Index of /materials/sg2017
Name
Last modified
Size
Description
Parent Directory
-
WHITEPAPER - Matt Knight and Marc Newlin - Radio Exploitation 101 - Characterizing, Contextualizing, and Applying Wireless Attack Methods.pdf
2016-03-06 04:22
100K
WHITEPAPER - Dmitry Chastuhin and Vladimir Egorov - Get to the Money - Hacking POS and POP Systems.pdf
2016-03-06 04:22
519K
WHITEPAPER - Balazs Bucsay - XFLTReaT - A New Dimension in Tunnelling.pdf
2016-03-06 04:22
814K
COMMSEC D2 - Joseph Hesse and Kamal Ranjan - Applying Intelligence and Counterintelligence Technique to CNO.pdf
2016-03-06 04:22
1.0M
COMMSEC D1 - Florian Lukavsky and Wolfgang Ettlinger - Pwnrensics - How to Execute Code on a Forensic Workstation.pdf
2016-03-06 04:22
1.1M
D2 - Ivan Novikov - NeuralFuzz - Neural Networks for Fuzzing Web Apps.pdf
2016-03-06 04:22
1.2M
WHITEPAPER - Adam Donenfeld - Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.pdf
2016-03-06 04:22
1.3M
COMMSEC D2 - Matteo Beccaro - Stealing PLC Intellectual Property - A Red Teaming Story.pdf
2016-03-06 04:22
1.5M
COMMSEC D2 - Vitaly Kamluk and Wayne Lee - Searching for a Needle in a Remote Haystack.pdf
2016-03-06 04:22
1.6M
COMMSEC D1 - Stefan Esser - The Original Elevat0r.pdf
2016-03-06 04:22
1.9M
WHITEPAPER - A. Ermolov, D. Evdomikov and M. Malyutin - CVE-2017-5689 – How We Broke Intel AMT.pdf
2016-03-06 04:22
2.3M
D1 - A. Ermolov, D. Evdomikov and M. Malyutin - CVE-2017-5689 – How We Broke Intel AMT.pdf
2016-03-06 04:22
2.4M
COMMSEC D1 - Keisuke Hirata - AutoSec - Automotive Security Assessment Techniques and Tools from a Pentesters Perspective.pdf
2016-03-06 04:22
2.4M
COMMSEC D1 - Thomas Debize and Mahdi Braik - Hadoop Safari - Hunting for Vulnerabilities.pdf
2016-03-06 04:22
2.4M
D2 - Qiang Li and ZhiBin Hu - QEMU Attack Surface and Security Internals.pdf
2016-03-06 04:22
2.5M
D2 - Adam Donenfeld - Ro(o)tten Apples - Vulnerability Heaven in the iOS Sandbox.pdf
2016-03-06 04:22
3.4M
COMMSEC D2 - Maxwell Koh - 2FAssassin - Bypass 2FA, Stealing Private Keys, and More.pdf
2016-03-06 04:22
4.0M
COMMSEC D2 - Bai Guangdong and Zhang Qing - The Nightmare of Fragmentation - A Case Study of 200+ Vulnerabilities in Android Phones.pdf
2016-03-06 04:22
4.7M
D1 - Orange Tsai - A New Era of SSRF – Exploiting URL Parsers in Trending Programming Languages.pdf
2016-03-06 04:22
5.2M
KEYNOTE 1 - Mark Curphey - Finding Vulnerabilities and Malware in Open-Source Code at Scale.pdf
2016-03-06 04:22
5.3M
WHITEPAPER - Veronica Valeros and Sebastian Garcia - A Modern Study of Microphone Bugs.pdf
2016-03-06 04:22
7.6M
COMMSEC D1 - Hamza Beghal - Threat Hunting 101 - Become the Hunter.pdf
2016-03-06 04:22
8.2M
D1 - Veronica Valeros and Sebastian Garcia - A Modern Study of Microphone Bugs.pdf
2016-03-06 04:22
9.2M
COMMSEC D2 - Nicolas Collery - It's Friday Evening Professor Moriarty.pdf
2016-03-06 04:22
10M
WELCOME ADDRESS - Earl Carter - IoT - A Security Hole Without a Patch.pdf
2016-03-06 04:22
10M
COMMSEC D2 - Xinhua Cai - Security Crowdsourcing - Growing Network Security Specialists for the Enterprise.pdf
2016-03-06 04:22
10M
D1 - Dmitry Chastuhin and Vladimir Egorov - Get to the Money - Hacking POS and POP Systems.pdf
2016-03-06 04:22
11M
COMMSEC D1 - Nick Biasini - Insecurity in 2017- 0-days Are The Least of Our Problems.pdf
2016-03-06 04:22
11M
COMMSEC D2 - Fadli B. Sidek - Facebook - The Deep & Dark Web for Threat Actors in Asia.pdf
2016-03-06 04:22
13M
D1 - Ashley Shen and Moonbeom Park - A Deep Dive into the Digital Weapons of the North Korean Cyber Army.pdf
2016-03-06 04:22
24M
COMMSEC D2 - Jim Geovedi - Unstructured Data is the New Gold - ML + NLP is the New Shiz.pdf
2016-03-06 04:22
25M
D2 - Matt Knight and Marc Newlin - Radio Exploitation 101 - Characterizing, Contextualizing, and Applying Wireless Attack Methods.pdf
2016-03-06 04:22
25M
D1 - Dominic Chell and Vincent Yiu - A Year In The Red.pdf
2016-03-06 04:22
35M
D2 - Balazs Bucsay - XFLTReaT - A New Dimension in Tunnelling.pdf
2016-03-06 04:22
45M
COMMSEC D1 - Cesar Cerrudo and Lucas Apa - Hacking Robots Before Skynet.pdf
2016-03-06 04:22
49M