HitbSecConf 2012


[   ]CLOSING KEYNOTE - Ms Jaya Baloo - Identity Privacy and Security.pdf25-May-2012 19:371.9M 
[   ]D1 SIGINT - Marinus Kuivenhoven - Hack to the Future.pdf24-May-2012 16:441.2M 
[   ]D1 SIGINT - Ralf- Philip Weinmann - NO SLIDES.pdf24-May-2012 13:340 
[   ]D1 SIGINT - Xavier Mertens - Pastebinmon and Leakedin.pdf24-May-2012 13:30308K 
[   ]D1T1 - Arnauld Mascret - Whistling Over The Wire.zip24-May-2012 14:5441M 
[   ]D1T1 - Claudio Guarnieri - One Flew Over the Cuckoos Nest.pdf24-May-2012 12:274.5M 
[   ]D1T1 - Ivo Pooters - Turning Android Inside Out.pdf24-May-2012 11:356.4M 
[   ]D1T1 - Juan-Pablo Echtegoyen - Attacking the SAP Solution Manager.pdf24-May-2012 15:422.5M 
[   ]D1T1 - Roberto Suggi and Scott Bell - Browser Bug Hunting in 2012.pdf24-May-2012 17:463.3M 
[   ]D1T2 - Adam Gowdiak - Security Threats in Digital Sat Televisions.pdf24-May-2012 15:421.9M 
[   ]D1T2 - Adam Gowdiak - Security Vulnerabilities of DVB Chipsets.pdf24-May-2012 17:432.4M 
[   ]D1T2 - Itzhak Zuk Avraham and Nir Goldshlager - Killing a Bug Bounty Program - Twice.pdf24-May-2012 12:315.5M 
[   ]D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks.pdf24-May-2012 14:40229K 
[   ]D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT.pdf24-May-2012 11:231.4M 
[   ]D1T3 - Didier Stevens - Whitehat Shellcode.zip24-May-2012 13:29100M 
[   ]D1T3 - Gal Diskin - Hacking Using Dynamic Binary Instrumentation.pdf24-May-2012 15:432.9M 
[   ]D1T3 - Jurriaan Bremer - Binary Obfuscation the SSE Way.pdf24-May-2012 16:441.5M 
[   ]D2 SIGINT - Elger Jonker - Close-Up of Three Technical Hackerspace Projects.pdf25-May-2012 15:2910M 
[   ]D2 SIGINT - Rory Breuk and Albert Spruyt - Integrating DMA Attacks in Metasploit.pdf25-May-2012 15:282.8M 
[   ]D2T1 - Alex Bazhanyuk and Nikita Tarakanov - Automatically Searching for Vulnerabilities.pdf25-May-2012 12:321.1M 
[   ]D2T1 - Andrei Costin - Postscript Dangers Ahead - Hacking MFPCs.pdf25-May-2012 11:411.5M 
[   ]D2T1 - Georgia Weidman - Bypassing the Android Permission Model.pdf25-May-2012 15:231.4M 
[   ]D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services.pdf25-May-2012 15:593.7M 
[   ]D2T1 - Marco Balduzzi - SatanCloud.pdf25-May-2012 17:061.5M 
[   ]D2T2 - Jailbreak Dream Team - Absinthe Jailbreak for iOS 5.0.1.pdf25-May-2012 14:314.9M 
[   ]D2T2 - Jailbreak Dream Team - Corona Jailbreak for iOS 5.0.1.pdf25-May-2012 12:307.8M 
[   ]D2T2 - Nicolas Gregoire - Attacking XML Processing.pdf25-May-2012 16:3411M 
[   ]D2T2 - Rahul Sasi - CXML VXML Auditing for IVR Pentesters.zip25-May-2012 11:3963M 
[   ]D2T2 - Steven Seeley - Ghost In the Windows 7 Allocator.pdf25-May-2012 17:061.3M 
[   ]D2T3 - Chema Alonso and Manu The Sur - Power of FOCA 3.pdf25-May-2012 13:4018M 
[   ]D2T3 - Enno Rey Daniel Mende Pascal Turbing Matthias Luft - Smashing VMDK Files for Fun and Profit.pdf25-May-2012 17:066.1M 
[   ]D2T3 - Mario Vuksan and Tomislav Pericin - Titan Engine 3.pdf25-May-2012 15:59435K 
[   ]KEYNOTE 1 - Andy Ellis - Staying Ahead of the Security Poverty Line.pdf24-May-2012 10:005.9M 
[   ]KEYNOTE 2 - Bruce Schneier - Trust, Security and Society - NO SLIDES.pdf25-May-2012 10:340

Fonte: brasil-underground@googlegroups.com // Fabiano Matias.
wget -Fr http://1xpixel.com.ar/666/ 
HitbSecConf 2012 HitbSecConf 2012 Reviewed by Kembolle Amilkar on domingo, setembro 09, 2012 Rating: 5

Nenhum comentário