Index of /materials/sg2017

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]COMMSEC D1 - Cesar Cerrudo and Lucas Apa - Hacking Robots Before Skynet.pdf2017-08-24 11:24 49M 
[   ]COMMSEC D1 - Florian Lukavsky and Wolfgang Ettlinger - Pwnrensics - How to Execute Code on a Forensic Workstation.pdf2017-08-24 09:02 1.1M 
[   ]COMMSEC D1 - Hamza Beghal - Threat Hunting 101 - Become the Hunter.pdf2017-08-29 13:49 8.2M 
[   ]COMMSEC D1 - Keisuke Hirata - AutoSec - Automotive Security Assessment Techniques and Tools from a Pentesters Perspective.pdf2017-08-24 07:04 2.4M 
[   ]COMMSEC D1 - Nick Biasini - Insecurity in 2017- 0-days Are The Least of Our Problems.pdf2017-08-24 06:18 11M 
[   ]COMMSEC D1 - Stefan Esser - The Original Elevat0r.pdf2017-08-24 11:54 1.9M 
[   ]COMMSEC D1 - Thomas Debize and Mahdi Braik - Hadoop Safari - Hunting for Vulnerabilities.pdf2017-08-24 05:48 2.4M 
[   ]COMMSEC D2 - Bai Guangdong and Zhang Qing - The Nightmare of Fragmentation - A Case Study of 200+ Vulnerabilities in Android Phones.pdf2017-08-26 11:08 4.7M 
[   ]COMMSEC D2 - Fadli B. Sidek - Facebook - The Deep & Dark Web for Threat Actors in Asia.pdf2017-08-25 09:16 13M 
[   ]COMMSEC D2 - Jim Geovedi - Unstructured Data is the New Gold - ML + NLP is the New Shiz.pdf2017-08-25 09:52 25M 
[   ]COMMSEC D2 - Joseph Hesse and Kamal Ranjan - Applying Intelligence and Counterintelligence Technique to CNO.pdf2017-08-25 07:00 1.0M 
[   ]COMMSEC D2 - Matteo Beccaro - Stealing PLC Intellectual Property - A Red Teaming Story.pdf2017-08-25 09:49 1.5M 
[   ]COMMSEC D2 - Maxwell Koh - 2FAssassin - Bypass 2FA, Stealing Private Keys, and More.pdf2017-08-25 09:15 4.0M 
[   ]COMMSEC D2 - Nicolas Collery - It's Friday Evening Professor Moriarty.pdf2017-09-08 08:00 10M 
[   ]COMMSEC D2 - Vitaly Kamluk and Wayne Lee - Searching for a Needle in a Remote Haystack.pdf2017-08-25 05:10 1.6M 
[   ]COMMSEC D2 - Xinhua Cai - Security Crowdsourcing - Growing Network Security Specialists for the Enterprise.pdf2017-08-25 10:58 10M 
[   ]D1 - A. Ermolov, D. Evdomikov and M. Malyutin - CVE-2017-5689 – How We Broke Intel AMT.pdf2017-08-24 09:50 2.4M 
[   ]D1 - Ashley Shen and Moonbeom Park - A Deep Dive into the Digital Weapons of the North Korean Cyber Army.pdf2017-08-25 09:21 24M 
[   ]D1 - Dmitry Chastuhin and Vladimir Egorov - Get to the Money - Hacking POS and POP Systems.pdf2017-08-24 09:07 11M 
[   ]D1 - Dominic Chell and Vincent Yiu - A Year In The Red.pdf2017-08-24 07:28 35M 
[   ]D1 - Orange Tsai - A New Era of SSRF – Exploiting URL Parsers in Trending Programming Languages.pdf2017-08-24 11:30 5.2M 
[   ]D1 - Veronica Valeros and Sebastian Garcia - A Modern Study of Microphone Bugs.pdf2017-08-24 06:27 9.2M 
[   ]D2 - Adam Donenfeld - Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.pdf2017-08-25 06:21 3.4M 
[   ]D2 - Balazs Bucsay - XFLTReaT - A New Dimension in Tunnelling.pdf2017-08-25 05:51 45M 
[   ]D2 - Ivan Novikov - NeuralFuzz - Neural Networks for Fuzzing Web Apps.pdf2017-08-25 09:11 1.2M 
[   ]D2 - Matt Knight and Marc Newlin - Radio Exploitation 101 - Characterizing, Contextualizing, and Applying Wireless Attack Methods.pdf2017-08-25 10:42 25M 
[   ]D2 - Qiang Li and ZhiBin Hu - QEMU Attack Surface and Security Internals.pdf2017-08-25 09:47 2.5M 
[   ]KEYNOTE 1 - Mark Curphey - Finding Vulnerabilities and Malware in Open-Source Code at Scale.pdf2017-08-24 04:17 5.3M 
[   ]WELCOME ADDRESS - Earl Carter - IoT - A Security Hole Without a Patch.pdf2017-08-24 03:15 10M 
[   ]WHITEPAPER - A. Ermolov, D. Evdomikov and M. Malyutin - CVE-2017-5689 – How We Broke Intel AMT.pdf2017-08-24 09:50 2.3M 
[   ]WHITEPAPER - Adam Donenfeld - Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.pdf2017-08-25 06:21 1.3M 
[   ]WHITEPAPER - Balazs Bucsay - XFLTReaT - A New Dimension in Tunnelling.pdf2017-08-25 05:51 814K 
[   ]WHITEPAPER - Dmitry Chastuhin and Vladimir Egorov - Get to the Money - Hacking POS and POP Systems.pdf2017-08-24 09:09 519K 
[   ]WHITEPAPER - Matt Knight and Marc Newlin - Radio Exploitation 101 - Characterizing, Contextualizing, and Applying Wireless Attack Methods.pdf2017-09-22 05:08 100K 
[   ]WHITEPAPER - Veronica Valeros and Sebastian Garcia - A Modern Study of Microphone Bugs.pdf2017-08-24 08:22 7.6M 

Apache/2.4.7 (Ubuntu) Server at gsec.hitb.org Port 443