.2 MB

An Open-Source Toolkit For Model-Based Fuzzing Of ARM CPUs - Jared Wright.mp4

82.5 MB

BLOCKCHAIN HIGHLIGHT - BCM Secure Messaging By Hackers For Hackers - KunZhe Chai.mp4

53.9 MB

BLOCKCHAIN HIGHLIGHT - Security Enabling Blockchains - Paul Makowski.mp4

105.8 MB

BLOCKCHAIN HIGHLIGHT - The Impact Of Blockchain And Cryptocurrencies - Gerard Dache.mp4

80.8 MB

Build A Quantum Computer At Home - Hacker Style - Yann Allain.mp4

65.2 MB

Car Hacking Practical Guide To Automotive Security - Yogesh Ojha.mp4

84.7 MB

COMMSEC - HIGHLIGHT - Are You Insured Around Cyber Crime - Jake Kouns.mp4

97.9 MB

COMMSEC - HIGHLIGHT Cloud Computings Appeal Is Cloud Secs Complexity - Nils Puhlmann.mp4

42.1 MB

COMMSEC - HIGHLIGHT Government At The Center Of A Cyber Battle - H.E. Mohammed Gheyath.mp4

41.2 MB

CyptoAPT APT Attacks On Crypto Exchange Employees - Heungsoo Kang.mp4

73.0 MB

DCART Decoupled Components For Automated Ransomware Testing - Mark Mager.mp4

90.8 MB

Debunking Fault Injection Myths And Misconceptions - C. Mune and N. Timmers.mp4

110.3 MB

Detecting Attacks In Ethereum Smart Contracts - N. Quoc Bao and N. Anh Quynh.mp4

104.0 MB

EOS Hackers New Bank - Vic Huang.mp4

58.2 MB

Fuzzing Farm Monoculture Antipatterns - Marc Schoenefeld.mp4

78.7 MB

Hunting Threats In Social Media Networks - F. Yarochkin and V. Kropotov.mp4

110.3 MB

Introducing ARM-X The ARM IoT Firmware Emulation Framework - Saumil Shah.mp4

90.1 MB

KEYNOTE - How Hacking Has Changed The Modern Battlefield - Marc Rogers.mp4

90.1 MB

KEYNOTE - Security Is Already Here - Its Just Not Evenly Distributed - Chris Wysopal.mp4

107.3 MB

KEYNOTE - We Hacked The Planet - Now What - Katie Moussouris.mp4

91.0 MB

LoRaWAN Auditing - E. Martínez Fayó, M. Sequeira and C. Cerrudo.mp4

120.5 MB

Open Source Security - Vulnerabilities Never Come Alone - Fermin J. Serna.mp4

90.6 MB

QUANTUM HIGHLIGHT - Quantum Disruption - Jose Ignacio.mp4

57.7 MB

QUANTUM HIGHLIGHT - What Would A Quantum Computer Do To Crypto - Najwa Aaraj.mp4

57.4 MB

QUANTUM HIGHLIGHT Panel Discussion - M. Manzano, Y. Allain, N. Aaraj and J. Ignacio.mp4

128.2 MB

Reimplementing Local RPC In .Net - James Forshaw.mp4

95.2 MB

Ridiculous Radios - Michael Ossmann.mp4

98.3 MB

RIDL Rogue In Flight Data Load - Stephan van Schaik and Sebastian Osterlund.mp4

78.8 MB

The Road to Building Defendable Systems - Saumil Shah.mp4

73.3 MB

The Sum Of All Fears, When ICS SCADA Are Compromised - Mars Cheng.mp4

115.8 MB

/HITB 2019 - Singapore/

4G LTE Man In The Middle Attacks With A Hacked Femtocell - Xiaodong Zou.eng.srt

50.7 KB

4G LTE Man In The Middle Attacks With A Hacked Femtocell - Xiaodong Zou.mp4

55.6 MB

4G To 5G New Attacks - Altaf Shaik.eng.srt

105.6 KB

4G To 5G New Attacks - Altaf Shaik.mp4

57.1 MB

A Pre-Auth RCE On Leading SSL VPNs - Orange Tsai and Tingyi Chang.eng.srt

71.4 KB

A Pre-Auth RCE On Leading SSL VPNs - Orange Tsai and Tingyi Chang.mp4

61.1 MB

Advanced Mutation Fuzzing Method For Wireless Protocols - Lidong Li and Xianzi Kong.eng.srt

26.9 KB

Advanced Mutation Fuzzing Method For Wireless Protocols - Lidong Li and Xianzi Kong.mp4

27.4 MB

Bypassing Hardware-Based Trusted Boot Through x86 Downgrade - Alexander Ermolov.eng.srt

37.7 KB

Bypassing Hardware-Based Trusted Boot Through x86 Downgrade - Alexander Ermolov.mp4

37.9 MB

CLOSING KEYNOTE Securing Cyber-Physical Systems Moving Beyond Fear - Stefano Zanero.eng.srt

77.6 KB

CLOSING KEYNOTE Securing Cyber-Physical Systems Moving Beyond Fear - Stefano Zanero.mp4

59.7 MB

CLOSING Prize Ceremony Lock Note by Dhillon 'L33tdawg' Kannabhiran.eng.srt

26.7 KB

CLOSING Prize Ceremony Lock Note by Dhillon 'L33tdawg' Kannabhiran.mp4

21.7 MB

COMMSEC - Abusing Over-The-Air Client Provisioning - Slava Makkaveev and Artyom Skrobov.eng.srt

50.7 KB

COMMSEC - Abusing Over-The-Air Client Provisioning - Slava Makkaveev and Artyom Skrobov.mp4

42.9 MB

COMMSEC - Activities Of The Tick Cyber Espionage Group Over The Last 10 Years - Cha Minseok.eng.srt

36.4 KB

COMMSEC - Activities Of The Tick Cyber Espionage Group Over The Last 10 Years - Cha Minseok.mp4

49.2 MB

COMMSEC - BONUS Security Should Be Smarter Not Harder - Katie Moussouris.eng.srt

94.8 KB

COMMSEC - BONUS Security Should Be Smarter Not Harder - Katie Moussouris.mp4

96.3 MB

COMMSEC - Car Hacking Made - Easel - - Alina Tan, Chun Yong, Tan Pei Si and Solomon Tan.eng.srt

51.7 KB

COMMSEC - Car Hacking Made - Easel - - Alina Tan, Chun Yong, Tan Pei Si and Solomon Tan.mp4

54.8 MB

COMMSEC - DFEx - DNS File Exfiltration - Emilio Couto.eng.srt

87.7 KB

COMMSEC - DFEx - DNS File Exfiltration - Emilio Couto.mp4

105.7 MB

COMMSEC - Exploiting Zoom On MacOS - Michael Gianarakis and Sean Yeoh.eng.srt

115.8 KB

COMMSEC - Exploiting Zoom On MacOS - Michael Gianarakis and Sean Yeoh.mp4

66.5 MB

COMMSEC - Hacking Object Detectors Is Just Like Training Neural Networks - Jay Xiong.eng.srt

37.0 KB

COMMSEC - Hacking Object Detectors Is Just Like Training Neural Networks - Jay Xiong.mp4

52.5 MB

COMMSEC - How To Detect Fake Faces (Manipulated Images) Using CNNs - Jay Xiong.eng.srt

53.3 KB

COMMSEC - How To Detect Fake Faces (Manipulated Images) Using CNNs - Jay Xiong.mp4

87.6 MB

COMMSEC - Modern Automotive Attack Surfaces - Lior Yaari and Yonatan Migdal.eng.srt

104.8 KB

COMMSEC - Modern Automotive Attack Surfaces - Lior Yaari and Yonatan Migdal.mp4

81.8 MB

COMMSEC - Perfidious Make PE Backdooring Great Again - Shreyans Doshi.eng.srt

49.4 KB

COMMSEC - Perfidious Make PE Backdooring Great Again - Shreyans Doshi.mp4

26.3 MB

COMMSEC - Physical To Cyber And Back Fingerprint Scanner Security - Kevin Reed.eng.srt

74.7 KB

COMMSEC - Physical To Cyber And Back Fingerprint Scanner Security - Kevin Reed.mp4

101.2 MB

COMMSEC - Tracking Fake News Based On Deep Learning - Zonghou Lv,Tao Wei and Dou Goodman.eng.srt

30.2 KB

COMMSEC - Tracking Fake News Based On Deep Learning - Zonghou Lv,Tao Wei and Dou Goodman.mp4

53.9 MB

COMMSEC - Underrated Security Bugs - Eldar - Wireghoul - Marcussen.eng.srt

44.0 KB

COMMSEC - Underrated Security Bugs - Eldar - Wireghoul - Marcussen.mp4

52.1 MB

Creating A Fuzzer For Diameter And LTE Telecom Protocols - Sergey Mashukov.eng.srt

72.6 KB

Creating A Fuzzer For Diameter And LTE Telecom Protocols - Sergey Mashukov.mp4

69.0 MB

KEYNOTE D2 Never Gonna Give You Up, Never Gonna Let You Down - Marc Rogers.eng.srt

67.6 KB

KEYNOTE D2 Never Gonna Give You Up, Never Gonna Let You Down - Marc Rogers.mp4

44.0 MB

KEYNOTE The CISO's Dilemma - Saumil Shah.eng.srt

74.1 KB

KEYNOTE The CISO's Dilemma - Saumil Shah.mp4

55.2 MB

Launching Feedback-Driven Fuzzing On TrustZone TEE - Andrey Akimov.mp4

58.9 MB

Malware Classification With Graph Hash - Chai Ching Fang and Shih-Hao Weng.eng.srt

44.2 KB

Malware Classification With Graph Hash - Chai Ching Fang and Shih-Hao Weng.mp4

46.9 MB

Recreating An iOS 0-Day Jailbreak Out Of Apple's Security Updates - Stefan Esser.eng.srt

87.1 KB

Recreating An iOS 0-Day Jailbreak Out Of Apple's Security Updates - Stefan Esser.mp4

69.2 MB

Scare Static Code Analysis Recognition Evasion - Andreas Wiegenstein.mp4

65.6 MB

Understanding, Attacking & Securing Medical Devices - Ajay Pratap Singh.mp4

66.7 MB

Why You Should Fear Your - Mundane - Office Equipment - Mario Rivas and Daniel Romero.eng.srt

80.0 KB

Why You Should Fear Your - Mundane - Office Equipment - Mario Rivas and Daniel Romero.mp4

59.9 MB

/HITB 2020 - CyberWeek/

AEZAKMI Browser Anonymity & Fingerprinting Bypass.mp4

113.6 MB

Anatomy of Automated Account Takeovers.mp4

33.5 MB

Android RATs Detection With A Machine Learning-based Python IDS.mp4

42.3 MB

COMMSEC - Adventures in Building a CAN Bus Sniffer.mp4

35.9 MB

COMMSEC - Blue Team Visibility.mp4

17.4 MB

COMMSEC - Detection and Efficiency Testing of Endpoint Security Sensors.mp4

50.1 MB

COMMSEC - Enterprise Security Strategy Leveraging On Zero Trust Approach.mp4

64.6 MB

COMMSEC - Fuzzing Finding Your Own Bugs And 0days.mp4

48.1 MB

COMMSEC - Hacking The 0day Marketplace.mp4

44.3 MB

COMMSEC - Inside The Mind Of A Threat Actor Beyond Pentesting.mp4

30.0 MB

COMMSEC - Machine Learning Security Evasion Competition 2020.mp4

20.7 MB

COMMSEC - Optimizing The Protection Of IoT Devices.mp4

27.6 MB

COMMSEC - Spoofing Your Location On IOS Without Jailbreaking.mp4

23.1 MB

COMMSEC - Subverting Bit Locker With One Vulnerability.mp4

59.2 MB

COMMSEC - The Art of Exploiting Logical Flaws in Web Applications.mp4

82.6 MB

COMMSEC - The Journey For Manufacturers To Develop Cyber Resilient IoT Devices.mp4

29.0 MB

COMMSEC - The Work of Cyber in the Age of Mechanical Reproduction.mp4

31.7 MB

COMMSEC - Trustworthy Shield - A Cheap TPM Module For Older Systems.mp4

14.6 MB

Constructing an OS X Cyber Range for Red & Blue Teams.mp4

73.9 MB

Critical Infrastructure Data Breaches - An In-depth Analysis.mp4

38.0 MB

Exploitation Techniques and Attacks on Hosting Assets and Access for Resale.mp4

39.4 MB

Industrial Protocol Gateways A Deep-Dive of Moxa MGate 5105-MB-EIP.mp4

41.3 MB

Jailbreaks Never Die Exploiting iOS 13.7.mp4

39.5 MB

Kernel Exploitation with a File System Fuzzer.mp4

40.5 MB

KEYNOTE 1 - Ask Bruce.mp4

42.1 MB

KEYNOTE 2 - The War for Control of DNS Encryption - Paul Vixie.mp4

56.4 MB

RAMN Resistant Automotive Miniature Network.mp4

42.8 MB

The Road Towards 365 Bugs in Microsoft Office 365.mp4

34.3 MB

Trust, but Verify Main'taining Democracy In Spite of Информационные контрмеры.mp4

36.8 MB

/HITB 2020 - Lock Down 001/

60 CVEs In 60 Days - Eran Shimony.mp4

44.4 MB

Analyzing Recent Evolutions In Malware Loaders - H. Unterbrink & E. Brumaghin.mp4

84.4 MB

Army Of Undead Tailored Firmware Emulation - Thomas Weber.mp4

85.1 MB

Breaking And Securing Cloud Platforms - Fyodor Yarochkin.mp4

60.4 MB

Bugrank A Community Bug Bounty Platform - T. Nguyen, A. Lai & N.A. Quynh.mp4

33.7 MB

Building Next-Gen Security Analysis Tools With Qiling Framework - Lau KJ & S. Berni.mp4

76.2 MB

Documents Of Doom Infecting Macos Via Office Macros - Patrick Wardle.mp4

45.1 MB

Exploiting Directory Permissions On Macos - Csaba Fitzl.mp4

59.5 MB

Exploiting The Netlogon Protocol - Tom Tervoort.mp4

21.0 MB

Fuzzing File System Implementations To Uncover Security Bugs - Christopher Krah.mp4

65.6 MB

Prisoner Number 6 - Nimrod Stoler.mp4

60.2 MB

Pwning Adobe Reader Multiple Times With Malformed Strings - Ke Liu.mp4

60.8 MB

The Insecurity Of Cloudless Smart Door Systems - J. Schneider S. Neef & J. Beier.mp4

70.5 MB

Virtual Lab - Firmware Hacking With Ghidra - Thomas Roth & Dmitry Nedospasov.mp4

172.9 MB

/HITB 2020 - Lock Down 002/

Breakout Script of the Westworld - Tianwen Tang & Wei Xiao.mp4

24.8 MB

Common Flaws in ICS Network Protocols - Mars Cheng & Selmon Yang.mp4

117.0 MB

Exploring and Exploiting the SQLite - Wenxiang Qian.mp4

73.3 MB

FIDLing with Decompilers - Carlos Garcia Prado & Ryan Warns.mp4

62.6 MB

How Adversary Emulation Can Enhance Blue Team Performance - SHANG-DE Jiang.mp4

49.6 MB

How to Hack Medical Imaging Applications via DICOM - Maria Nedyak.mp4

44.8 MB

HTTP Statuses as C2 Commands and Compromised TLS - Denis Legezo.mp4

68.2 MB

KEYNOTE 1 - How Hardware Boundaries Define Platform Security - Alex Matrosov.mp4

39.1 MB

KEYNOTE 2 - DevSecOps, Chaos Security, and Not Being Left Behind - Eddie Schwartz.mp4

67.2 MB

Operation SemiChimera - - Bletchley Chen, Inndy Lin & SHANG-DE Jiang.mp4

83.0 MB

Python for Enhanced OPSEC - Joe Gray.mp4

85.7 MB

Runtime Memory Analysis Tool for Mobile Apps - I. Lyrchikov & E. Saltykov.mp4

36.9 MB

Secret Flaws of In-DRAM RowHammer Mitigations - E. Vannacci & P. Frigo.mp4

71.6 MB

Serverless Security Attack & Defense - Pawel Rzepa.mp4

90.0 MB

The Secret Codes Tell the Secrets - Zhang Qing & Bai Guangdong.mp4

49.8 MB

VIRTUAL LAB D1 - Signal Processing with GNURadio and SDRs - Ateet Kumar.mp4

200.3 MB

VIRTUAL LAB D1- Car Hacking - Alina Tan, Edmund, Tan Pei Si & Chun Yong.mp4

45.4 MB

VIRTUAL LAB D2 - Car Hacking - Alina Tan, Edmund, Tan Pei Si & Chun Yong.mp4

37.3 MB

VIRTUAL LAB Qiling Framework Build a Fuzzer Based on a 1day Bug - Lau Kai Jern.mp4

78.3 MB

Zen A Complex Campaign of Harmful Android Apps - Łukasz Siewierski.mp4

60.9 MB

/HITB 2021 - Amsterdam/

A Journey Into Synology NAS - Q C.eng.srt

66.3 KB

A Journey Into Synology NAS - Q C.mp4

48.7 MB

A QEMU Black Box Escape Via USB Device - Lingni Kong, Yanyu Zhang & Haipeng Qu.eng.srt

29.5 KB

A QEMU Black Box Escape Via USB Device - Lingni Kong, Yanyu Zhang & Haipeng Qu.mp4

14.6 MB

Attacking Cloud Native Kubernetes With CDK - Zebin Zhou and Yue Xu.eng.srt

48.4 KB

Attacking Cloud Native Kubernetes With CDK - Zebin Zhou and Yue Xu.mp4

30.0 MB

Attacking Fast Charging Electric Vehicles - Wu HuiYu and YuXiang Li.eng.srt

37.1 KB

Attacking Fast Charging Electric Vehicles - Wu HuiYu and YuXiang Li.mp4

25.4 MB

Binary Fuzzing With Snapshot-Assisted-Driven Comparison Branch Analysis - K. Son.eng.srt

68.4 KB

Binary Fuzzing With Snapshot-Assisted-Driven Comparison Branch Analysis - K. Son.mp4

34.6 MB

Bypassing DEP With Jump-Oriented Programming - B. Brizendine and A. Babcock.eng.srt

110.4 KB

Bypassing DEP With Jump-Oriented Programming - B. Brizendine and A. Babcock.mp4

73.5 MB

Closing Note by Dhillon @l33tdawg Kannabhiran.eng.srt

20.1 KB

Closing Note by Dhillon @l33tdawg Kannabhiran.mp4

7.4 MB

COMMSEC - 5G Networks And Interconnect Threats - Martin Kacer.eng.srt

46.6 KB

COMMSEC - 5G Networks And Interconnect Threats - Martin Kacer.mp4

26.4 MB

COMMSEC - AWS GuardDuty Post-DNS Era Covert Channel For C&C - Sze Siong Teo.eng.srt

30.1 KB

COMMSEC - AWS GuardDuty Post-DNS Era Covert Channel For C&C - Sze Siong Teo.mp4

26.2 MB

COMMSEC - Breaking Siemens SIMATIC S7 PLC Protection Mechanism - Gao Jian.eng.srt

40.5 KB

COMMSEC - Breaking Siemens SIMATIC S7 PLC Protection Mechanism - Gao Jian.mp4

32.2 MB

COMMSEC - Exploitation With Shell Reverse & Infection With PowerShell - Filipi Pires.eng.srt

74.6 KB

COMMSEC - Exploitation With Shell Reverse & Infection With PowerShell - Filipi Pires.mp4

45.9 MB

COMMSEC - JARM Randomizer Evading JARM Fingerprinting - Dagmawi Mulugeta.eng.srt

50.0 KB

COMMSEC - JARM Randomizer Evading JARM Fingerprinting - Dagmawi Mulugeta.mp4

25.3 MB

COMMSEC - Model Robustness Will Hurt Data Privacy - Jiqiang Gao and Mengyun Tang.eng.srt

44.0 KB

COMMSEC - Model Robustness Will Hurt Data Privacy - Jiqiang Gao and Mengyun Tang.mp4

30.5 MB

COMMSEC - One Stop Anomaly Shop - Andrei Cotaie and Tiberiu Boros.mp4

30.0 MB

COMMSEC - OPENING - Shaping The Future Of The 0Day Market - Andrea Zapparoli Manzoni.eng.srt

36.7 KB

COMMSEC - OPENING - Shaping The Future Of The 0Day Market - Andrea Zapparoli Manzoni.mp4

26.8 MB

COMMSEC - The History Of Adversarial AI by Alex Polyakov and Eugene Neelou.eng.srt

49.9 KB

COMMSEC - The History Of Adversarial AI by Alex Polyakov and Eugene Neelou.mp4

24.5 MB

Dissecting Phishing Techniques Of CloudDragon APT - Linda Kuo & Zih-Cing Liao.eng.srt

63.0 KB

Dissecting Phishing Techniques Of CloudDragon APT - Linda Kuo & Zih-Cing Liao.mp4

40.7 MB

Exploiting QSEE, The Raelize Way - Cristofaro Mune and Niek Timmers.eng.srt

75.3 KB

Exploiting QSEE, The Raelize Way - Cristofaro Mune and Niek Timmers.mp4

39.5 MB

Grid Computing Attacks On Streaming Services - Yoon, - Myeong, Hwang, Yun & Kim.eng.srt

35.8 KB

Grid Computing Attacks On Streaming Services - Yoon, - Myeong, Hwang, Yun & Kim.mp4

30.1 MB

Hack Out Of The Box Discovering 10 Vulnerabilities In VirtualBox - Chen Nan.eng.srt

74.3 KB

Hack Out Of The Box Discovering 10 Vulnerabilities In VirtualBox - Chen Nan.mp4

38.1 MB

HATS - Ask Me Anything with Andrea Zapparoli Manzoni from Crowdfense.eng.srt

89.3 KB

HATS - Ask Me Anything with Andrea Zapparoli Manzoni from Crowdfense.mp4

88.2 MB

HATS - Catch Up With Edwin van Andel.eng.srt

54.5 KB

HATS - Catch Up With Edwin van Andel.mp4

34.7 MB

HATS - Catch up with Ero Carrera and Sergey Lozhkin.eng.srt

63.9 KB

HATS - Catch up with Ero Carrera and Sergey Lozhkin.mp4

42.4 MB

HATS - Catch up with Kevin Gallerin of Yes We Hack.eng.srt

51.9 KB

HATS - Catch up with Kevin Gallerin of Yes We Hack.mp4

29.6 MB

HATS - Interview with Sean Chen & Cory Tseng of Panasonic Security Lab.eng.srt

36.4 KB

HATS - Interview with Sean Chen & Cory Tseng of Panasonic Security Lab.mp4

29.7 MB

HATS - Post Keynote Q&A with Jon Callas from EFF.eng.srt

65.4 KB

HATS - Post Keynote Q&A with Jon Callas from EFF.mp4

52.4 MB

HATS - Post Talk Q&A with Bramwell Brizendine & Austin Babcock.eng.srt

28.4 KB

HATS - Post Talk Q&A with Bramwell Brizendine & Austin Babcock.mp4

20.2 MB

HATS - Post Talk Q&A with Cristofaro Mune & Niek Timmers.eng.srt

6.3 KB

HATS - Post Talk Q&A with Cristofaro Mune & Niek Timmers.mp4

14.2 MB

HATS - Post Talk Q&A with Kaijern 'Xwings' Lau.eng.srt

34.6 KB

HATS - Post Talk Q&A with Kaijern 'Xwings' Lau.mp4

33.9 MB

How I Found 16 Microsoft Office Excel Vulnerabilities In 6 Months - Quan Jin.eng.srt

52.9 KB

How I Found 16 Microsoft Office Excel Vulnerabilities In 6 Months - Quan Jin.mp4

31.7 MB

KEYNOTE 1 Surveillance Is Not The Answer What Is The Question - Jon Callas.eng.srt

82.2 KB

KEYNOTE 1 Surveillance Is Not The Answer What Is The Question - Jon Callas.mp4

40.8 MB

KEYNOTE 2 The State Of Mobile Security - Zuk Avraham.eng.srt

94.3 KB

KEYNOTE 2 The State Of Mobile Security - Zuk Avraham.mp4

42.5 MB

MacOS Security Escaping The Sandbox & Bypassing TCC - T. Alkemade and D. Keuper.eng.srt

97.3 KB

MacOS Security Escaping The Sandbox & Bypassing TCC - T. Alkemade and D. Keuper.mp4

46.7 MB

Mind The Bridge A New Attack Model For Hybird Mobile Applications - Ce Qin.eng.srt

57.1 KB

Mind The Bridge A New Attack Model For Hybird Mobile Applications - Ce Qin.mp4

43.8 MB

Security Analysis And Practical Attacks Of LPWAN - YuXiang Li & Wu HuiYu.eng.srt

58.4 KB

Security Analysis And Practical Attacks Of LPWAN - YuXiang Li & Wu HuiYu.mp4

37.2 MB

Should You Be Afraid Of Hands-On Payment Devices - T. Yunusov and A. Stennikov.eng.srt

51.8 KB

Should You Be Afraid Of Hands-On Payment Devices - T. Yunusov and A. Stennikov.mp4

24.3 MB

The Rise Of Potatoes Priv. Esc. In Windows Services - A. Pierini & A. Cocomazzi.eng.srt

106.4 KB

The Rise Of Potatoes Priv. Esc. In Windows Services - A. Pierini & A. Cocomazzi.mp4

83.5 MB

Utilizing Lol-Drivers In Post Exploitation Tradecraft - Bariş Akkaya.eng.srt

54.8 KB

Utilizing Lol-Drivers In Post Exploitation Tradecraft - Bariş Akkaya.mp4

42.7 MB

When Qiling Framework Meets Symbolic Execution - KJ Lau, Kong, ZiQiao & ChenXu.eng.srt

83.1 KB

When Qiling Framework Meets Symbolic Execution - KJ Lau, Kong, ZiQiao & ChenXu.mp4

76.4 MB

WoW Hell Rebuilding Heavens Gate - ShengHao Ma.eng.srt

45.5 KB

WoW Hell Rebuilding Heavens Gate - ShengHao Ma.mp4

41.2 MB

/HITB 2021 - CyberWeek/

5G Cyber Security Challenges And Solution - Hulk Zhang.eng.srt

92.6 KB

5G Cyber Security Challenges And Solution - Hulk Zhang.mp4

51.1 MB

A Retro- And Introspective Of The State Of Cyber - Roger Sels.eng.srt

80.2 KB

A Retro- And Introspective Of The State Of Cyber - Roger Sels.mp4

71.8 MB

Animated Bugs The New Remote Attack Surface In Telegram - Paolo Giai.eng.srt

77.0 KB

Animated Bugs The New Remote Attack Surface In Telegram - Paolo Giai.mp4

65.8 MB

Attack Scenarios Abusing Azure Active Directory - Bill Ben Haim & Zur Ulianitzky.eng.srt

88.9 KB

Attack Scenarios Abusing Azure Active Directory - Bill Ben Haim & Zur Ulianitzky.mp4

71.0 MB

Attacking Automated Manufacturing Systems - Stefano Zanero.mp4

75.4 MB

Car Hacking Village @ #HITBCyberWeek.mp4

637.6 KB

Catch Bill Hagestad's talk on cyber threat at #HITBCyberWeek.eng.srt

1.3 KB

Catch Bill Hagestad's talk on cyber threat at #HITBCyberWeek.mp4

1.2 MB

Code Intention Hiding Based on AI Uninterpretability - Jifeng Zhu & Keyun Luo.eng.srt

55.4 KB

Code Intention Hiding Based on AI Uninterpretability - Jifeng Zhu & Keyun Luo.mp4

36.5 MB

DeFi Crypto Cyber Security Challenges - Cesar Cerrudo.eng.srt

47.0 KB

DeFi Crypto Cyber Security Challenges - Cesar Cerrudo.mp4

35.3 MB

Electro-optical Sound Eavesdropping - Ben Nassi.eng.srt

90.3 KB

Electro-optical Sound Eavesdropping - Ben Nassi.mp4

77.6 MB

Fireside Chat With Barry - Fish - Van Kampen.eng.srt

43.9 KB

Fireside Chat With Barry - Fish - Van Kampen.mp4

38.1 MB

Fireside Chat With Cooper @Ministraitor.eng.srt

63.9 KB

Fireside Chat With Cooper @Ministraitor.mp4

39.8 MB

Fireside Chat With Cristofaro Mune & Adam Laurie.eng.srt

45.5 KB

Fireside Chat With Cristofaro Mune & Adam Laurie.mp4

27.3 MB

Fireside Chat With Dhillon ‘L33tdawg’ Kannabhiran.eng.srt

25.1 KB

Fireside Chat With Dhillon ‘L33tdawg’ Kannabhiran.mp4

13.0 MB

Fireside Chat with Mouza Al Romaithi.eng.srt

49.0 KB

Fireside Chat with Mouza Al Romaithi.mp4

29.1 MB

Fireside Chat With Nemo & Tim Murck from HackShield.eng.srt

54.2 KB

Fireside Chat With Nemo & Tim Murck from HackShield.mp4

49.2 MB

Fireside Chat With Stefano Zanero and Marco Balduzzi.eng.srt

59.6 KB

Fireside Chat With Stefano Zanero and Marco Balduzzi.mp4

41.3 MB

Fireside Chat With Youssef Awad with H.E. Dr. Mohamed Al-Kuwaiti.eng.srt

11.6 KB

Fireside Chat With Youssef Awad with H.E. Dr. Mohamed Al-Kuwaiti.mp4

9.1 MB

From A Workplace To A Workforce - Ofir Arkin.eng.srt

92.5 KB

From A Workplace To A Workforce - Ofir Arkin.mp4

82.6 MB

Gremlin Apps And Gremlin Botnets - Chema Alonso.eng.srt

73.3 KB

Gremlin Apps And Gremlin Botnets - Chema Alonso.mp4

76.3 MB

Hacking The Planet With Knowledge Graphs - Hugo Teso.mp4

71.6 MB

Harmony In Motion - Aloysius Cheang.eng.srt

30.1 KB

Harmony In Motion - Aloysius Cheang.mp4

21.4 MB

HITB CyberWeek 2021 - Brought to you by DisruptAD.mp4

1.4 MB

HITB CyberWeek 2021 - Day 2 Highlights.mp4

2.2 MB

HITB CyberWeek 2021 Badge Unboxing.eng.srt

4.1 KB

HITB CyberWeek 2021 Badge Unboxing.mp4

5.0 MB

HITB LAB - EXPLIoT Framework - Aseem Jakhar.eng.srt

107.7 KB

HITB LAB - EXPLIoT Framework - Aseem Jakhar.mp4

113.2 MB

HITB LAB ARM IoT Firmware Extraction And Emulation Using ARMX - Saumil Shah.eng.srt

113.8 KB

HITB LAB ARM IoT Firmware Extraction And Emulation Using ARMX - Saumil Shah.mp4

117.5 MB

HITBCyberWeek Event Highlights - Day 1.mp4

2.3 MB

How To Defeat EDRs In Usermode - Alessandro Magnosi & Jean Francois Maes.eng.srt

107.0 KB

How To Defeat EDRs In Usermode - Alessandro Magnosi & Jean Francois Maes.mp4

94.2 MB

Hunting For Malicious Infrastructure Using Big Data by Freek Bax And Shadi Alhakimi.mp4

56.7 MB

Join Aviation Cybersecurity Researcher, Hugo Teso at #HITBCyberWeek.eng.srt

1.2 KB

Join Aviation Cybersecurity Researcher, Hugo Teso at #HITBCyberWeek.mp4

1.3 MB

Join Chema Alonso, one of the world’s leading hacking and cybersecurity experts, at #HITBCyberWeek.eng.srt

1.0 KB

Join Chema Alonso, one of the world’s leading hacking and cybersecurity experts, at #HITBCyberWeek.mp4

1.5 MB

Join Cybersecurity researcher Ben Nassi at #HITBCyberWeek.eng.srt

0.9 KB

Join Cybersecurity researcher Ben Nassi at #HITBCyberWeek.mp4

544.7 KB

KEYNOTE 1 Alt-Payments And Crypto The Future Is Now - Matt Johnson.eng.srt

79.6 KB

KEYNOTE 1 Alt-Payments And Crypto The Future Is Now - Matt Johnson.mp4

59.4 MB

Knockin' On MediaTek ADSP’s Door - Slava Makkaveev.eng.srt

57.7 KB

Knockin' On MediaTek ADSP’s Door - Slava Makkaveev.mp4

47.5 MB

Launching A New Password Hashing Competition - Sebastien Raveau.eng.srt

123.1 KB

Launching A New Password Hashing Competition - Sebastien Raveau.mp4

99.5 MB

Learn new skills @ #HITBCyberWeek.mp4

678.6 KB

Low Level BootROM Protocol Fuzzing Secure Memory Regions - Sulthan Alaudee.eng.srt

83.7 KB

Low Level BootROM Protocol Fuzzing Secure Memory Regions - Sulthan Alaudee.mp4

61.6 MB

Malicious Contracts - Kyprianos Vasilopoulos and Christian Papathansiou.eng.srt

52.2 KB

Malicious Contracts - Kyprianos Vasilopoulos and Christian Papathansiou.mp4

37.7 MB

Military Bioweapons Dev. & Information Warfare - William Hagestad II.eng.srt

79.9 KB

Military Bioweapons Dev. & Information Warfare - William Hagestad II.mp4

49.1 MB

MIPS-X The Next IoT Frontier - Patrick Ross & Zoltan Balazs.eng.srt

61.0 KB

MIPS-X The Next IoT Frontier - Patrick Ross & Zoltan Balazs.mp4

71.2 MB

Modern Post Exploitation The Ghost In The Cloud - Gal Diskin.eng.srt

105.2 KB

Modern Post Exploitation The Ghost In The Cloud - Gal Diskin.mp4

87.4 MB

Opening Keynote by H.E. Dr. Mohamed Al-Kuwaiti.eng.srt

17.7 KB

Opening Keynote by H.E. Dr. Mohamed Al-Kuwaiti.mp4

17.2 MB

Panel 38°C Healthcare At A Fever Pitch - Biohacking Village.eng.srt

120.8 KB

Panel 38°C Healthcare At A Fever Pitch - Biohacking Village.mp4

69.3 MB

Payment Village @ #HITBCyberWeek.mp4

529.1 KB

Rage Against The Machine Clear - Enrico Barberis & Hany Ragab.eng.srt

78.1 KB

Rage Against The Machine Clear - Enrico Barberis & Hany Ragab.mp4

61.1 MB

Response Smuggling Pwning HTTP 1.1 Connections - Martin Doyhenard.eng.srt

97.7 KB

Response Smuggling Pwning HTTP 1.1 Connections - Martin Doyhenard.mp4

79.5 MB

Reversing GO Binaries With Ghidra - Albert Zsigovits and Dorka Palotay.eng.srt

66.4 KB

Reversing GO Binaries With Ghidra - Albert Zsigovits and Dorka Palotay.mp4

53.5 MB

Security Framework Challenges & Solutions - G. Singh, M. Baddeley & A. Pandey.eng.srt

95.3 KB

Security Framework Challenges & Solutions - G. Singh, M. Baddeley & A. Pandey.mp4

74.2 MB

Software Security Analysis Present And Future Research Initiatives - Sanjay Rawat.eng.srt

92.5 KB

Software Security Analysis Present And Future Research Initiatives - Sanjay Rawat.mp4

77.1 MB

Thank you for being a part of #HITBCyberWeek 2021.mp4

588.4 KB

TRAINING - A Practical Approach to Malware Analysis and Memory Forensics.eng.srt

3.0 KB

TRAINING - A Practical Approach to Malware Analysis and Memory Forensics.mp4

2.4 MB

TRAINING - Abusing Active Directory.eng.srt

0.6 KB

TRAINING - Abusing Active Directory.mp4

2.7 MB

TRAINING - IC Reverse Engineering & Code Extraction.mp4

1.9 MB

TRAINING - In & Out - Attack, Detection & Hunting with PurpleLabs Windows and Linux.eng.srt

3.9 KB

TRAINING - In & Out - Attack, Detection & Hunting with PurpleLabs Windows and Linux.mp4

4.3 MB

TRAINING - Linux Heap Exploitation.eng.srt

6.7 KB

TRAINING - Linux Heap Exploitation.mp4

5.4 MB

TRAINING - Rust Security Audit and Fuzzing.eng.srt

2.9 KB

TRAINING - Rust Security Audit and Fuzzing.mp4

3.5 MB

TRAINING - Software Deobfuscation Techniques.mp4

997.7 KB

TRAINING - TEEPwn Breaking TEEs by Experience.eng.srt

8.1 KB

TRAINING - TEEPwn Breaking TEEs by Experience.mp4

2.9 MB

TRAINING - x86-64 All You Can Learn Buffet.eng.srt

5.7 KB

TRAINING - x86-64 All You Can Learn Buffet.mp4

4.8 MB

What’s happening in the world of cryptocurrency Join Matt Johnson, at #HITBCyberWeek.eng.srt

1.5 KB

What’s happening in the world of cryptocurrency Join Matt Johnson, at #HITBCyberWeek.mp4

1.6 MB

When Fuzzing Meets SAP Network Services - Yvan Genuer.eng.srt

71.6 KB

When Fuzzing Meets SAP Network Services - Yvan Genuer.mp4

76.2 MB

Who Littered The Sandbox Scooping Up New Malware Behavior - Olaf Hartong.eng.srt

92.1 KB

Who Littered The Sandbox Scooping Up New Malware Behavior - Olaf Hartong.mp4

75.6 MB

WIFI Security From 0 To 1 - Sili Luo.eng.srt

79.3 KB

WIFI Security From 0 To 1 - Sili Luo.mp4

43.6 MB

/HITB 2021 - Singapore/

A Fuzzy Kind of HITB Armory with Matteo Beccaro and Rocco Calvi.eng.srt

52.4 KB

A Fuzzy Kind of HITB Armory with Matteo Beccaro and Rocco Calvi.mp4

36.9 MB

Catch Up With Aloysius Cheang.eng.srt

55.3 KB

Catch Up With Aloysius Cheang.mp4

41.7 MB

Catch Up With Emmanuel Gadaix.eng.srt

62.8 KB

Catch Up With Emmanuel Gadaix.mp4

45.5 MB

Catch Up With Fatih Ozavci.eng.srt

55.0 KB

Catch Up With Fatih Ozavci.mp4

39.2 MB

Catch up with Sensepost.eng.srt

54.0 KB

Catch up with Sensepost.mp4

35.4 MB

Catch Up With The Grugq.eng.srt

62.4 KB

Catch Up With The Grugq.mp4

47.5 MB

Container Escape In 2021 - Li Qiang.eng.srt

63.8 KB

Container Escape In 2021 - Li Qiang.mp4

34.3 MB

Exploiting UAF By Ret2bpf In Android Kernel - Xingyu Jin & Richard Neal.eng.srt

76.1 KB

Exploiting UAF By Ret2bpf In Android Kernel - Xingyu Jin & Richard Neal.mp4

42.9 MB

Framework to Examine Mobile App Privacy - Zhang Qing, Zeyu Wang & Guangdong Bai.eng.srt

64.9 KB

Framework to Examine Mobile App Privacy - Zhang Qing, Zeyu Wang & Guangdong Bai.mp4

42.9 MB

Fuzzing RDP Client And Server - Shaked Reiner & Or Ben-Porath.eng.srt

80.8 KB

Fuzzing RDP Client And Server - Shaked Reiner & Or Ben-Porath.mp4

32.2 MB

Going Deeper Into Schneider Modicon PAC Security - Gao Jian.eng.srt

64.5 KB

Going Deeper Into Schneider Modicon PAC Security - Gao Jian.mp4

53.1 MB

IDA2Obj Static Binary Instrumentation On Steroids - Mickey Jin.eng.srt

48.5 KB

IDA2Obj Static Binary Instrumentation On Steroids - Mickey Jin.mp4

42.0 MB

Is Attestation All We Need Fooling Apple’s AppAttest API - Igor Lyrchikov.eng.srt

72.4 KB

Is Attestation All We Need Fooling Apple’s AppAttest API - Igor Lyrchikov.mp4

29.8 MB

Make JDBC Attacks Brilliant Again - Xu Yuanzhen & Chen Hongkun.eng.srt

54.3 KB

Make JDBC Attacks Brilliant Again - Xu Yuanzhen & Chen Hongkun.mp4

40.7 MB

Malware Protocol Simulations In Distributed Networks - Fatih Ozavci.eng.srt

114.6 KB

Malware Protocol Simulations In Distributed Networks - Fatih Ozavci.mp4

70.9 MB

Post Talk Q&A With Alex Polyakov.eng.srt

39.9 KB

Post Talk Q&A With Alex Polyakov.mp4

33.0 MB

Post Talk Q&A with Harshit Agrawal.mp4

21.3 MB

Post Talk Q&A With Jeremy Brown.eng.srt

21.4 KB

Post Talk Q&A With Jeremy Brown.mp4

15.3 MB

Post Talk Q&A with Mark Dowd.eng.srt

46.0 KB

Post Talk Q&A with Mark Dowd.mp4

33.6 MB

Post Talk Q&A With Paul Vixie.eng.srt

45.4 KB

Post Talk Q&A With Paul Vixie.mp4

38.0 MB

Post Talk Q&A With Xingyu Jin & Richard Neal.eng.srt

25.4 KB

Post Talk Q&A With Xingyu Jin & Richard Neal.mp4

19.5 MB

Post-Talk Q&A with Imdadullah Mohammed & Shiv Sahni.eng.srt

30.5 KB

Post-Talk Q&A with Imdadullah Mohammed & Shiv Sahni.mp4

24.6 MB

Practical AI Red Teaming A Facial Recognition Case Study - Alex Polyakov.eng.srt

76.8 KB

Practical AI Red Teaming A Facial Recognition Case Study - Alex Polyakov.mp4

39.4 MB

Pre-CTF Training Session - Day 1.eng.srt

283.8 KB

Pre-CTF Training Session - Day 1.mp4

191.3 MB

Pre-CTF Training Session - Day 2.eng.srt

245.0 KB

Pre-CTF Training Session - Day 2.mp4

205.4 MB

Protective DNS Why It Matters And Deploying It With No Cloud - Paul Vixie.eng.srt

96.6 KB

Protective DNS Why It Matters And Deploying It With No Cloud - Paul Vixie.mp4

41.1 MB

Scaling Up Offensive Pipelines - Gil Biton.eng.srt

89.6 KB

Scaling Up Offensive Pipelines - Gil Biton.mp4

72.7 MB

Securing Webviews and The Story Behind CVE-2021-21136 - Imdadullah M. - & Shiv S..eng.srt

89.4 KB

Securing Webviews and The Story Behind CVE-2021-21136 - Imdadullah M. - & Shiv S.mp4

46.5 MB

Security Technology Arms Race 2021 - Medal Event - Mark Dowd.eng.srt

119.9 KB

Security Technology Arms Race 2021 - Medal Event - Mark Dowd.mp4

52.0 MB

SHADOWPAD Chinese Espionage Malware-as-a-Service - Yi-Jhen Hsieh & Joey Chen.eng.srt

66.4 KB

SHADOWPAD Chinese Espionage Malware-as-a-Service - Yi-Jhen Hsieh & Joey Chen.mp4

25.9 MB

Squashing Low-hanging Fruit In Embedded Software - D. Dos Santos & S. Menashe.eng.srt

118.4 KB

Squashing Low-hanging Fruit In Embedded Software - D. Dos Santos & S. Menashe.mp4

63.7 MB

Summer Of Fuzz MacOS - Jeremy Brown.eng.srt

72.8 KB

Summer Of Fuzz MacOS - Jeremy Brown.mp4

27.3 MB

Taking Ghidra To The Next Level - Zhanzhao Ding.eng.srt

86.1 KB

Taking Ghidra To The Next Level - Zhanzhao Ding.mp4

27.8 MB

The Road to PRO CTF Finals Starts Now with Y Awad, A Attalla and K Plotnikov.eng.srt

26.2 KB

The Road to PRO CTF Finals Starts Now with Y Awad, A Attalla and K Plotnikov.mp4

20.2 MB

trapfuzzer Coverage-guided Binary Fuzzing with Breakpoints - Sili Luo.eng.srt

74.3 KB

trapfuzzer Coverage-guided Binary Fuzzing with Breakpoints - Sili Luo.mp4

38.4 MB

Welcome to Day 1.eng.srt

10.9 KB

Welcome to Day 1.mp4

8.5 MB

Welcome To Day 2.eng.srt

10.7 KB

Welcome To Day 2.mp4

8.0 MB

What Modern RF Combat Looks Like In The Next Decade - Harshit Agrawal.eng.srt

122.4 KB

What Modern RF Combat Looks Like In The Next Decade - Harshit Agrawal.mp4

66.0 MB

/HITB 2022 - Singapore/

API Security Through External Attack Surface Management - Phillip Wylie.eng.srt

59.7 KB

API Security Through External Attack Surface Management - Phillip Wylie.mp4

35.8 MB

Attacking WPA3 New Vulnerabilities And Exploit Framework - Mathy Vanhoef.eng.srt

107.9 KB

Attacking WPA3 New Vulnerabilities And Exploit Framework - Mathy Vanhoef.mp4

74.5 MB

Biometrics System Hacking In The Age Of The Smart Vehicle - K. Chen & L. Siwei.eng.srt

44.7 KB

Biometrics System Hacking In The Age Of The Smart Vehicle - K. Chen & L. Siwei.mp4

33.9 MB

Breaking Web3 Exploitation Techniques For Cryptocurrency Hacking - David Pethes.eng.srt

86.9 KB

Breaking Web3 Exploitation Techniques For Cryptocurrency Hacking - David Pethes.mp4

85.2 MB

Browser Hacking With ANGLE - Jeonghoon Shin.eng.srt

60.8 KB

Browser Hacking With ANGLE - Jeonghoon Shin.mp4

58.4 MB

Building An Army Of Bots By Hijacking a Twitter Handle - R. Sasi & V. Singh.eng.srt

61.7 KB

Building An Army Of Bots By Hijacking a Twitter Handle - R. Sasi & V. Singh.mp4

51.7 MB

Can A Fuzzer Match A Human - Bhargava Shastry.eng.srt

51.8 KB

Can A Fuzzer Match A Human - Bhargava Shastry.mp4

35.2 MB

Cracking Kyocera Printers - Yue Liu and Juyang Gao & Minghang Shen.mp4

25.7 MB

E'rybody Gettin' TIPC Demystifying Remote Linux Kernel Exploitation - Sam Page.eng.srt

118.1 KB

E'rybody Gettin' TIPC Demystifying Remote Linux Kernel Exploitation - Sam Page.mp4

71.4 MB

EDR Evasion Primer For Red Teamers - Jorge Gimenez & Karsten Nohl.eng.srt

119.2 KB

EDR Evasion Primer For Red Teamers - Jorge Gimenez & Karsten Nohl.mp4

96.0 MB

Exploiting A Limited UAF On Ubuntu 22.04 To Achieve LPE - Aaron Adams.eng.srt

110.3 KB

Exploiting A Limited UAF On Ubuntu 22.04 To Achieve LPE - Aaron Adams.mp4

73.7 MB

Exploiting Race Condition Vulnerabilities In Web Applications - Javan Rasokat.eng.srt

48.3 KB

Exploiting Race Condition Vulnerabilities In Web Applications - Javan Rasokat.mp4

39.4 MB

Faking At Level 1 How Digital Twins Save Your PLCs - Thomas Weber.eng.srt

48.5 KB

Faking At Level 1 How Digital Twins Save Your PLCs - Thomas Weber.mp4

40.6 MB

Fuzzing The MCU Of Connected Vehicles For Security And Safety - Hao Chen.eng.srt

31.3 KB

Fuzzing The MCU Of Connected Vehicles For Security And Safety - Hao Chen.mp4

16.2 MB

Getting Clear Text Passwords From An IdP & More - Gal Diskin.eng.srt

55.6 KB

Getting Clear Text Passwords From An IdP & More - Gal Diskin.mp4

46.8 MB

ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices - Jos Wetzels.eng.srt

109.1 KB

ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices - Jos Wetzels.mp4

55.9 MB

Information Collection Of Third-party SDKs - W. Kailong W. Zeyu B. Guangdong & Z. Qing.eng.srt

59.5 KB

Information Collection Of Third-party SDKs - W. Kailong W. Zeyu B. Guangdong & Z. Qing.mp4

52.4 MB

KEYNOTE 1 - Random Walk Through A Few Million Things - Chris Rouland.eng.srt

128.0 KB

KEYNOTE 1 - Random Walk Through A Few Million Things - Chris Rouland.mp4

107.9 MB

KEYNOTE 2 Adventures In Security Research - Runa Sandvik.eng.srt

112.0 KB

KEYNOTE 2 Adventures In Security Research - Runa Sandvik.mp4

102.9 MB

LAB Advanced Code Obfuscation With MBA Expressions - Arnau Gàmez Montolio.eng.srt

215.8 KB

LAB Advanced Code Obfuscation With MBA Expressions - Arnau Gàmez Montolio.mp4

166.3 MB

LAB Template Injection On Hardened Targets - Lucas ‘BitK’ Philippe.eng.srt

117.5 KB

LAB Template Injection On Hardened Targets - Lucas ‘BitK’ Philippe.mp4

136.0 MB

MPT Pentest In Action - Jyoti Raval.eng.srt

46.1 KB

MPT Pentest In Action - Jyoti Raval.mp4

37.9 MB

One-Click To Completely Takeover A MacOS Device - Mickey Jin.eng.srt

67.5 KB

One-Click To Completely Takeover A MacOS Device - Mickey Jin.mp4

62.3 MB

Scripts-behavioral ML Classification Using Windows 10 AMSI-instrumentation - Ankit Garg.eng.srt

85.9 KB

Scripts-behavioral ML Classification Using Windows 10 AMSI-instrumentation - Ankit Garg.mp4

71.4 MB

Simulating Execution In Malicious Text Detection - S. Wang & Y Sun.mp4

18.6 MB

Suborner Windows Bribery For Invisible Persistence - Sebastian Castro.eng.srt

105.7 KB

Suborner Windows Bribery For Invisible Persistence - Sebastian Castro.mp4

93.6 MB

The Ransomware Protection Full Of Holes - Soya Aoyama.eng.srt

32.5 KB

The Ransomware Protection Full Of Holes - Soya Aoyama.mp4

58.8 MB

Unlocking KeeLoq A Reverse Engineering Story - Rogan Dawes.eng.srt

94.6 KB

Unlocking KeeLoq A Reverse Engineering Story - Rogan Dawes.mp4

76.2 MB

Web3 - Scams = It’s A Match - Zoltan Balazs.eng.srt

51.3 KB

Web3 - Scams = It’s A Match - Zoltan Balazs.mp4

53.4 MB

/HITB 2023 - Amsterdam/

A Deep Dive Into GarminOS And Its MonkeyC Virtual Machine - Tao Sauvage.eng.srt

95.3 KB

A Deep Dive Into GarminOS And Its MonkeyC Virtual Machine - Tao Sauvage.mp4

71.0 MB

A Tale Of Building A REAL Full Speed Anti-Censorship Router - KaiJern Lau.eng.srt

83.0 KB

A Tale Of Building A REAL Full Speed Anti-Censorship Router - KaiJern Lau.mp4

79.6 MB

Active Directory Abuse Primitives And Operation Security - M. Cheng & D. Chen.eng.srt

98.4 KB

Active Directory Abuse Primitives And Operation Security - M. Cheng & D. Chen.mp4

88.2 MB

Advanced DMA Reentrancy Techniques To Escape QEMU - A. Wang & Q. Jin.mp4

41.1 MB

An Analysis Of Computer Numerical Control Machines In Industry 4.0 - M. Balduzzi.eng.srt

83.6 KB

An Analysis Of Computer Numerical Control Machines In Industry 4.0 - M. Balduzzi.mp4

68.0 MB

Automated Black-box Security Testing Of Smart Embedded Devices - A. Continella.eng.srt

89.7 KB

Automated Black-box Security Testing Of Smart Embedded Devices - A. Continella.mp4

61.8 MB

Bypassing Anti-Cheats And Hacking Competitive Games - Rohan Aggarwal.eng.srt

78.5 KB

Bypassing Anti-Cheats And Hacking Competitive Games - Rohan Aggarwal.mp4

81.5 MB

ChatGPT Please Write Me A Piece Of Polymorphic Malware - E Shimony & O. Tsarfati.eng.srt

74.8 KB

ChatGPT Please Write Me A Piece Of Polymorphic Malware - E Shimony & O. Tsarfati.mp4

55.1 MB

CLOSING KEYNOTE - The Hand That Strikes, Also Blocks - Saumil Shah.eng.srt

63.3 KB

CLOSING KEYNOTE - The Hand That Strikes, Also Blocks - Saumil Shah.mp4

51.3 MB

CommSec - All You Always Wanted To Know About AntiViruses - Marcus Botacin.eng.srt

77.8 KB

CommSec - All You Always Wanted To Know About AntiViruses - Marcus Botacin.mp4

58.1 MB

CommSec - API Security In The Age Of Microservices - Ali Abdollahi.eng.srt

46.7 KB

CommSec - API Security In The Age Of Microservices - Ali Abdollahi.mp4

47.5 MB

CommSec - Exploring JARM - An Active TLS Fingerprinting Algorithm - Mohamad Mokbel.eng.srt

99.4 KB

CommSec - Exploring JARM - An Active TLS Fingerprinting Algorithm - Mohamad Mokbel.mp4

94.0 MB

CommSec - Feeding Gophers To Ghidra - Max Kersten.eng.srt

110.4 KB

CommSec - Feeding Gophers To Ghidra - Max Kersten.mp4

81.8 MB

CommSec - Kubernetes Security Detection Engineering - Madhu Akula.eng.srt

72.3 KB

CommSec - Kubernetes Security Detection Engineering - Madhu Akula.mp4

50.6 MB

CommSec - Nomadic Honeypots How To Create Actionable CTI - Laurent Oudot.eng.srt

108.9 KB

CommSec - Nomadic Honeypots How To Create Actionable CTI - Laurent Oudot.mp4

100.3 MB

CommSec - PANEL Evolution Of Learning What Cyber Security Training Looks Like In 2023.eng.srt

121.9 KB

CommSec - PANEL Evolution Of Learning What Cyber Security Training Looks Like In 2023.mp4

124.4 MB

CommSec - Red Wizard - A User-friendly Infrastructure For Red Teams - Ben Brucker.eng.srt

100.6 KB

CommSec - Red Wizard - A User-friendly Infrastructure For Red Teams - Ben Brucker.mp4

89.3 MB

CommSec - The Return Of Stack Overflows In The Linux Kernel - Davide Ornaghi.eng.srt

41.0 KB

CommSec - The Return Of Stack Overflows In The Linux Kernel - Davide Ornaghi.mp4

34.1 MB

CommSec - Upgrading Rollback Agnostic Replay Attacks - Carlos Gomez.eng.srt

48.8 KB

CommSec - Upgrading Rollback Agnostic Replay Attacks - Carlos Gomez.mp4

58.4 MB

CommSec - Welcome Note - Matteo Beccaro.eng.srt

5.6 KB

CommSec - Welcome Note - Matteo Beccaro.mp4

4.7 MB

Current State Of IOS Malware Detection - Matthias Frielingsdorf.eng.srt

113.6 KB

Current State Of IOS Malware Detection - Matthias Frielingsdorf.mp4

75.0 MB

Exploiting IPC With New Desynchronization Primitives - Martin Doyhenard.eng.srt

88.6 KB

Exploiting IPC With New Desynchronization Primitives - Martin Doyhenard.mp4

57.9 MB

How MySQL Servers Can Attack YOU - Alexander Rubin & Martin Rakhmanov.eng.srt

65.8 KB

How MySQL Servers Can Attack YOU - Alexander Rubin & Martin Rakhmanov.mp4

74.2 MB

Hunting Windows Desktop Window Manager Bugs - Z. WangJunjie, Y. He & W. Li.eng.srt

69.8 KB

Hunting Windows Desktop Window Manager Bugs - Z. WangJunjie, Y. He & W. Li.mp4

57.0 MB

Investigating Web3 With OSINT - Dhia Mahjoub.eng.srt

85.1 KB

Investigating Web3 With OSINT - Dhia Mahjoub.mp4

35.1 MB

KEYNOTE The Myths Of Software Security - Mark Curphey.eng.srt

86.0 KB

KEYNOTE The Myths Of Software Security - Mark Curphey.mp4

70.9 MB

Nakatomi Space Lateral Movement As L1 Post-Exploitation In OT - Jos Wetzels.eng.srt

113.8 KB

Nakatomi Space Lateral Movement As L1 Post-Exploitation In OT - Jos Wetzels.mp4

82.7 MB

Next Generation Virtualization-Based Obfuscators - T. Blazytko & M. Schloegel.eng.srt

95.3 KB

Next Generation Virtualization-Based Obfuscators - T. Blazytko & M. Schloegel.mp4

89.8 MB

PANEL DISCUSSION iOS OS X Security (moderated by Dhillon 'L33tdawg' Kannabhiran).eng.srt

78.8 KB

PANEL DISCUSSION iOS OS X Security (moderated by Dhillon 'L33tdawg' Kannabhiran).mp4

75.7 MB

Privilege Escalation Using DOP In MacOS - Y. Lee, J. Choi, J. Lee & S. Song.eng.srt

36.8 KB

Privilege Escalation Using DOP In MacOS - Y. Lee, J. Choi, J. Lee & S. Song.mp4

36.5 MB

Prize Giving & Closing Note by Dhillon 'L33tdawg' Kannabhiran.eng.srt

35.7 KB

Prize Giving & Closing Note by Dhillon 'L33tdawg' Kannabhiran.mp4

31.0 MB

Smart Speaker Shenanigans Making The SONOS One Sing - Peter Geissler.eng.srt

89.8 KB

Smart Speaker Shenanigans Making The SONOS One Sing - Peter Geissler.mp4

74.9 MB

SOHO Hacking At Pwn2Own - Alex Plaskett & McCaulay Hudson.eng.srt

102.1 KB

SOHO Hacking At Pwn2Own - Alex Plaskett & McCaulay Hudson.mp4

83.8 MB

Syscalls In Shellcode Techniques For Malicious Functionality - B. Brizendine.eng.srt

119.4 KB

Syscalls In Shellcode Techniques For Malicious Functionality - B. Brizendine.mp4

94.7 MB

XRP Raid Protector Killing A Critical Bug Worth 40 Billion Dollars - Haoyu Yang.eng.srt

38.2 KB

XRP Raid Protector Killing A Critical Bug Worth 40 Billion Dollars - Haoyu Yang.mp4

40.7 MB

 

Total files 1660


Copyright © 2024 FileMood.com