![[ ]](http://conference.hitb.org/icons/layout.gif) | CLOSING KEYNOTE - Ms Jaya Baloo - Identity Privacy and Security.pdf | 25-May-2012 19:37 | 1.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1 SIGINT - Marinus Kuivenhoven - Hack to the Future.pdf | 24-May-2012 16:44 | 1.2M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1 SIGINT - Ralf- Philip Weinmann - NO SLIDES.pdf | 24-May-2012 13:34 | 0 | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1 SIGINT - Xavier Mertens - Pastebinmon and Leakedin.pdf | 24-May-2012 13:30 | 308K | |
![[ ]](http://conference.hitb.org/icons/compressed.gif) | D1T1 - Arnauld Mascret - Whistling Over The Wire.zip | 24-May-2012 14:54 | 41M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Claudio Guarnieri - One Flew Over the Cuckoos Nest.pdf | 24-May-2012 12:27 | 4.5M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Ivo Pooters - Turning Android Inside Out.pdf | 24-May-2012 11:35 | 6.4M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Juan-Pablo Echtegoyen - Attacking the SAP Solution Manager.pdf | 24-May-2012 15:42 | 2.5M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T1 - Roberto Suggi and Scott Bell - Browser Bug Hunting in 2012.pdf | 24-May-2012 17:46 | 3.3M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Adam Gowdiak - Security Threats in Digital Sat Televisions.pdf | 24-May-2012 15:42 | 1.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Adam Gowdiak - Security Vulnerabilities of DVB Chipsets.pdf | 24-May-2012 17:43 | 2.4M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Itzhak Zuk Avraham and Nir Goldshlager - Killing a Bug Bounty Program - Twice.pdf | 24-May-2012 12:31 | 5.5M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks.pdf | 24-May-2012 14:40 | 229K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT.pdf | 24-May-2012 11:23 | 1.4M | |
![[ ]](http://conference.hitb.org/icons/compressed.gif) | D1T3 - Didier Stevens - Whitehat Shellcode.zip | 24-May-2012 13:29 | 100M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T3 - Gal Diskin - Hacking Using Dynamic Binary Instrumentation.pdf | 24-May-2012 15:43 | 2.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1T3 - Jurriaan Bremer - Binary Obfuscation the SSE Way.pdf | 24-May-2012 16:44 | 1.5M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2 SIGINT - Elger Jonker - Close-Up of Three Technical Hackerspace Projects.pdf | 25-May-2012 15:29 | 10M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2 SIGINT - Rory Breuk and Albert Spruyt - Integrating DMA Attacks in Metasploit.pdf | 25-May-2012 15:28 | 2.8M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Alex Bazhanyuk and Nikita Tarakanov - Automatically Searching for Vulnerabilities.pdf | 25-May-2012 12:32 | 1.1M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Andrei Costin - Postscript Dangers Ahead - Hacking MFPCs.pdf | 25-May-2012 11:41 | 1.5M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Georgia Weidman - Bypassing the Android Permission Model.pdf | 25-May-2012 15:23 | 1.4M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services.pdf | 25-May-2012 15:59 | 3.7M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T1 - Marco Balduzzi - SatanCloud.pdf | 25-May-2012 17:06 | 1.5M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Jailbreak Dream Team - Absinthe Jailbreak for iOS 5.0.1.pdf | 25-May-2012 14:31 | 4.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Jailbreak Dream Team - Corona Jailbreak for iOS 5.0.1.pdf | 25-May-2012 12:30 | 7.8M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Nicolas Gregoire - Attacking XML Processing.pdf | 25-May-2012 16:34 | 11M | |
![[ ]](http://conference.hitb.org/icons/compressed.gif) | D2T2 - Rahul Sasi - CXML VXML Auditing for IVR Pentesters.zip | 25-May-2012 11:39 | 63M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T2 - Steven Seeley - Ghost In the Windows 7 Allocator.pdf | 25-May-2012 17:06 | 1.3M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - Chema Alonso and Manu The Sur - Power of FOCA 3.pdf | 25-May-2012 13:40 | 18M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - Enno Rey Daniel Mende Pascal Turbing Matthias Luft - Smashing VMDK Files for Fun and Profit.pdf | 25-May-2012 17:06 | 6.1M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2T3 - Mario Vuksan and Tomislav Pericin - Titan Engine 3.pdf | 25-May-2012 15:59 | 435K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | KEYNOTE 1 - Andy Ellis - Staying Ahead of the Security Poverty Line.pdf | 24-May-2012 10:00 | 5.9M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | KEYNOTE 2 - Bruce Schneier - Trust, Security and Society - NO SLIDES.pdf | 25-May-2012 10:34 | 0 |
|
0 comentários:
Postar um comentário