搜索
Hack In The Box
磁力链接/BT种子名称
Hack In The Box
磁力链接/BT种子简介
种子哈希:
0862a0f78a073e94d3f2652a3c0e4ea358e040f8
文件大小:
55.05G
已经下载:
376
次
下载速度:
极快
收录时间:
2018-08-01
最近下载:
2024-11-02
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:0862A0F78A073E94D3F2652A3C0E4EA358E040F8
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
少女初夜
萝莉岛
最近搜索
挑选
+ipzz-284
rare collection
饭店搭讪
罪恶日记
漂亮孕妇 身材苗条完全素人 妊娠4个月在家不倫上司3p乱交 颜射满满一脸
maya feneo
the devil and the blacksmith 2017
下药
jdsy
new amsterdam
253239
懂小姐jk
国产剧情
maestro 2023
白领+
the monroe institute
约了一个大学生外围颜值好身材好了
脚挑
京香julia 花絮
wind breaker
幸福炮友轮流一干三,看的观众羡慕不已
语音+色
威尔史密斯焦点
lesbian jessica
大尺度拍逼
地狱里的天堂
厕下
under the dome 1080p
海角大神《乱伦骚货姐姐n次》新作->姐姐不在家+想操姐姐孕妇闺蜜结果被大肚骚孕妇给反
文件列表
HITB 2003 - Malyasia/bt1.mp4
143.2 MB
HITB 2003 - Malyasia/bt2.mp4
91.4 MB
HITB 2003 - Malyasia/bt3.mp4
73.3 MB
HITB 2003 - Malyasia/bt4.mp4
85.4 MB
HITB 2003 - Malyasia/bt5.mp4
84.5 MB
HITB 2003 - Malyasia/bt6.mp4
40.3 MB
HITB 2003 - Malyasia/panel.mp4
166.3 MB
HITB 2003 - Malyasia/tt1.mp4
144.5 MB
HITB 2003 - Malyasia/tt2.mp4
115.6 MB
HITB 2003 - Malyasia/tt3.mp4
96.2 MB
HITB 2003 - Malyasia/tt4.mp4
119.1 MB
HITB 2003 - Malyasia/tt5.mp4
128.3 MB
HITB 2003 - Malyasia/tt6.mp4
157.1 MB
HITB 2003 - Malyasia/tt7.mp4
185.6 MB
HITB 2003 - Malyasia/tt8.mp4
100.9 MB
HITB 2003 - Malyasia/tt9.mp4
164.8 MB
HITB 2004 - Malyasia/proceedings/hitb04-adam-gowdiak.pdf
56.4 MB
HITB 2004 - Malyasia/proceedings/hitb04-captain-crunch-01.pdf
41.7 kB
HITB 2004 - Malyasia/proceedings/hitb04-captain-crunch-02.pdf
38.6 kB
HITB 2004 - Malyasia/proceedings/hitb04-chew-keong-tan.pdf
9.0 MB
HITB 2004 - Malyasia/proceedings/hitb04-emmanuel-gadaix.pdf
43.8 MB
HITB 2004 - Malyasia/proceedings/hitb04-fyodor-meder.pdf
880.4 kB
HITB 2004 - Malyasia/proceedings/hitb04-gareth-davies.pdf
589.7 kB
HITB 2004 - Malyasia/proceedings/hitb04-grugq.pdf
1.1 MB
HITB 2004 - Malyasia/proceedings/hitb04-jose-nazario.pdf
458.4 kB
HITB 2004 - Malyasia/proceedings/hitb04-kamal-hilmi.tgz
657.1 kB
HITB 2004 - Malyasia/proceedings/hitb04-roberto-fabio.pdf
2.1 MB
HITB 2004 - Malyasia/proceedings/hitb04-shreeraj-shah.pdf
583.6 kB
HITB 2004 - Malyasia/proceedings/hitb04-sk-chong.pdf
988.5 kB
HITB 2004 - Malyasia/proceedings/hitb04-sukhdev-singh.pdf
13.8 MB
HITB 2004 - Malyasia/proceedings/hitb04-teo-sze-siong.zip
364.7 kB
HITB 2004 - Malyasia/proceedings/hitb04-theo-deraadt.zip
2.7 MB
HITB 2004 - Malyasia/proceedings/hitb04-toh-swee-hoe.pdf
6.7 MB
HITB 2004 - Malyasia/videos/hitb2004-adam-gowdiak.mp4
203.1 MB
HITB 2004 - Malyasia/videos/hitb2004-emmanuel-gadaix.mp4
197.0 MB
HITB 2004 - Malyasia/videos/hitb2004-fyodor-and-meder.mp4
95.4 MB
HITB 2004 - Malyasia/videos/hitb2004-gareth-davies.mp4
63.9 MB
HITB 2004 - Malyasia/videos/hitb2004-grugq.mp4
101.2 MB
HITB 2004 - Malyasia/videos/hitb2004-jorge-sebastiao.mp4
71.0 MB
HITB 2004 - Malyasia/videos/hitb2004-jose-nazario.mp4
120.3 MB
HITB 2004 - Malyasia/videos/hitb2004-keynote-1-theo-de-raadt.mp4
101.2 MB
HITB 2004 - Malyasia/videos/hitb2004-panel-discussion.mp4
111.3 MB
HITB 2004 - Malyasia/videos/hitb2004-roberto-and-fabio.mp4
145.2 MB
HITB 2004 - Malyasia/videos/hitb2004-shreeraj-shah.mp4
144.2 MB
HITB 2004 - Malyasia/videos/hitb2004-sk-chong.mp4
173.1 MB
HITB 2004 - Malyasia/videos/hitb2004-sukdev-singh.mp4
76.0 MB
HITB 2004 - Malyasia/videos/hitb2004-suresh-ramasamy.mp4
67.1 MB
HITB 2004 - Malyasia/videos/hitb2004-teo-sze-siong.mp4
74.3 MB
HITB 2004 - Malyasia/videos/hitb2004-toh-swee-hoe.mp4
127.7 MB
HITB 2005 - Malaysia/proceedings/BT-Anthony-Zboralski-Social-Engineering.pdf
1.1 MB
HITB 2005 - Malaysia/proceedings/BT-Fabrice-Marie-Hacking-Internet-Banking-Applications.pdf
1.2 MB
HITB 2005 - Malaysia/proceedings/BT-Raoul-Chiesa-X25-Security.pdf
1.1 MB
HITB 2005 - Malaysia/proceedings/BT-Roberto-Preatoni-Fabio-Ghioni-Corp-vs-Corp.ppt
7.5 MB
HITB 2005 - Malaysia/proceedings/BT-Tim-Pritlove-Blinkenlights-Arcade-Project.pdf
5.3 MB
HITB 2005 - Malaysia/proceedings/HITB.gif
14.4 kB
HITB 2005 - Malaysia/proceedings/Keynote-Mikko-Hypponen-Mobile-Malware.pdf
3.6 MB
HITB 2005 - Malaysia/proceedings/Keynote-Tony-Chor-IE-Security-Past-Present-and-Future.ppt
5.1 MB
HITB 2005 - Malaysia/proceedings/Mark Schoenefeld - Java and Secure Programming.pdf
3.7 MB
HITB 2005 - Malaysia/proceedings/TT-Dave-Aitel-Nematodes.zip
63.3 kB
HITB 2005 - Malaysia/proceedings/TT-Fyodor-Yarochkin-Meder-Kydyraliev-STIFware-Evolution.ppt
491.0 kB
HITB 2005 - Malaysia/proceedings/TT-Jim-Geovedi-Hotspot-Security.pdf
789.6 kB
HITB 2005 - Malaysia/proceedings/TT-Joanna-Rutkowska-HITB-Virginity-Verifier.ppt
540.7 kB
HITB 2005 - Malaysia/proceedings/TT-Jose-Nazario-Analyzing-all-that-data.pdf
806.3 kB
HITB 2005 - Malaysia/proceedings/TT-Nish-Bhalla-Defects-Overview.pdf
614.9 kB
HITB 2005 - Malaysia/proceedings/TT-Roelof-Temmingh-State-of-the-art.ppt
2.6 MB
HITB 2005 - Malaysia/proceedings/TT-San-Hacking-Windows-CE.ppt
900.1 kB
HITB 2005 - Malaysia/proceedings/TT-Shreeraj-Shah-Webhacking-Kungfu.pdf
294.0 kB
HITB 2005 - Malaysia/proceedings/TT-The-Grugq-VoIPPhreaking.ppt
137.2 kB
HITB 2005 - Malaysia/video/AnalyzingCode.mp4
116.7 MB
HITB 2005 - Malaysia/video/AssesingSrvSec.mp4
161.9 MB
HITB 2005 - Malaysia/video/BeneficialWorms.mp4
184.8 MB
HITB 2005 - Malaysia/video/BuildSecOperCenter.mp4
142.3 MB
HITB 2005 - Malaysia/video/CCC.mp4
156.4 MB
HITB 2005 - Malaysia/video/CyberSkirmishes.mp4
90.5 MB
HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Fyodor Y.mp4
81.2 MB
HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Roelof T.mp4
87.3 MB
HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Fabrice M.mp4
87.1 MB
HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Jim Geove.mp4
50.7 MB
HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Joanna Ru.mp4
87.0 MB
HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Marc Scho.mp4
87.1 MB
HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Raoul Chi.mp4
98.0 MB
HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Roberto P.mp4
80.0 MB
HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ Rohyt Bel.mp4
53.1 MB
HITB 2005 - Malaysia/video/HITBSecConf2005 Malaysia _ The Grugq.mp4
99.6 MB
HITB 2005 - Malaysia/video/HckInternetBankingApp.mp4
160.7 MB
HITB 2005 - Malaysia/video/HckingWinCE.mp4
137.8 MB
HITB 2005 - Malaysia/video/IE-Security.mp4
256.9 MB
HITB 2005 - Malaysia/video/Java&SecProgramming.mp4
161.0 MB
HITB 2005 - Malaysia/video/MobileMalware.mp4
216.9 MB
HITB 2005 - Malaysia/video/ModernEspionage_all.mp4
222.8 MB
HITB 2005 - Malaysia/video/RealWorldAttacks.mp4
129.2 MB
HITB 2005 - Malaysia/video/STIF-wareEvol.mp4
170.5 MB
HITB 2005 - Malaysia/video/SocialEngineeringFundam.mp4
148.4 MB
HITB 2005 - Malaysia/video/StiftingHaystacks.mp4
140.5 MB
HITB 2005 - Malaysia/video/VoIPhreaking.mp4
176.0 MB
HITB 2005 - Malaysia/video/WHckingKungFU.mp4
144.8 MB
HITB 2005 - Malaysia/video/wifiHotspotSec.mp4
94.9 MB
HITB 2005 - Malaysia/video/windowsMalwareDetection.mp4
161.0 MB
HITB 2005 - Malaysia/video/x25SecurityWwwww.mp4
204.3 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia - Mark Curp.mp4
59.1 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia - Mark Curphey & John Viega - Keynote.mp4
59.1 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Ching Ti.mp4
73.2 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Ching Tim Meng - X.805 Standard.mp4
73.2 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Michael Davis - Client Honeypots - Its not only ...(2).mp4
45.6 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Michael Davis - Client Honeypots - Its not only ....mp4
45.6 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Michael.mp4
45.6 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Anthony Z.mp4
79.7 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Anthony Zboralski & Dave McKay - Hacking Trust.mp4
79.7 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ CTF Prize Giving & Charity Auction.mp4
75.2 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Carlos Sarraute & Javier Burroni - Neural Networks.mp4
53.2 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Douglas M.mp4
72.1 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Douglas MacIver - Pen Testing Windows Vista BitLocker.mp4
72.1 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Fabrice M.mp4
83.6 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Fabrice Marie - Application Intrusion Prevention....mp4
83.6 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Fyodor Yarochkin & Meder Kydyraliev - YAWATT.mp4
48.1 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Jim Geove.mp4
68.4 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Jim Geovedi & Raditya Iryandi - Hacking VSAT.mp4
68.4 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Joanna Rutkowska - Subverting Vista Kernel for Fun...mp4
87.8 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Jonathan Limbo - The world through the eyes of a .....mp4
36.8 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Lisa Thal.mp4
48.2 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Lisa Thalheim - Visualization of Source Code.mp4
48.2 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Marc Scho.mp4
88.8 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Marc Schonefeld - Pentesting Java_J2EE.mp4
88.8 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Nguyen An.mp4
68.7 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Nguyen Anh Quynh - Invisible Honeypot Monitoring.mp4
68.7 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Nish Balla - Finding Secrets in ISAPI.mp4
56.4 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Paul Boeh.mp4
47.0 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Paul Boehm - Taming Bugs.mp4
47.0 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Philippe Biondi & Arnaud Ebalard - Scapy and IPv6.mp4
78.9 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Philippe.mp4
78.9 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Raoul Chi.mp4
56.2 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Raoul Chiesa - Hacker's Profiling Project (HPP).mp4
56.2 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Roberto P.mp4
59.5 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Roberto Preatoni & Fabio Ghioni - The Biggest Brother.mp4
59.5 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Rohyt Bel.mp4
67.6 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Rohyt Belani - Smashing the stack for profit - period.mp4
67.6 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Saumil Sh.mp4
69.3 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Saumil Shah - Writing Metasploit Plugins.mp4
69.3 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ The Grugq - VoIPhreaking_ SIPhallis Unveiled.mp4
78.2 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ The Grugq.mp4
78.2 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Thorsten Holz - Playing with Botnets.mp4
59.7 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Thorsten.mp4
59.7 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Van Hause.mp4
75.7 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Van Hauser - Attacking the IPv6 Protocol Suite.mp4
75.7 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Wes Brown - MOSREF(2).mp4
78.4 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Wes Brown - MOSREF.mp4
78.4 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Wes Brown.mp4
78.4 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Window Sn.mp4
61.3 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Window Snyder - Firefox Security.mp4
61.3 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Yen Min C.mp4
77.1 MB
HITB 2006 - Malaysia/HITBSecConf2006 Malaysia _ Yen Min Cheng - Triple Play_ Triple Threats_.mp4
77.1 MB
HITB 2007 - Malaysia/CTF Prize Giving and Charity Auction.mov
484.6 MB
HITB 2007 - Malaysia/D1T1 - Andrew Cushman - State of Security.mov
244.4 MB
HITB 2007 - Malaysia/D1T1 - Grugq - Meta Anti Forensics - The Hash Hacking Harness.mov
92.9 MB
HITB 2007 - Malaysia/D1T1 - Marc Weber Tobias and TOOOL USA - High Security Locks.mov
163.1 MB
HITB 2007 - Malaysia/D1T1 - Martin Johns - Hacking the Intranet with a Webpage.mov
92.5 MB
HITB 2007 - Malaysia/D1T1 - Michael Thumann and Dror John Roecher - Hacking Cisco NAC.mov
232.6 MB
HITB 2007 - Malaysia/D1T2 - Andrea Barisani and Daniele Bianco - Injecting RDS-TMC.mov
265.1 MB
HITB 2007 - Malaysia/D1T2 - Frank Yuan Fan - Advanced Web Application and Database Threat Analysis with MatriXay.mov
85.6 MB
HITB 2007 - Malaysia/D1T2 - Raffael Marty - Insider Threat Visualization.mov
100.9 MB
HITB 2007 - Malaysia/D1T2 - Raoul Chiesa and Mayhem - Hacking SCADA.mov
80.9 MB
HITB 2007 - Malaysia/D1T2 - Roberto Preatoni - WabiSabiLabi - The Exploit Marketplace.mov
203.7 MB
HITB 2007 - Malaysia/D1T2 - Stefano Zanero - Anomaly Based Intrusion Detection.mov
165.1 MB
HITB 2007 - Malaysia/D2T1 - Alexander Kornbrust - Hacking Hardend and Secured Oracle Servers.mov
152.4 MB
HITB 2007 - Malaysia/D2T1 - Billy Rios and Nathan McFeters - Slipping Past the Firewall.mov
165.1 MB
HITB 2007 - Malaysia/D2T1 - Felix FX Lindner - Attack Surface of Modern Applications.mov
110.9 MB
HITB 2007 - Malaysia/D2T1 - Shreeraj Shah - Hacking AJAX and Web Services.mov
123.0 MB
HITB 2007 - Malaysia/D2T1 - Starbug - Hacking Biometric Passports.mov
113.7 MB
HITB 2007 - Malaysia/D2T1 - Window Snyder - Tools and Strategies for Securing a Large Development Project.mp4
121.0 MB
HITB 2007 - Malaysia/D2T2 - Dino Covotsos - Hacking the Bluetooth Stack for Fun Fame and Profit.mov
430.1 kB
HITB 2007 - Malaysia/D2T2 - Domingo Montanaro and Rodrigo Branco - Computer Forensics Challenge and Anti-Forensics Techniques.mov
450.6 kB
HITB 2007 - Malaysia/D2T2 - Fetri Miftach and Jim Geovedi - Hacking Trust aka Enterprise Hacking.mov
466.9 kB
HITB 2007 - Malaysia/D2T2 - Jose Nazario - Googling for Malware and Bugs.mov
495.6 kB
HITB 2007 - Malaysia/D2T2 - Luiz Eduardo - Protocol Fuzzing.mov
221.4 MB
HITB 2007 - Malaysia/D2T2 - Sarb Sembhi - An End to End Analysis of Securing Networked CCTV Systems.mov
265.7 MB
HITB 2007 - Malaysia/KEYNOTE 1 - Lance Spitzner - Honeypots - Past Present and Future.mp4
175.4 MB
HITB 2007 - Malaysia/KEYNOTE 2 - Mikko Hypponen - Online Crime and Crime Online.mp4
178.9 MB
HITB 2007 - Malaysia/KEYNOTE 3 - Mark Phiber Optik Abene.mov
2.3 MB
HITB 2007 - Malaysia/KEYNOTE 4 - Emmanuel Goldstein.mov
2.3 MB
HITB 2008 - Dubai/D1T1 - Ero Carrera - Malware Behavior Tools Scripting and Adavanced Analysis.zip
2.3 MB
HITB 2008 - Dubai/D1T1 - Jim Geovedi - Hijacking VSAT Connections.zip
1.9 MB
HITB 2008 - Dubai/D1T1 - Michael Thumann - Hacking Second Life.zip
106.7 MB
HITB 2008 - Dubai/D1T1 - Shreeraj Shah - Securing Next Generation Applications - Scan Detect and Mitigate.zip
408.8 kB
HITB 2008 - Dubai/D1T2 - Alessio Penasilico - VoIP INsecurities - Italians Do It Better.zip
12.9 MB
HITB 2008 - Dubai/D1T2 - Jamie Butler - Computer Forensics and Incident Response.zip
172.8 kB
HITB 2008 - Dubai/D1T2 - Meling Mudin and Lee Chin Sheng - Defensive Network Security.pdf
1.0 MB
HITB 2008 - Dubai/D1T2 - Skyper - Cracking the GSM A5-1 Encryption in Seconds.zip
3.2 MB
HITB 2008 - Dubai/D2T1 - Adrian Pastor - Cracking Into Embeded Devices and Beyond.zip
40.1 MB
HITB 2008 - Dubai/D2T1 - Cesar Cerrudo - Token Kidnapping.zip
174.8 kB
HITB 2008 - Dubai/D2T1 - Daniel Ingevaldson - Virtualization != Security.zip
10.6 MB
HITB 2008 - Dubai/D2T1 - Dino Covotsos - Hacking the Bluetooth Stack for Fun Fame and Mayhem.zip
60.6 MB
HITB 2008 - Dubai/D2T1 - Petko Petkov - For My Next Trick - Client Side Hacking.zip
7.5 MB
HITB 2008 - Dubai/D2T1 Hacking the bluetooth stack.mpg
15.3 MB
HITB 2008 - Dubai/D2T2 - Alexander Kornbrust - Practical Oracle Forensics.zip
1.3 MB
HITB 2008 - Dubai/D2T2 - Benjamin Hagen and Walter Goulet - Real World Attacks Against 3G Networks Using Subscriber Devices.zip
385.0 kB
HITB 2008 - Dubai/D2T2 - Domingo Montanaro - In-depth Anti-Forensics - Challenges of Steganography and Discovering Hidden Data.zip
1.5 MB
HITB 2008 - Dubai/D2T2 - Raoul Chiesa and Alessio Pennasillico - Penetration Testing SCADA.zip
7.7 MB
HITB 2008 - Dubai/D2T2 - Rodrigo Rubira Branco - Hacking The Cell Architecture.zip
1.5 MB
HITB 2008 - Dubai/DAY 2 - KEYNOTE - Jeremiah Grossman.zip
5.6 MB
HITB 2008 - Malaysia/CTF Prize Giving & Charity Auction.mp4
339.5 MB
HITB 2008 - Malaysia/Day1-Keynote-1.JeremiahGrossman-The Art Of Click Jacking.mp4
210.3 MB
HITB 2008 - Malaysia/Day1-Keynote-2.MarcusRanum-Cyberwar Is Bullshit.mp4
211.1 MB
HITB 2008 - Malaysia/Day1-Track1-DinoDaiZovi-Mac OS X Exploitation.mp4
218.1 MB
HITB 2008 - Malaysia/Day1-Track1-Ero Carrera - Analysis and Visualization of Common Packers.mp4
211.6 MB
HITB 2008 - Malaysia/Day1-Track1-HernanOchoa-Pass The Hass Toolkit for Windows.mp4
198.1 MB
HITB 2008 - Malaysia/Day1-Track1-Jim Geovedi & Raditya Iryandi - Hacking a Bird in the Sky 2.0.mp4
139.2 MB
HITB 2008 - Malaysia/Day1-Track1-Julian Ho - MoocherHunting - Real-Time Geo-Location Unauthorized WiFi Users.mp4
190.6 MB
HITB 2008 - Malaysia/Day1-Track1-Peter Silberman - Full Process Reconsitution from Memory.mp4
197.1 MB
HITB 2008 - Malaysia/Day1-Track1-ThomasVarghese-Delivering Identity Management 2.0 by Leveraging OPSS.mp4
173.9 MB
HITB 2008 - Malaysia/Day1-Track2-Alexander Tereskin - Bluepilling the Xen Hypervisor.mp4
178.9 MB
HITB 2008 - Malaysia/Day1-Track2-Eric Lawrence - Internet Explorer 8 - Trustworthy Engineering and Browsing.mp4
230.4 MB
HITB 2008 - Malaysia/Day1-Track2-Jonathan Squire - A Fox in the Hen House - UPnP IGD.mp4
208.4 MB
HITB 2008 - Malaysia/Day1-Track2-Paul Craig - Hacking Internet Kiosks.mp4
230.1 MB
HITB 2008 - Malaysia/Day1-Track2-Roberto Preatoni - Time for a free hardware foundation.mp4
194.5 MB
HITB 2008 - Malaysia/Day1-Track2-Saumil Shah - Browser Exploits - A New Model For Browser Security.mp4
207.9 MB
HITB 2008 - Malaysia/Day1-Track2-The Grugq - How The Leopard Hides His Spots - OS X Anti-Forensics Techniques.mp4
201.0 MB
HITB 2008 - Malaysia/Day2-Keynote.The Pirate Bay - Dissolving an Industry as a Hobby.mp4
308.1 MB
HITB 2008 - Malaysia/Day2-Track1-Charl Van Der Walt - Pushing the Camel Through the Eye of a Needle.mp4
240.6 MB
HITB 2008 - Malaysia/Day2-Track1-Charlie Miller - iPwning the iPhone.mp4
217.9 MB
HITB 2008 - Malaysia/Day2-Track1-Ilfak Guilfanov - Decompilers and Beyond.mp4
216.6 MB
HITB 2008 - Malaysia/Day2-Track1-Kris Kaspersky - Remote Code Execution Through Intel CPU Bugs.mp4
123.0 MB
HITB 2008 - Malaysia/Day2-Track1-Petko D Petkov - Client-Side Security.mp4
146.7 MB
HITB 2008 - Malaysia/Day2-Track2-AR - Next Generation Reverse Shell.mp4
236.5 MB
HITB 2008 - Malaysia/Day2-Track2-Adrian Pagvac Pastor - Cracking into Embedded Devices and Beyond.mp4
206.8 MB
HITB 2008 - Malaysia/Day2-Track2-Matthew Geiger - How to Build Your Own Password Cracker with a VM.mp4
195.2 MB
HITB 2008 - Malaysia/Day2-Track2-Shreeraj Shah - Top 10 Web 2.0 Attacks.mp4
236.9 MB
HITB 2009 - Malaysia/Alexander Gazet & Yoann Guilot - Defeating Software Protection with Metasm.mp4
118.3 MB
HITB 2009 - Malaysia/Announcement of CTF Winners and Final HITB Charity Auction.mp4
189.1 MB
HITB 2009 - Malaysia/Bruno Goncalves - Hacking From The Restroom.mp4
111.6 MB
HITB 2009 - Malaysia/CTF.mp4
3.0 MB
HITB 2009 - Malaysia/Dimitrious Petroulos - Having Fun With ATMs and HSMs.mp4
135.7 MB
HITB 2009 - Malaysia/Ed Skoudis - The Bad Guys Are Winning. So Now What.mp4
315.9 MB
HITB 2009 - Malaysia/Frederic Raynal, Guillaume Deluge, Damien Aumaitre - PDF Origami Strikes Back.mp4
117.1 MB
HITB 2009 - Malaysia/Fyodor Yarochkin and The Grugq - From Russia With Love.exe.mp4
168.3 MB
HITB 2009 - Malaysia/Harron Meer - Clobbering The Cloud.mp4
111.4 MB
HITB 2009 - Malaysia/Job De Haas - Side Channel Analysis on Embedded Systems.mp4
145.1 MB
HITB 2009 - Malaysia/Joe Grand - Hardware Is The New Software.mp4
124.5 MB
HITB 2009 - Malaysia/Julian Assage - Publishing the Unpublished.mp4
158.0 MB
HITB 2009 - Malaysia/Julien Tinnes, Chris Evans - Security In-Depth for Linux Software.mp4
122.6 MB
HITB 2009 - Malaysia/Kuza55 - Implementing a Blind TCPIP Hijacking Tool.mp4
97.4 MB
HITB 2009 - Malaysia/Lucas Adamski - Freeing Sisyphus, Declaratively Address Web Security Issue.mp4
92.5 MB
HITB 2009 - Malaysia/MARES - APRS,HAM Radio.mp4
142.7 MB
HITB 2009 - Malaysia/Mark Dowd - Attacking Interoperability.mp4
115.9 MB
HITB 2009 - Malaysia/Meling Mudin & CS Lee - Network Forensics.mp4
179.6 MB
HITB 2009 - Malaysia/Nguyen Anh Quyuh - eKimono, A Malware Scanner for Virtual Machines.mp4
137.9 MB
HITB 2009 - Malaysia/Nishad Herath - How Low Will Malware Go.mp4
117.1 MB
HITB 2009 - Malaysia/Paul Theriault - Browser Ghosting Attacks.mp4
73.5 MB
HITB 2009 - Malaysia/Rop Gonggip - Modern Day Robin Hoods.mp4
166.6 MB
HITB 2009 - Malaysia/Saumil Shah - How To Own The World, One Desktop At A Time.mp4
135.2 MB
HITB 2009 - Malaysia/Sheran Gunasekera - Bugs and Kisses, Spying on Blackberry Users for Fun.mp4
134.9 MB
HITB 2009 - Malaysia/Steve Anson - Detecting Computer Intrusions.mp4
94.9 MB
HITB 2009 - Malaysia/The Secret History Of Hacking.DivxMp3.mp4
97.3 MB
HITB 2009 - Malaysia/Travis Ormandy - Making Software Dumber.mp4
69.1 MB
HITB 2009 - Malaysia/ctf-clip1.mp4
6.6 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 1.mp4
11.7 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 1.srt
9.0 kB
HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 2.mp4
13.7 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 2.srt
8.0 kB
HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 3.mp4
18.5 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 3.srt
11.1 kB
HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 4.mp4
13.7 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 4.srt
7.3 kB
HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 5.mp4
11.1 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote 1 - Perpetual Insecurity Machine Part 5.srt
7.2 kB
HITB 2010 - Malaysia/HITB2010KUL Keynote 2 - Taking Back the DNS Part 1.mp4
11.7 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote 2 - Taking Back the DNS Part 2.mp4
11.8 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote 2 - Taking Back the DNS Part 3.mp4
18.4 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote 2 - Taking Back the DNS Part 4.mp4
21.9 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote 2 - Taking Back the DNS Part 5.mp4
17.2 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 1.mp4
13.7 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 1.srt
8.6 kB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 10.mp4
17.3 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 10.srt
10.2 kB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 2.mp4
13.7 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 3.mp4
16.8 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 3.srt
11.0 kB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 4.mp4
13.7 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 4.srt
8.9 kB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 5.mp4
11.8 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 5.srt
9.5 kB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 6.mp4
16.8 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 7.mp4
13.3 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 8.mp4
13.3 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 8.srt
8.5 kB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 9.mp4
16.4 MB
HITB 2010 - Malaysia/HITB2010KUL Keynote Panel Day 2 - Future of Mobile Malware & Cloud Computing Part 9.srt
11.0 kB
HITB 2011 - Amsterdam/Hackers Op De Gracht.mp4
32.8 MB
HITB 2011 - Malaysia/D1 LABS - VoIP Attacking CUCM.pdf
2.8 MB
HITB 2011 - Malaysia/D1 SIGINT - Adnan Mohd Shukor - Fun With Javascript DeObfuscation.pdf
4.2 MB
HITB 2011 - Malaysia/D1 SIGINT - Elger Stitch Jonker - Building the Hackerspace.pdf
8.8 MB
HITB 2011 - Malaysia/D1 SIGINT - Jurre van Bergen and Youri van der Zwart - Abusing RFID.pdf
790.0 kB
HITB 2011 - Malaysia/D1 SIGINT - Muhammad Najmi Ahmad Zabidi - Compiling Features for Malcious Binaries.pdf
420.2 kB
HITB 2011 - Malaysia/D1 SIGINT - Raoul Chiesa - Cyber Weapons in 2011.pdf
7.4 MB
HITB 2011 - Malaysia/D1T1 - Alex Kirk - Mobile Malware Analysis.pdf
1.9 MB
HITB 2011 - Malaysia/D1T1 - Andrea Barisani and Daniele Bianco - EMV Protocol and POS Physical Analysis.pdf
2.1 MB
HITB 2011 - Malaysia/D1T1 - Elena K and Joffrey C - Webshells - A Framework for Pentesting.pdf
5.4 MB
HITB 2011 - Malaysia/D1T1 - Jonathan Brossard - Post Memory Corruption Analysis.pdf
284.6 kB
HITB 2011 - Malaysia/D1T1 - Mahmud Ab Rahman - Reverse Engineering Android Malware.pdf
9.7 MB
HITB 2011 - Malaysia/D1T1 - Marco Balduzzi - Attacking the Privacy of Social Network Users.pdf
6.7 MB
HITB 2011 - Malaysia/D1T1 - Mariano Nunez - Attacks Against SAP Web Applications.pdf
1.4 MB
HITB 2011 - Malaysia/D1T1 - Riley Hassell - Exploiting Androids for Fun and Profit.pdf
9.4 MB
HITB 2011 - Malaysia/D1T1 - Stefan Esser - Antid0te 2.0 - ASLR in iOS.pdf
5.0 MB
HITB 2011 - Malaysia/D1T2 - Alexander Polyakov and Dimitry Chastuhin - SAPocalypse Now.pdf
15.9 MB
HITB 2011 - Malaysia/D1T2 - Asia Slowinka - Excavating Data Structures from Stripped Binaries.pdf
902.7 kB
HITB 2011 - Malaysia/D1T2 - Claudio Criscione - MetaXSSploit - Bringing XSS to Pentesting.pdf
3.2 MB
HITB 2011 - Malaysia/D1T2 - Don Bailey - GoodFUN - The GoodFET.pdf
991.1 kB
HITB 2011 - Malaysia/D1T2 - Guillaume Prigent - Really Open Source Information Gathering.pdf
5.6 MB
HITB 2011 - Malaysia/D1T2 - Jim Geovedi - Satellite Telephony Security.pdf
5.7 MB
HITB 2011 - Malaysia/D1T2 - Laurent Oudot - Extracting Senstive Data from Your iPhone.pdf
14.6 MB
HITB 2011 - Malaysia/D1T2 - Laurent Weber - All your Base Stations Are Belong To Us.pdf
320.0 kB
HITB 2011 - Malaysia/D1T2 - The Grugq - Smashing the Slack for Fun and Profit.pdf
14.7 MB
HITB 2011 - Malaysia/D1T2 - Thomas Caplin - Silverlight - A New Way to Surf .Net Holes.pdf
1.5 MB
HITB 2011 - Malaysia/D1T2 - biatch0 and RuFI0 - Pwning a 4G Device for the LuLz.pdf
3.7 MB
HITB 2011 - Malaysia/D1T3 - Barry van Kampen - DIY Video Surveillance.pdf
915.7 kB
HITB 2011 - Malaysia/D1T3 - Didier Stevens - Malicious PDF Analysis Lab/HITB2011AMS - PDF Chapter.pdf
272.0 kB
HITB 2011 - Malaysia/D1T3 - Didier Stevens - Malicious PDF Analysis Lab/HITB2011AMS - Slides.pdf
42.4 kB
HITB 2011 - Malaysia/D1T3 - Didier Stevens - Malicious PDF Analysis Lab/HITB2011AMS - Solutions.txt
2.7 kB
HITB 2011 - Malaysia/D1T3 - Itzhak Zuk Avraham - Popping Shell On Android Devices.pdf
1.3 MB
HITB 2011 - Malaysia/D1T3 - Jimmy Shah - Mobile App Moolah.pdf
1.7 MB
HITB 2011 - Malaysia/D1T3 - Mitja Kolsek - Remote Binary Planting.pdf
4.4 MB
HITB 2011 - Malaysia/D2 LABS - Daniel Mende and Jim Geovedi - Practical 3G-4G Attacks.pdf
2.3 MB
HITB 2011 - Malaysia/D2 SIGINT - Jim Manico - Ghost of XSS Past Present and Future.pdf
2.2 MB
HITB 2011 - Malaysia/D2 SIGINT - Keith Lee - iPhone Espionage.pdf
5.1 MB
HITB 2011 - Malaysia/D2 SIGINT - Martin Knobloch - Secure Your Software Using OWASP.pdf
1.6 MB
HITB 2011 - Malaysia/D2 SIGINT - Nur Muhammed Kamil - MyKotakPasir.pdf
1.2 MB
HITB 2011 - Malaysia/D2T1 - Andreas Weigenstein - SQL Injection with ABAP.pdf
1.3 MB
HITB 2011 - Malaysia/D2T1 - Andrew Gavin - Stealing Sensitive Data from Thousands of Systems.pdf
65.9 kB
HITB 2011 - Malaysia/D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities/D2T1 - Benjamin Kunz - Skype Zero Day Vulnerabilities.zip
50.6 MB
HITB 2011 - Malaysia/D2T1 - Daniele Bianco and Adam Laurie - Credit Card Skimming and PIN Harvesting in an EMV World.pdf
3.6 MB
HITB 2011 - Malaysia/D2T1 - Hendrik Scholz - Air Travel Hacking.pdf
5.7 MB
HITB 2011 - Malaysia/D2T1 - Itzik Kotler - Let Me Stuxnet You.pdf
542.6 kB
HITB 2011 - Malaysia/D2T1 - Ivan Ristic - A Study of What Really Breaks SSL.pdf
3.2 MB
HITB 2011 - Malaysia/D2T1 - Marc Blanchou and Mathew Solnik - Blackbox Android.pdf
3.7 MB
HITB 2011 - Malaysia/D2T1 - Ravi B Kevin R and Nico G - Femtocells.pdf
6.2 MB
HITB 2011 - Malaysia/D2T1 - Stefan Esser - iPhone Exploitation - One ROPe to Bind Them All.pdf
8.6 MB
HITB 2011 - Malaysia/D2T2 - D. Mende & Enno Rey - Attacking 3G and 4G Networks.pdf
2.4 MB
HITB 2011 - Malaysia/D2T2 - Jim Geovedi and Raoul Chiesa - Hacking a Bird in the Sky.pdf
18.1 MB
HITB 2011 - Malaysia/D2T2 - KaiJern Lau - Malware Sandboxing the Xandora Way.pdf
16.2 MB
HITB 2011 - Malaysia/D2T2 - Paul Sebastian Ziegler - Stenographic AVI FIlesystems.pdf
3.1 MB
HITB 2011 - Malaysia/D2T2 - Philippe Langlois - Attacking the GPRS Roaming Exchange.pdf
13.5 MB
HITB 2011 - Malaysia/D2T2 - Rosario Valotta - Cookie Jacking.pdf
2.6 MB
HITB 2011 - Malaysia/D2T2 - Shreeraj Shah - Next Generation Web Attacks.pdf
752.9 kB
HITB 2011 - Malaysia/D2T2 - Travis Goodspeed - Remotely Exploiting Layer One.pdf
318.5 kB
HITB 2011 - Malaysia/D2T3 - Aditya K Sood - Spying on SpyEye.pdf
2.8 MB
HITB 2011 - Malaysia/D2T3 - Bert Hubert - DNSSEC - The Good The Bad and The Very Bad.pdf
407.0 kB
HITB 2011 - Malaysia/D2T3 - Guillaume Delugre - Reverse Engineering Broadcom NetExtreme Firmware.pdf
1.3 MB
HITB 2011 - Malaysia/D2T3 - Maarten Oosterink - Attacking Critical Infrastructure.pdf
2.5 MB
HITB 2011 - Malaysia/D2T3 - Travis Goodspeed - Building a Promiscious nRF24L01 Packet Sniffer.pdf
32.2 MB
HITB 2011 - Malaysia/HackWEEKDAY - Arzumy.pdf
250.1 kB
HITB 2011 - Malaysia/KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.pdf
1.6 MB
HITB 2012 - Amsterdam/#HITB2012AMS - KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line (2).srt
89.7 kB
HITB 2012 - Amsterdam/#HITB2012AMS - KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line.mp4
164.7 MB
HITB 2012 - Amsterdam/#HITB2012AMS - KEYNOTE 1 - Andy Ellis - Getting Ahead of the Security Poverty Line.srt
89.7 kB
HITB 2012 - Amsterdam/#HITB2012AMS CLOSING KEYNOTE - Ms jaya Baloo - Identity, Privacy and Security.mp4
178.1 MB
HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Arnauld Mascret - Whistling Over the Wire.mp4
159.3 MB
HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis (2).srt
66.3 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis.mp4
152.7 MB
HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Claudio Guarnieri - Cuckoo Sandbox - Automated Malware Analysis.srt
66.3 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Ivo Pooters - Turning Android Inside Out (2).srt
72.1 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Ivo Pooters - Turning Android Inside Out.mp4
150.9 MB
HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Ivo Pooters - Turning Android Inside Out.srt
72.1 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Juan Pablo Echtegoyen - Attacking the SAP Solution Manager (2).srt
64.2 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Juan Pablo Echtegoyen - Attacking the SAP Solution Manager.mp4
180.5 MB
HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Juan Pablo Echtegoyen - Attacking the SAP Solution Manager.srt
64.2 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012 (2).srt
76.4 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012.mp4
166.1 MB
HITB 2012 - Amsterdam/#HITB2012AMS D1T1 - Roberto Suggi Liverani and Scott Bell - Browser Bug Huting in 2012.srt
76.4 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV (2).srt
95.9 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV.mp4
244.2 MB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Adam Gowdiak - Part 1 - Security Threats in The World of Digital Sat TV.srt
95.9 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets (2).srt
76.8 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets.mp4
168.4 MB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Adam Gowdiak - Part 2 - Security Vulnerabilities of DVB Chipsets.srt
76.8 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE (2).srt
68.7 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE.mp4
214.8 MB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Itzhak Avraham and Nir Goldshlager - Killing a Bug Bounty Program TWICE.srt
68.7 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks (2).srt
60.5 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks.mp4
123.9 MB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - MuscleNerd - Evolution of iPhone Baseband and Unlocks.srt
60.5 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT (2).srt
44.2 kB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT.mp4
124.4 MB
HITB 2012 - Amsterdam/#HITB2012AMS D1T2 - Sebastien Renaud and Kevin Szkudlapski - WinRT.srt
44.2 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities (2).srt
107.2 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities.mp4
192.1 MB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - A. Bazhanyuk and N. Tarakanov - Automatically Searching for Vulnerabilities.srt
107.2 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond (2).srt
82.9 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond.mp4
124.7 MB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Andrei Costin - PostScript - Danger Ahead - Hacking MFPs, PCs and Beyond.srt
82.9 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Dr Marco Balduzzi - SatanCloud (2).srt
68.0 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Dr Marco Balduzzi - SatanCloud.mp4
139.4 MB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Dr Marco Balduzzi - SatanCloud.srt
68.0 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Georgia Weidman - Bypassing the Android Permission Model (2).srt
84.4 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Georgia Weidman - Bypassing the Android Permission Model.mp4
199.6 MB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Georgia Weidman - Bypassing the Android Permission Model.srt
84.4 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services (2).srt
75.6 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services.mp4
178.6 MB
HITB 2012 - Amsterdam/#HITB2012AMS D2T1 - Kenneth White - A Deep Analysis of Amazon Web Services.srt
75.6 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Dream Team - Part 1 - Corona for iOS 5.0.1 (2).srt
59.7 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Dream Team - Part 1 - Corona for iOS 5.0.1.mp4
201.7 MB
HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Dream Team - Part 1 - Corona for iOS 5.0.1.srt
59.7 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing) (2).srt
68.7 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing).mp4
190.1 MB
HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Dream Team - Part 2 - Absinthe for iOS 5.0.1 (... and One More Thing).srt
68.7 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Nicolas Gregoire - Attacking XML Preprocessing (2).srt
62.3 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Nicolas Gregoire - Attacking XML Preprocessing.mp4
162.2 MB
HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Nicolas Gregoire - Attacking XML Preprocessing.srt
62.3 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Rahul Sasi - CXML VXML IVR Pentesting for Auditors.mp4
130.5 MB
HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Steven Seeley - Ghost in the Windows 7 Allocator (2).srt
81.6 kB
HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Steven Seeley - Ghost in the Windows 7 Allocator.mp4
158.9 MB
HITB 2012 - Amsterdam/#HITB2012AMS D2T2 - Steven Seeley - Ghost in the Windows 7 Allocator.srt
81.6 kB
HITB 2012 - Amsterdam/#HITB2012AMS DAY 1 SPECIAL CLOSING - Rop Gonggrijp (2).srt
46.2 kB
HITB 2012 - Amsterdam/#HITB2012AMS DAY 1 SPECIAL CLOSING - Rop Gonggrijp.mp4
114.4 MB
HITB 2012 - Amsterdam/#HITB2012AMS DAY 1 SPECIAL CLOSING - Rop Gonggrijp.srt
46.2 kB
HITB 2012 - Amsterdam/#HITB2012AMS KEYNOTE 2 - Bruce Schneier - Trust Security and Society (2).srt
72.4 kB
HITB 2012 - Amsterdam/#HITB2012AMS KEYNOTE 2 - Bruce Schneier - Trust Security and Society.mp4
159.8 MB
HITB 2012 - Amsterdam/#HITB2012AMS KEYNOTE 2 - Bruce Schneier - Trust Security and Society.srt
72.4 kB
HITB 2012 - Amsterdam/Hackers Op De Gracht.mp4
96.8 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T1 - A. Barisani & D. Bianco - Practical Exploitation of Embedded Systems.mp4
205.9 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T1 - A. Barisani & D. Bianco - Practical Exploitation of Embedded Systems.srt
84.4 kB
HITB 2012 - Malaysia/#HITB2012KUL D1T1 - Chris Wysopal - Data Mining a Mountain of Vulnerabilities.mp4
226.1 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T1 - Chris Wysopal - Data Mining a Mountain of Vulnerabilities.srt
89.2 kB
HITB 2012 - Malaysia/#HITB2012KUL D1T1 - Lucas Adamski - Mozilla Apps, Firefox OS and You.mp4
216.5 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T1 - Lucas Adamski - Mozilla Apps, Firefox OS and You.srt
72.9 kB
HITB 2012 - Malaysia/#HITB2012KUL D1T1 - P. Langlois & E. Gadaix - Why Telcos Keep Getting Hacked.mp4
264.3 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T1 - P. Langlois & E. Gadaix - Why Telcos Keep Getting Hacked.srt
94.8 kB
HITB 2012 - Malaysia/#HITB2012KUL D1T1 - Petko D. Petkov - A Short History of the JavaScript Security Arsenal.mp4
253.4 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T1 - Petko D. Petkov - A Short History of the JavaScript Security Arsenal.srt
90.2 kB
HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Don Bailey - Hackers the Movie A Retrospective.mp4
189.2 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Don Bailey - Hackers the Movie A Retrospective.srt
79.5 kB
HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Haroon Meer - You and Your Research.mp4
158.1 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Haroon Meer - You and Your Research.srt
72.7 kB
HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Marc Van Hauser Heuse - IPv6 Insecurity Revolutions.mp4
271.7 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Marc Van Hauser Heuse - IPv6 Insecurity Revolutions.srt
92.0 kB
HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Mark Dowd & Tarjei Mandt - iOS 6 Security.mp4
194.4 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Mark Dowd & Tarjei Mandt - iOS 6 Security.srt
81.3 kB
HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Meder Kydyraliev - Defibrilating Web Security.mp4
209.2 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Meder Kydyraliev - Defibrilating Web Security.srt
80.0 kB
HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Wes Brown - Supercomputing, Malware and Correlation.mp4
165.0 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T2 - Wes Brown - Supercomputing, Malware and Correlation.srt
49.3 kB
HITB 2012 - Malaysia/#HITB2012KUL D1T3 - John Captain Crunch Draper - A Historical Look at the Phreaking Scene.mp4
180.4 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T3 - John Captain Crunch Draper - A Historical Look at the Phreaking Scene.srt
75.5 kB
HITB 2012 - Malaysia/#HITB2012KUL D1T3 - Paul Sebastian Ziegler - Hacking in The Far East.mp4
201.0 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T3 - Paul Sebastian Ziegler - Hacking in The Far East.srt
97.0 kB
HITB 2012 - Malaysia/#HITB2012KUL D1T3 - The Grugq - OPSEC Because Jail is for wuftpd.mp4
216.6 MB
HITB 2012 - Malaysia/#HITB2012KUL D1T3 - The Grugq - OPSEC Because Jail is for wuftpd.srt
91.7 kB
HITB 2012 - Malaysia/#HITB2012KUL D2 PANEL DISCUSSION iOS OS X Security.mp4
182.7 MB
HITB 2012 - Malaysia/#HITB2012KUL D2 PANEL DISCUSSION iOS OS X Security.srt
75.8 kB
HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Chris Evans - Element 1337 in the Periodic Table Pwnium.mp4
179.0 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Chris Evans - Element 1337 in the Periodic Table Pwnium.srt
75.4 kB
HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Katie Moussouris - How to Get Along With Vendors Without Really Trying.mp4
192.4 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Katie Moussouris - How to Get Along With Vendors Without Really Trying.srt
92.1 kB
HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Ollie Whitehouse - Finding the Weak Link in Binaries.mp4
165.9 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Ollie Whitehouse - Finding the Weak Link in Binaries.srt
59.5 kB
HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Paul Vixie - Silo Busting in Information Security The ISC SIE Approach.mp4
256.5 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Paul Vixie - Silo Busting in Information Security The ISC SIE Approach.srt
85.3 kB
HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Rodrigo Rubira Branco - Study of Malware Obfuscation Techniques.mp4
238.1 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Rodrigo Rubira Branco - Study of Malware Obfuscation Techniques.srt
89.4 kB
HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Shreeraj Shah - XSS & CSRF Strike Back -- Powered by HTML5.mp4
216.8 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T1 - Shreeraj Shah - XSS & CSRF Strike Back -- Powered by HTML5.srt
80.6 kB
HITB 2012 - Malaysia/#HITB2012KUL D2T2 - Fyodor Yarochkin - Messing Up the Kids Playground.mp4
267.2 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T2 - Fyodor Yarochkin - Messing Up the Kids Playground.srt
93.5 kB
HITB 2012 - Malaysia/#HITB2012KUL D2T2 - Jeremiah Grossman - Why Web Security is Fundamentally Broken.mp4
192.3 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T2 - Jeremiah Grossman - Why Web Security is Fundamentally Broken.srt
73.4 kB
HITB 2012 - Malaysia/#HITB2012KUL D2T2 - John Viega - Crypto for the Public Cloud.mp4
180.5 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T2 - John Viega - Crypto for the Public Cloud.srt
71.2 kB
HITB 2012 - Malaysia/#HITB2012KUL D2T2 - Saumil Shah - Innovative Approaches to Exploit Delivery.mp4
219.9 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T2 - Saumil Shah - Innovative Approaches to Exploit Delivery.srt
66.6 kB
HITB 2012 - Malaysia/#HITB2012KUL D2T3 - OPEN BOTTLE - Security Industry Panel Discussion.mp4
439.2 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Emmanuel Gadaix - Something MEGA.mp4
143.5 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Emmanuel Gadaix - Something MEGA.srt
56.1 kB
HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Felix FX Lindner - Hacking Huawei VRP.mp4
164.7 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Felix FX Lindner - Hacking Huawei VRP.srt
51.8 kB
HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Mikko Hypponen - Behind Enemy Lines.mp4
244.4 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Mikko Hypponen - Behind Enemy Lines.srt
80.7 kB
HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Stefano Zanero - Scalable Malware Analysis.mp4
282.4 MB
HITB 2012 - Malaysia/#HITB2012KUL D2T3 - Stefano Zanero - Scalable Malware Analysis.srt
75.1 kB
HITB 2013 - Amsterdam/#HITB2013AMS CLOSING KEYNOTE Winn Schwartau - The History of the Future of InfoSec.mp4
230.5 MB
HITB 2013 - Amsterdam/#HITB2013AMS CLOSING KEYNOTE Winn Schwartau - The History of the Future of InfoSec.srt
90.8 kB
HITB 2013 - Amsterdam/#HITB2013AMS Coverage on RSI Telegiornale (Italian).mp4
6.1 MB
HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Hugo Teso - Aircraft Hacking Practical Aero Series.mp4
189.5 MB
HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Hugo Teso - Aircraft Hacking Practical Aero Series.srt
97.5 kB
HITB 2013 - Amsterdam/#HITB2013AMS D1T1 P Uhley and K Raman - Security Response in the Age of Mass Customized Attacks.mp4
220.3 MB
HITB 2013 - Amsterdam/#HITB2013AMS D1T1 P Uhley and K Raman - Security Response in the Age of Mass Customized Attacks.srt
108.8 kB
HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Petko D Petkov - Defeating the Intercepting Web Proxy.mp4
231.8 MB
HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Petko D Petkov - Defeating the Intercepting Web Proxy.srt
100.7 kB
HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Sergey Bratus and Julian Bangert - Page Fault Liberation Army.mp4
262.4 MB
HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Sergey Bratus and Julian Bangert - Page Fault Liberation Army.srt
90.4 kB
HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.mp4
238.6 MB
HITB 2013 - Amsterdam/#HITB2013AMS D1T1 Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.srt
85.8 kB
HITB 2013 - Amsterdam/#HITB2013AMS D1T1 V. Vorontsov and A. Golovko - SSRF PWNs - New Techniques and Stories.mp4
168.8 MB
HITB 2013 - Amsterdam/#HITB2013AMS D1T1 V. Vorontsov and A. Golovko - SSRF PWNs - New Techniques and Stories.srt
59.5 kB
HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Daniel Mende - Paparazzi over IP.mp4
166.2 MB
HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Daniel Mende - Paparazzi over IP.srt
70.1 kB
HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Nicolas Seriot - Abusing Twitter s API and OAuth Implementation.mp4
150.4 MB
HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Nicolas Seriot - Abusing Twitter s API and OAuth Implementation.srt
52.4 kB
HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in MS Windows Kernel.mp4
175.7 MB
HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in MS Windows Kernel.srt
49.2 kB
HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Philippe Langlois - LTE Pwnage - Hacking Core Network Elements.mp4
229.3 MB
HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Philippe Langlois - LTE Pwnage - Hacking Core Network Elements.srt
75.5 kB
HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Tal Zeltzer - Analysis to Remote Root 0day in a SSL-VPN Appliance.mp4
184.0 MB
HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Tal Zeltzer - Analysis to Remote Root 0day in a SSL-VPN Appliance.srt
56.0 kB
HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.mp4
168.5 MB
HITB 2013 - Amsterdam/#HITB2013AMS D1T2 Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.srt
59.4 kB
HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.mp4
120.3 MB
HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.srt
40.4 kB
HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Evad3rs - Swiping Through Modern Security Features.mp4
198.1 MB
HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Evad3rs - Swiping Through Modern Security Features.srt
87.7 kB
HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Peter Geissler and Steven Ketelaar - How I Met Your Modem.mp4
173.4 MB
HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Peter Geissler and Steven Ketelaar - How I Met Your Modem.srt
71.3 kB
HITB 2013 - Amsterdam/#HITB2013AMS D2T1 S. Shekyan and A. Harutyunyan - Turning Your Surveillance Camera Against You.mp4
162.8 MB
HITB 2013 - Amsterdam/#HITB2013AMS D2T1 S. Shekyan and A. Harutyunyan - Turning Your Surveillance Camera Against You.srt
56.3 kB
HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Sebastien Kaczmarek - Dreamboot - A UEFI Bootkit.mp4
246.4 MB
HITB 2013 - Amsterdam/#HITB2013AMS D2T1 Sebastien Kaczmarek - Dreamboot - A UEFI Bootkit.srt
64.8 kB
HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Chilik Tamir - iNalyzer No More Blackbox iOS Analysis.mp4
234.6 MB
HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Dan Tentler - System Shock - The Shodan Computer Search Engine.mp4
168.9 MB
HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Ofer Shezaf - The Infosec Risks of Charging Electric Cars.mp4
213.1 MB
HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Ofer Shezaf - The Infosec Risks of Charging Electric Cars.srt
77.8 kB
HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Petukhov, Noseevich and Gamayunov - Breaking Certified Crypto in Banking Apps.mp4
178.7 MB
HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Petukhov, Noseevich and Gamayunov - Breaking Certified Crypto in Banking Apps.srt
52.6 kB
HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.mp4
128.0 MB
HITB 2013 - Amsterdam/#HITB2013AMS D2T2 Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.srt
56.4 kB
HITB 2013 - Amsterdam/#HITB2013AMS Evad3rs Press Briefing - 11th April 2013.mp4
115.5 MB
HITB 2013 - Amsterdam/#HITB2013AMS Evad3rs Press Briefing - 11th April 2013.srt
18.8 kB
HITB 2013 - Amsterdam/#HITB2013AMS KEYNOTE 1 E. Schwartz - Embracing the Uncertainty of Attacks with Big Data Analytics.mp4
234.2 MB
HITB 2013 - Amsterdam/#HITB2013AMS KEYNOTE 1 E. Schwartz - Embracing the Uncertainty of Attacks with Big Data Analytics.srt
95.1 kB
HITB 2013 - Amsterdam/#HITB2013AMS KEYNOTE 2 Bob Lord - Rethinking the Front Lines.mp4
229.3 MB
HITB 2013 - Amsterdam/#HITB2013AMS KEYNOTE 2 Bob Lord - Rethinking the Front Lines.srt
98.8 kB
HITB 2014 - Amsterdam/presentations/D1-LAB-Sniffing-the-Airwaves-with-RTL-SDR.pdf
6.2 MB
HITB 2014 - Amsterdam/presentations/D1T1-AIS-Exposed-New-Vulnerabilities-and-Attacks.pdf
4.5 MB
HITB 2014 - Amsterdam/presentations/D1T1-Compromise-as-a-Service-Our-PleAZURE.pdf
8.2 MB
HITB 2014 - Amsterdam/presentations/D1T1-Escaping-IE11-Enhanced-Protected-Mode.pdf
2.3 MB
HITB 2014 - Amsterdam/presentations/D1T1-Hacking-Your-Cable-TV-Network-Die-Hard-Style.pdf
39.2 MB
HITB 2014 - Amsterdam/presentations/D1T1-The-NSA-Playset.pdf
10.4 MB
HITB 2014 - Amsterdam/presentations/D1T1-Vulnerabilities-Exposed-at-the-Protocol-Level-in-TN3270-based-Applications.pdf
17.3 MB
HITB 2014 - Amsterdam/presentations/D1T2-Bypassing-Endpoint-Security-for-Fun-and-Profit.pdf
28.2 MB
HITB 2014 - Amsterdam/presentations/D1T2-More-Ways-to-Defeat-Secure-Boot.pdf
7.3 MB
HITB 2014 - Amsterdam/presentations/D1T2-REboot-Bootkits-Revisited.pdf
924.3 kB
HITB 2014 - Amsterdam/presentations/D1T2-State-of-the-Art-Exploring-the-New-Android-KitKat-Runtime.pdf
641.8 kB
HITB 2014 - Amsterdam/presentations/D1T3-Exploiting-NoSQL-Like-Never-Before.pdf
2.5 MB
HITB 2014 - Amsterdam/presentations/D1T3-XSSing-Your-Way-to-Shell.pdf
5.0 MB
HITB 2014 - Amsterdam/presentations/D2-LAB-Attack-Surface-Intelligence-of-Source-Code.pdf
12.5 MB
HITB 2014 - Amsterdam/presentations/D2T1-Alices-Adventures-in-Smart-Building-Land.pdf
7.2 MB
HITB 2014 - Amsterdam/presentations/D2T1-Exploiting-Passbook-to-Fly-for-Free.pdf
19.8 MB
HITB 2014 - Amsterdam/presentations/D2T1-G-Jacking-AppEngine-based-Applications.pdf
784.7 kB
HITB 2014 - Amsterdam/presentations/D2T1-GRX-and-a-Spy-Agency.pdf
7.7 MB
HITB 2014 - Amsterdam/presentations/D2T1-Why-Port-Scans-are-for-Pussies.pdf
2.4 MB
HITB 2014 - Amsterdam/presentations/D2T2-Bitcoin-Forensics-Fact-or-Fiction.pdf
24.7 MB
HITB 2014 - Amsterdam/presentations/D2T2-Breaking-Cloud-Isolation.pdf
1.1 MB
HITB 2014 - Amsterdam/presentations/D2T2-Exploring-and-Exploiting-iOS-Web-Browsers.pdf
2.8 MB
HITB 2014 - Amsterdam/presentations/D2T2-Shellcodes-for-ARM-Your-Pills-Dont-Work-on-Me-x86.pdf
4.3 MB
HITB 2014 - Amsterdam/presentations/D2T2-The-InSecurity-of-Pull-Printing-Solutions.pdf
4.2 MB
HITB 2014 - Amsterdam/presentations/D2T3-Exploit-Development-for-New-Platforms-Based-on-64-bits.pdf
74.1 kB
HITB 2014 - Amsterdam/presentations/D2T3-Format-Reverser-of-Data-Objects.pdf
23.0 MB
HITB 2014 - Amsterdam/presentations/D2T3-Using-Javascript-Security-Features-to-Kill-Itself.pdf
2.0 MB
HITB 2014 - Malaysia/#HITB2014KUL CLOSING KEYNOTE - Richard Thieme.mp4
238.0 MB
HITB 2014 - Malaysia/#HITB2014KUL CLOSING KEYNOTE - Richard Thieme.srt
81.4 kB
HITB 2016 - Amsterdam/#HITB2016AMS - D2T1 - Forging a Wireless Time Signal to Attack NTP Servers - Y. Zheng & H. Shan.mp4
69.0 MB
HITB 2016 - Amsterdam/#HITB2016AMS - The Women In Cyber Security Woman Of The Year 2016 Award Ceremony.mp4
75.1 MB
HITB 2016 - Amsterdam/#HITB2016AMS CLOSING KEYNOTE - Hardware Side Channels in Virtualized Environments - Sophia D Antoine.mp4
73.1 MB
HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track - CLOSING COMMENTS - Martin Knobloch.mp4
4.1 MB
HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D1 - Applying Regulatory Data to IoT RF Reverse Engineering - Marc Newlin.mp4
93.8 MB
HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D1 - Don t Feed The Hippos - Martin Knobloch.mp4
40.2 MB
HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D1 - Exploiting GLIBC Hacking Everything - Gal De Leon and Nadav Markus.mp4
96.4 MB
HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D1 - Pentesting Chatops - Melanie Rieback.mp4
71.1 MB
HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D1 - Unformation In The Era Of Hyperconnectivity - Elisabeth De Leeuw.mp4
41.9 MB
HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D2 - Anatomy Of An APT Attack - Paul Mason.mp4
60.7 MB
HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D2 - Facebook Presents Capture The Flag - Paul Marinescu.mp4
41.2 MB
HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D2 - Hack In The Class - Barry Fish van Kampen.mp4
36.8 MB
HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D2 - Inspeckage Android Package Inspector - Antonio Martins.mp4
52.7 MB
HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D2 - Park This! Yet Another Parking Meter Talk - Paul Moreno.mp4
48.0 MB
HITB 2016 - Amsterdam/#HITB2016AMS CommSec Track D2 - Where Malware Meets Murphy - Mattijs Van Ommeren.mp4
47.8 MB
HITB 2016 - Amsterdam/#HITB2016AMS D1T1 - Escape From The Docker KVM QEMU Machine - Shengping Wang and Xu Liu.mp4
51.1 MB
HITB 2016 - Amsterdam/#HITB2016AMS D1T1 - Exploit Kits Hunting The Hunters - Nick Biasini.mp4
90.8 MB
HITB 2016 - Amsterdam/#HITB2016AMS D1T1 - TeLeScope Peering Into The Depths Of TLS Traffic In Real Time - Radu Caragea.mp4
85.9 MB
HITB 2016 - Amsterdam/#HITB2016AMS D1T1 - Using The Observer Effect And Cyber Feng Shui - Jacob Torrey.mp4
82.8 MB
HITB 2016 - Amsterdam/#HITB2016AMS D1T1 - Virtualization System Vulnerability Discovery Framework - Tang Qinghao.mp4
74.2 MB
HITB 2016 - Amsterdam/#HITB2016AMS D1T1 Forcing A Targeted LTE Cellphone Into An Eavesdropping Network - Lin Huang.mp4
65.3 MB
HITB 2016 - Amsterdam/#HITB2016AMS D1T2 - Adaptive Android Kernel Live Patching - Tim Xia and Yulong Zhang.mp4
72.5 MB
HITB 2016 - Amsterdam/#HITB2016AMS D1T2 - CSP Oddities - Michele Spagnuolo and Lukas Weichselbaum.mp4
107.1 MB
HITB 2016 - Amsterdam/#HITB2016AMS D1T2 - Hardsploit Project - Yann Allain and Julien Moinard.mp4
107.1 MB
HITB 2016 - Amsterdam/#HITB2016AMS D1T2 - IRON HID Create Your Own Bad USB Device - Seunghun Han.mp4
69.7 MB
HITB 2016 - Amsterdam/#HITB2016AMS D1T2 - Kernel Exploit Hunting And Mitigation - Broderick Aquilino and Wayne Low.mp4
83.3 MB
HITB 2016 - Amsterdam/#HITB2016AMS D1T2 - Sandjacking Profiting From iOS Malware - Chilik Tamir.mp4
109.6 MB
HITB 2016 - Amsterdam/#HITB2016AMS D2T1 - Attacking Next Generation Firewalls Breaking PAN OS - Felix Wilhelm.mp4
97.6 MB
HITB 2016 - Amsterdam/#HITB2016AMS D2T1 - CANsee An Automobile Intrusion Detection System - Jun Li.mp4
108.0 MB
HITB 2016 - Amsterdam/#HITB2016AMS D2T1 - Cache Side Channel Attacks CPU Design As A Security Problem - Anders Fogh.mp4
91.2 MB
HITB 2016 - Amsterdam/#HITB2016AMS D2T1 - In Plain Sight The Perfect Exfiltration Technique - Itzik Kotler and Amit Klein.mp4
103.9 MB
HITB 2016 - Amsterdam/#HITB2016AMS D2T2 - Advanced Exploitation Xen Hypervisor VM Escape - Shangcong Luan.mp4
72.7 MB
HITB 2016 - Amsterdam/#HITB2016AMS D2T2 - Breaking Naive ESSID WPA2 Key Generation Algorithms - Peter Blasty Geissler.mp4
92.9 MB
HITB 2016 - Amsterdam/#HITB2016AMS D2T2 - Go Speed Tracer Guided Fuzzing - Richard Johnson.mp4
111.9 MB
HITB 2016 - Amsterdam/#HITB2016AMS D2T2 - New Methods For Exploiting ORM Injections - Mikhail Egorov and Sergey Soldatov.mp4
98.5 MB
HITB 2016 - Amsterdam/#HITB2016AMS D2T2 - Perf From Profiling To Kernel Exploiting - Wish Wu.mp4
61.9 MB
HITB 2016 - Amsterdam/#HITB2016AMS KEYNOTE 1 - Beyond FBI vs Apple What s Next For The Crypto Wars - John Adams.mp4
41.7 MB
HITB 2016 - Amsterdam/#HITB2016AMS KEYNOTE 2 - The Future Has Arrived And It s Effin Hilarious - Adam Laurie.mp4
101.8 MB
HITB 2016 - Amsterdam/#HITB2016AMS WELCOME ADDRESS - Patricia M Zorko.mp4
21.4 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG CLOSING KEYNOTE - Hacking in Song - Fabienne Serriere.mp4
77.6 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG CLOSING KEYNOTE - Hacking in Song - Fabienne Serriere.srt
27.3 kB
HITB 2016 - Singapore/#HITBGSEC 2016 SG CommSec Track D1 - Data Driven Software Security - Sweety Chauhan.mp4
125.9 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG CommSec Track D1- Halcyon - An IDE for Faster NSE Development - Sanoop Thomas.mp4
38.5 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG CommSec Track D2 - Copy-paste Vulnerabilities - Vanessa Henderson.mp4
30.5 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG CommSec Track D2 - Fake President Fraud Defrauded - Florian Lukavsky.mp4
39.8 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG CommSec Track D2 - IoT Honeypots - Tan Kean Siong.mp4
52.2 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG CommSec Track D2 - Local Privilege Escalation in 2016 - Paul Craig.mp4
39.7 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG CommSec Track D2 - Vulnerabilities and Ethics - Alfonso De Gregorio.mp4
49.7 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - A Next Generation Assembler Framework - Nguyen Anh Quynh.mp4
101.6 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - Attacking NVidia s Tegra Platform - Peter Pi.mp4
52.5 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - Attacking NVidia s Tegra Platform - Peter Pi.srt
24.1 kB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - Attacking Software Tokens - Bernhard Mueller.mp4
66.4 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - Stumping The Mobile Chipset - A. Donenfeld & Y. Mordekhay.mp4
73.1 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - Stumping The Mobile Chipset - A. Donenfeld & Y. Mordekhay.srt
51.4 kB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - The Apple Sandbox Deeper Into The Quagmire - Jonathan Levin.mp4
118.4 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - The Apple Sandbox Deeper Into The Quagmire - Jonathan Levin.srt
86.8 kB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D1 - Trust No One - O. Kochetova & A. Osipov.mp4
65.7 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - (Ab)using Smart Cities - Matteo Beccaro & Matteo Collura.mp4
64.6 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - (Ab)using Smart Cities - Matteo Beccaro & Matteo Collura.srt
39.8 kB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - Breaking Exploits - Shlomi Oberman & Ron Shina.mp4
88.3 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - Breaking Exploits - Shlomi Oberman & Ron Shina.srt
58.3 kB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - Fuzzing The Windows Kernel - Koh Yong Chuan.mp4
47.3 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - Look Mom! I Don t Use Shellcode - Moritz Jodeit.mp4
75.3 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - Look Mom! I Don t Use Shellcode - Moritz Jodeit.srt
61.0 kB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - iOS 10 Kernel Heap Revisited - Stefan Esser.mp4
105.5 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG Conference Track D2 - iOS 10 Kernel Heap Revisited - Stefan Esser.srt
78.7 kB
HITB 2016 - Singapore/#HITBGSEC 2016 SG KEYNOTE 1 - I Fight For The Users! The Prequel - Erin Jacobs.mp4
56.0 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG KEYNOTE 1 - I Fight For The Users! The Prequel - Erin Jacobs.srt
52.0 kB
HITB 2016 - Singapore/#HITBGSEC 2016 SG KEYNOTE 2 - Hacking The Pentagon - Katie Moussouris.mp4
81.8 MB
HITB 2016 - Singapore/#HITBGSEC 2016 SG KEYNOTE 2 - Hacking The Pentagon - Katie Moussouris.srt
65.8 kB
HITB 2016 - Singapore/#HITBGSEC Replicating a RSA SecurID Token Instance (RSA SecurID 2.0.4).mp4
598.5 kB
HITB 2016 - Singapore/#HITBGSEC Replicating a VASCO DIGIPASS Token Instance (DIGIPASS DEMO for Android 4.10.0).mp4
471.5 kB
HITB 2016 - Singapore/#HITBGSEC SG 2016 CommSec Track D1 - Reverse Engineering Swift Applications - Michael Gianarakis.mp4
43.6 MB
HITB 2016 - Singapore/#HITBGSEC SG 2016 CommSec Track D2 - Forensic Analysis of Android Banking Apps - Rajchada Chanajitt.mp4
38.1 MB
HITB 2017 - Amsterdam/#HITB2017AMS - Closing Ceremony - HITB Core Team.mp4
117.9 MB
HITB 2017 - Amsterdam/#HITB2017AMS - Closing Ceremony - HITB Core Team.srt
36.5 kB
HITB 2017 - Amsterdam/#HITB2017AMS CLOSING KEYNOTE - The ECMA And The Chakra - Natalie Silvanovich.mp4
242.6 MB
HITB 2017 - Amsterdam/#HITB2017AMS CLOSING KEYNOTE - The ECMA And The Chakra - Natalie Silvanovich.srt
89.1 kB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - A Passive Listing Ransomware Detector - Paulus Meessen and Don Mulders.mp4
67.3 MB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - A Passive Listing Ransomware Detector - Paulus Meessen and Don Mulders.srt
54.4 kB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - Breaking Apple's iCloud Keychain - Vladimir Katalov.mp4
82.8 MB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - Breaking Apple's iCloud Keychain - Vladimir Katalov.srt
83.0 kB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - Disarming EMET 5 52 - Niels Warnars.mp4
64.6 MB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - Exploiting Windows Automatic Wireless Association - George Chatzisofroniou.mp4
75.2 MB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - Exploiting Windows Automatic Wireless Association - George Chatzisofroniou.srt
62.4 kB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - Fault Injection Attacks On Secure Boot - Niek Timmers and Albert Spruyt.mp4
60.1 MB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - Fault Injection Attacks On Secure Boot - Niek Timmers and Albert Spruyt.srt
56.3 kB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - Low Cost Open Source Spectrum Monitoring - Dominic Spill.mp4
67.0 MB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - Low Cost Open Source Spectrum Monitoring - Dominic Spill.srt
68.7 kB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - Meet And Greet With The MacOs Malware Class Of 2016 - Patrick Wardle.mp4
62.7 MB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - Meet And Greet With The MacOs Malware Class Of 2016 - Patrick Wardle.srt
69.8 kB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - Pwning Banks How The Playground Evolved Over The Years - Miika Turkia.mp4
93.0 MB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - Pwning Banks How The Playground Evolved Over The Years - Miika Turkia.srt
69.1 kB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - So You Want To Hack Radios Matt Knight and Marc Newlin.mp4
119.4 MB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D1 - So You Want To Hack Radios Matt Knight and Marc Newlin.srt
190.9 kB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D2 - Intel DCI Secrets - Maxim Goryachy and Mark Ermolov.mp4
49.9 MB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D2 - Pwning ARM Debug Components - Muhammad Abdul Wahab (2).mp4
55.0 MB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D2 - Pwning ARM Debug Components - Muhammad Abdul Wahab (2).srt
71.2 kB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D2 - Unauthorized Erlang A Demonstration - Don Bailey (2).mp4
49.4 MB
HITB 2017 - Amsterdam/#HITB2017AMS COMMSEC D2 - Unauthorized Erlang A Demonstration - Don Bailey (2).srt
79.0 kB
HITB 2017 - Amsterdam/#HITB2017AMS D1T1 - A New RISC - Don Bailey.mp4
260.5 MB
HITB 2017 - Amsterdam/#HITB2017AMS D1T1 - A New RISC - Don Bailey.srt
115.2 kB
HITB 2017 - Amsterdam/#HITB2017AMS D1T1 - Drammer The Making Of - Victor van der Veen.mp4
246.8 MB
HITB 2017 - Amsterdam/#HITB2017AMS D1T1 - Drammer The Making Of - Victor van der Veen.srt
112.4 kB
HITB 2017 - Amsterdam/#HITB2017AMS D1T1 - Hacking Customer Information Control System - Ayoub Elaassal.mp4
234.0 MB
HITB 2017 - Amsterdam/#HITB2017AMS D1T1 - Hacking Customer Information Control System - Ayoub Elaassal.srt
124.6 kB
HITB 2017 - Amsterdam/#HITB2017AMS D1T1 - Harnessing Intel Processor Trace On Windows For Vuln Discovery - Richard Johnson.mp4
213.5 MB
HITB 2017 - Amsterdam/#HITB2017AMS D1T1 - Harnessing Intel Processor Trace On Windows For Vuln Discovery - Richard Johnson.srt
118.2 kB
HITB 2017 - Amsterdam/#HITB2017AMS D1T1 - I Got 99 Trends And A # Is All Of Them! Steven Seeley and Roberto Suggi Liverani.mp4
494.9 MB
HITB 2017 - Amsterdam/#HITB2017AMS D1T1 - I Got 99 Trends And A # Is All Of Them! Steven Seeley and Roberto Suggi Liverani.srt
147.7 kB
HITB 2017 - Amsterdam/#HITB2017AMS D1T1 - We Broke All CSPs And You Won't Believe What Happened - Spagnuolo & Weichselbaum.mp4
231.6 MB
HITB 2017 - Amsterdam/#HITB2017AMS D1T1 - We Broke All CSPs And You Won't Believe What Happened - Spagnuolo & Weichselbaum.srt
110.4 kB
HITB 2017 - Amsterdam/#HITB2017AMS D1T2 - Can't Touch This Cloning Any Android HCE Contactless Card - Slawomir Jasek.mp4
333.4 MB
HITB 2017 - Amsterdam/#HITB2017AMS D1T2 - Can't Touch This Cloning Any Android HCE Contactless Card - Slawomir Jasek.srt
104.2 kB
HITB 2017 - Amsterdam/#HITB2017AMS D1T2 - Most Impressive A Guide To Key Impressioning Attacks - Jos Weyers.mp4
309.2 MB
HITB 2017 - Amsterdam/#HITB2017AMS D1T2 - Most Impressive A Guide To Key Impressioning Attacks - Jos Weyers.srt
89.1 kB
HITB 2017 - Amsterdam/#HITB2017AMS D1T2 - Shadow Box The Practical And Omnipotent Sandbox - Seunghun Han.mp4
228.2 MB
HITB 2017 - Amsterdam/#HITB2017AMS D1T2 - Shadow Box The Practical And Omnipotent Sandbox - Seunghun Han.srt
70.1 kB
HITB 2017 - Amsterdam/#HITB2017AMS D1T2 - Side Channel Attacks Against iOS Crypto Libraries And More - Najwa Aaraj.mp4
162.8 MB
HITB 2017 - Amsterdam/#HITB2017AMS D1T2 - The Secret Of Chakracore 10 Ways To Go Beyond The Edge - Linan Hao and Long Liu.mp4
469.2 MB
HITB 2017 - Amsterdam/#HITB2017AMS D2T1 - Bootstrapping Systems With Open Source Firmware - Trammell Hudson.mp4
200.4 MB
HITB 2017 - Amsterdam/#HITB2017AMS D2T1 - Bootstrapping Systems With Open Source Firmware - Trammell Hudson.srt
71.4 kB
HITB 2017 - Amsterdam/#HITB2017AMS D2T1 - Everybody Wants SOME Advance Same Origin Method Execution - Ben Hayak.srt
147.8 kB
HITB 2017 - Amsterdam/#HITB2017AMS D2T1 - Hunting For Vulnerabilities In Signal - Markus Vervier.mp4
200.0 MB
HITB 2017 - Amsterdam/#HITB2017AMS D2T1 - Hunting For Vulnerabilities In Signal - Markus Vervier.srt
71.2 kB
HITB 2017 - Amsterdam/#HITB2017AMS D2T1 - Oversight Exposing Spies On MacOS - Patrick Wardle.mp4
427.8 MB
HITB 2017 - Amsterdam/#HITB2017AMS D2T1 - Oversight Exposing Spies On MacOS - Patrick Wardle.srt
133.3 kB
HITB 2017 - Amsterdam/#HITB2017AMS D2T1 - Vulnerabilities In Android Password Managers - Huber, Arzt & Rasthofer.mp4
190.8 MB
HITB 2017 - Amsterdam/#HITB2017AMS D2T1 - Vulnerabilities In Android Password Managers - Huber, Arzt & Rasthofer.srt
85.5 kB
HITB 2017 - Amsterdam/#HITB2017AMS D2T2 - Bypassing Memory Mitigations Using Data Only Exploitation Techniques - Bing Sun.mp4
345.9 MB
HITB 2017 - Amsterdam/#HITB2017AMS D2T2 - Bypassing Memory Mitigations Using Data Only Exploitation Techniques - Bing Sun.srt
89.7 kB
HITB 2017 - Amsterdam/#HITB2017AMS D2T2 - Chasing Cars Keyless Entry System Attacks - Yingtao Zeng, Qing Yang and Jun Li.mp4
277.1 MB
HITB 2017 - Amsterdam/#HITB2017AMS D2T2 - Chasing Cars Keyless Entry System Attacks - Yingtao Zeng, Qing Yang and Jun Li.srt
97.2 kB
HITB 2017 - Amsterdam/#HITB2017AMS D2T2 - Hacking Medical Devices And Healthcare Infrastructure - Anirudh Duggal.mp4
208.7 MB
HITB 2017 - Amsterdam/#HITB2017AMS D2T2 - In Depth Analysis Of Multicast DNS And DNS Service Discovery - Antonios Atlasis.mp4
210.8 MB
HITB 2017 - Amsterdam/#HITB2017AMS D2T2 - The Best Laid Schemes Attacking URL Schemes - Yu Hong.mp4
192.3 MB
HITB 2017 - Amsterdam/#HITB2017AMS KEYNOTE 1 - Redefining Defense - Saumil Shah.mp4
222.5 MB
HITB 2017 - Amsterdam/#HITB2017AMS KEYNOTE 1 - Redefining Defense - Saumil Shah.srt
83.2 kB
HITB 2017 - Amsterdam/#HITB2017AMS KEYNOTE 2 - All Fall Down Interdependencies In The Cloud - Window Snyder.mp4
73.1 MB
HITB 2017 - Amsterdam/#HITB2017AMS KEYNOTE 2 - All Fall Down Interdependencies In The Cloud - Window Snyder.srt
30.6 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CLOSING KEYNOTE - A Spin Around The Block 13 Years Of Infosec Challenges - Kelly Lum.mp4
72.2 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CLOSING KEYNOTE - A Spin Around The Block 13 Years Of Infosec Challenges - Kelly Lum.srt
107.6 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D1 - Automotive Security Assessment Techniques And Tools - Keisuke Hirata.mp4
36.3 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D1 - Automotive Security Assessment Techniques And Tools - Keisuke Hirata.srt
52.4 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger.mp4
62.0 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger.srt
77.3 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D1 - Hacking Robots Before Skynet - Lucas Apa and Cesar Cerrudo.mp4
109.0 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D1 - Hadoop Safari Hunting For Vulnerabilities - T. Debize and M. Braik.mp4
82.8 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D1 - Hadoop Safari Hunting For Vulnerabilities - T. Debize and M. Braik.srt
113.8 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D1 - Insecurity In 2017 0 Days Are The Least Of Our Problems - Nick Biasini.mp4
102.0 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D1 - Insecurity In 2017 0 Days Are The Least Of Our Problems - Nick Biasini.srt
146.1 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D1 - The Original Elevat0r History Of A Private Jailbreak - Stefan Esser.mp4
87.5 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D1 - The Original Elevat0r History Of A Private Jailbreak - Stefan Esser.srt
114.1 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D1 - Threat Hunting 101 Become The Hunter - Hamza Beghal.mp4
43.4 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D1 - Threat Hunting 101 Become The Hunter - Hamza Beghal.srt
95.9 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - 200+ Vulnerabilities In Android Phones - B. Guangdong & Z. Qing.mp4
45.7 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - 200+ Vulnerabilities In Android Phones - B. Guangdong & Z. Qing.srt
46.3 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - 2FAssassin Bypass 2FA, Stealing Private Keys, And More - Maxwell Koh.mp4
47.0 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - 2FAssassin Bypass 2FA, Stealing Private Keys, And More - Maxwell Koh.srt
65.6 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - Facebook The Deep & Dark Web For Threat Actors In Asia - Fadli Sidek.mp4
56.8 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - Facebook The Deep & Dark Web For Threat Actors In Asia - Fadli Sidek.srt
91.9 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - Growing Network Security Specialists For Our Enterprise - Xinhua Cai.mp4
29.7 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - Growing Network Security Specialists For Our Enterprise - Xinhua Cai.srt
48.2 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - Intelligence And Counterintelligence Techniques - J. Hesse & K. Ranjan.mp4
81.5 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - Intelligence And Counterintelligence Techniques - J. Hesse & K. Ranjan.srt
127.2 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - It’s Friday Evening Professor Moriarty - Nicolas Collery.mp4
57.9 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - It’s Friday Evening Professor Moriarty - Nicolas Collery.srt
63.4 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - Searching For A Needle In A Remote Haystack - Vitaly Kamluk & Wayne Lee.mp4
55.3 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - Searching For A Needle In A Remote Haystack - Vitaly Kamluk & Wayne Lee.srt
80.7 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - Stealing PLC Intellectual Property A Red Teaming Story - Matteo Beccaro.mp4
42.4 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - Stealing PLC Intellectual Property A Red Teaming Story - Matteo Beccaro.srt
71.7 kB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - Unstructured Data Is The New Gold ML + NLP Is The New Shiz - J. Geovedi.mp4
66.4 MB
HITB 2017 - Singapore/#HITBGSEC 2017 CommSec D2 - Unstructured Data Is The New Gold ML + NLP Is The New Shiz - J. Geovedi.srt
92.1 kB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D1 - A Year In The Red - Dominic Chell & Vincent Yiu.mp4
69.5 MB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D1 - A Year In The Red - Dominic Chell & Vincent Yiu.srt
138.5 kB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D1 - Get To The Money Hacking PoS And PoP Systems - D. Chastuhin & V. Egorov.mp4
84.4 MB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D1 - Get To The Money Hacking PoS And PoP Systems - D. Chastuhin & V. Egorov.srt
103.3 kB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D1 - How We Broke Intel Amt - A. Ermolov, D. Evdokimov & M. Malyutin.mp4
55.2 MB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D1 - How We Broke Intel Amt - A. Ermolov, D. Evdokimov & M. Malyutin.srt
74.2 kB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D1 - Spy Vs Spy A Modern Study Of Microphone Bugs - V. Valeros & S. Garcia.mp4
108.5 MB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D1 - Spy Vs Spy A Modern Study Of Microphone Bugs - V. Valeros & S. Garcia.srt
144.7 kB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D2 - Neuralfuzz Neural Networks For Fuzzing Web Apps - Ivan Novikov.mp4
90.8 MB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D2 - Neuralfuzz Neural Networks For Fuzzing Web Apps - Ivan Novikov.srt
131.3 kB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D2 - QEMU Attack Surface And Security Internals - Qiang Li & ZhiBin Hu.mp4
36.9 MB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D2 - Radio Exploitation 101 - Matt Knight & Marc Newlin.mp4
94.0 MB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D2 - Radio Exploitation 101 - Matt Knight & Marc Newlin.srt
153.8 kB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D2 - Rootten Apples Vulnerability Heaven In The iOS Sandbox - Adam Donenfeld.mp4
89.5 MB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D2 - Rootten Apples Vulnerability Heaven In The iOS Sandbox - Adam Donenfeld.srt
109.0 kB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D2 - XFLTReaT A New Dimension In Tunnelling - Balazs Bucsay.mp4
94.7 MB
HITB 2017 - Singapore/#HITBGSEC 2017 Conf D2 - XFLTReaT A New Dimension In Tunnelling - Balazs Bucsay.srt
133.8 kB
HITB 2017 - Singapore/#HITBGSEC 2017 KEYNOTE 1 - Finding Vulns And Malware In Open Source Code At Scale - Mark Curphey.mp4
119.0 MB
HITB 2017 - Singapore/#HITBGSEC 2017 KEYNOTE 1 - Finding Vulns And Malware In Open Source Code At Scale - Mark Curphey.srt
180.4 kB
HITB 2017 - Singapore/#HITBGSEC 2017 KEYNOTE D2 - The State Of Cyber - George Kurtz.mp4
72.9 MB
HITB 2017 - Singapore/#HITBGSEC 2017 KEYNOTE D2 - The State Of Cyber - George Kurtz.srt
146.0 kB
HITB 2017 - Singapore/#HITBGSEC 2017 SG Conf D1 - A New Era Of SSRF - Exploiting Url Parsers - Orange Tsai.mp4
67.9 MB
HITB 2017 - Singapore/#HITBGSEC 2017 SG Conf D1 - A New Era Of SSRF - Exploiting Url Parsers - Orange Tsai.srt
84.3 kB
HITB 2017 - Singapore/#HITBGSEC 2017 Smart Cities Panel Discussion with M. Curphey, C. Cerrudo, E. Schwartz & M. Beccaro.mp4
97.7 MB
HITB 2017 - Singapore/#HITBGSEC 2017 Smart Cities Panel Discussion with M. Curphey, C. Cerrudo, E. Schwartz & M. Beccaro.srt
188.8 kB
HITB 2017 - Singapore/#HITBGSEC 2017 WELCOME ADDRESS - IoT - A Security Hole Without A Patch - Earl Carter.mp4
21.1 MB
HITB 2017 - Singapore/#HITBGSEC 2017 WELCOME ADDRESS - IoT - A Security Hole Without A Patch - Earl Carter.srt
42.7 kB
HITB 2018 - Amsterdam/#HITB2018AMS CLOSING KEYNOTE - Security is What We Make of It - Blockchain and Beyond - Amber Baldet.en.transcribed.srt
163.3 kB
HITB 2018 - Amsterdam/#HITB2018AMS CLOSING KEYNOTE - Security is What We Make of It - Blockchain and Beyond - Amber Baldet.mp4
93.5 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - A Deep Dive Into Malicious Documents - Josh Stroschein.en.transcribed.srt
82.1 kB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - A Deep Dive Into Malicious Documents - Josh Stroschein.mp4
71.8 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - An Isolated Data Center Security Policy Model Using SmartNICs - Ofir Arkin.en.transcribed.srt
136.3 kB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - An Isolated Data Center Security Policy Model Using SmartNICs - Ofir Arkin.mp4
133.3 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - Attacking IoT Speakers - Stephen Hilt.en.transcribed.srt
77.8 kB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - Attacking IoT Speakers - Stephen Hilt.mp4
64.9 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - Behaviors and Patterns of Rogue Hosting Providers - D. Mahjoub & S. Brown.en.transcribed.srt
112.2 kB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - Behaviors and Patterns of Rogue Hosting Providers - D. Mahjoub & S. Brown.mp4
73.5 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - Faster, Wider, Greater Modern Pentest Tricks - Thomas Debize.en.transcribed.srt
78.7 kB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - Faster, Wider, Greater Modern Pentest Tricks - Thomas Debize.mp4
105.5 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - How to Find and Exploit Bugs in IoT Devices - Kelvin Wong.en.transcribed.srt
51.2 kB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - How to Find and Exploit Bugs in IoT Devices - Kelvin Wong.mp4
64.8 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - Keynterceptor Press Any Key to Continue - Niels van Dijkhuizen.en.transcribed.srt
53.6 kB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - Keynterceptor Press Any Key to Continue - Niels van Dijkhuizen.mp4
56.2 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - Steganography Ante Portas - Steffen Wendzel.en.transcribed.srt
71.2 kB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - Steganography Ante Portas - Steffen Wendzel.mp4
150.7 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - The Life & Death of Kernel Object Abuse - Salf ElSherei & Ian Kronquist.en.transcribed.srt
112.4 kB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D1 - The Life & Death of Kernel Object Abuse - Salf ElSherei & Ian Kronquist.mp4
175.8 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D2 - Automatic Generation of ROP Chains - Ricardo. J. Rodríguez & Daniel Uroz.en.transcribed.srt
77.8 kB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D2 - Automatic Generation of ROP Chains - Ricardo. J. Rodríguez & Daniel Uroz.mp4
94.6 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D2 - Hacking a Hospital for Fun and Profit - Asaf Cohen & Ofir Kamil.en.transcribed.srt
70.7 kB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D2 - Hacking a Hospital for Fun and Profit - Asaf Cohen & Ofir Kamil.mp4
79.5 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D2 - Hiding Tasks via Hardware Task Switching - Kyeong Joo Jung.en.transcribed.srt
48.4 kB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D2 - Hiding Tasks via Hardware Task Switching - Kyeong Joo Jung.mp4
62.0 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D2 - ProdSec A Technical Approach - Jeremy Brown.en.transcribed.srt
107.8 kB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D2 - ProdSec A Technical Approach - Jeremy Brown.mp4
80.2 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D2 - PyREBox Making Dynamic Instrumentation Great Again - X. Ugarte-Pedrero.mp4
125.1 MB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D2 - Smart Contract (In)Security - Ben Schmidt.en.transcribed.srt
59.9 kB
HITB 2018 - Amsterdam/#HITB2018AMS CommSec D2 - Smart Contract (In)Security - Ben Schmidt.mp4
60.7 MB
HITB 2018 - Amsterdam/#HITB2018AMS D1T1 - Abusing The Travel Industry - V. Kropotov, F. Yarochkin, M. Fuentes & L. Gu.en.transcribed.srt
90.9 kB
HITB 2018 - Amsterdam/#HITB2018AMS D1T1 - Abusing The Travel Industry - V. Kropotov, F. Yarochkin, M. Fuentes & L. Gu.mp4
110.6 MB
HITB 2018 - Amsterdam/#HITB2018AMS D1T1 - Brida When Burp Suite meets Frida - Federico Dotta & Piergiovanni Cipolloni.mp4
131.3 MB
HITB 2018 - Amsterdam/#HITB2018AMS D1T1 - Covert Data Exfiltration Channel - Hongjian Cao, Kunzhe Chai & Jun Li.en.transcribed.srt
53.7 kB
HITB 2018 - Amsterdam/#HITB2018AMS D1T1 - Covert Data Exfiltration Channel - Hongjian Cao, Kunzhe Chai & Jun Li.mp4
77.0 MB
HITB 2018 - Amsterdam/#HITB2018AMS D1T1 - Fuzzing Javascript Engines for Fun and Pwnage - Areum Lee & Jeonghoon Shin.en.transcribed.srt
55.6 kB
HITB 2018 - Amsterdam/#HITB2018AMS D1T1 - Fuzzing Javascript Engines for Fun and Pwnage - Areum Lee & Jeonghoon Shin.mp4
54.9 MB
HITB 2018 - Amsterdam/#HITB2018AMS D1T1 - How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers - X. Bai & M. Zheng.en.transcribed.srt
85.5 kB
HITB 2018 - Amsterdam/#HITB2018AMS D1T1 - How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers - X. Bai & M. Zheng.mp4
104.0 MB
HITB 2018 - Amsterdam/#HITB2018AMS D1T1 - Real World Attacks Against Secure Elements - Don Bailey.en.transcribed.srt
158.9 kB
HITB 2018 - Amsterdam/#HITB2018AMS D1T1 - Real World Attacks Against Secure Elements - Don Bailey.mp4
112.5 MB
HITB 2018 - Amsterdam/#HITB2018AMS D1T2 - Applying Machine Learning to User Behavior Anomaly Analysis - Eugene Neyolov.en.transcribed.srt
126.0 kB
HITB 2018 - Amsterdam/#HITB2018AMS D1T2 - Applying Machine Learning to User Behavior Anomaly Analysis - Eugene Neyolov.mp4
147.2 MB
HITB 2018 - Amsterdam/#HITB2018AMS D1T2 - Attacking Microsoft’s .NET Framework Through CLR - Yu Hong & Shikang Xing.en.transcribed.srt
83.6 kB
HITB 2018 - Amsterdam/#HITB2018AMS D1T2 - Attacking Microsoft’s .NET Framework Through CLR - Yu Hong & Shikang Xing.mp4
131.7 MB
HITB 2018 - Amsterdam/#HITB2018AMS D1T2 - Pwning KNX & ZigBee Networks - HuiYu Wu, YuXiang Li & Yong Yang.en.transcribed.srt
82.0 kB
HITB 2018 - Amsterdam/#HITB2018AMS D1T2 - Pwning KNX & ZigBee Networks - HuiYu Wu, YuXiang Li & Yong Yang.mp4
96.1 MB
HITB 2018 - Amsterdam/#HITB2018AMS D1T2 - Rooting Android 8 with a Kernel Space Mirroring Attack - Yong Wang & Yang Song.en.transcribed.srt
81.7 kB
HITB 2018 - Amsterdam/#HITB2018AMS D1T2 - Rooting Android 8 with a Kernel Space Mirroring Attack - Yong Wang & Yang Song.mp4
85.1 MB
HITB 2018 - Amsterdam/#HITB2018AMS D1T2 - Smashing Ethereum Smart Contracts for Fun and ACTUAL Profit - Bernhard Mueller.mp4
105.2 MB
HITB 2018 - Amsterdam/#HITB2018AMS D1T2 - Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) - Daniel Bohannon.en.transcribed.srt
212.6 kB
HITB 2018 - Amsterdam/#HITB2018AMS D1T2 - Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) - Daniel Bohannon.mp4
139.1 MB
HITB 2018 - Amsterdam/#HITB2018AMS D2T1 - Backdooring & Remotely Controlling Cars - Sheila A. Berta & Claudio Carraciolo.en.transcribed.srt
82.0 kB
HITB 2018 - Amsterdam/#HITB2018AMS D2T1 - Backdooring & Remotely Controlling Cars - Sheila A. Berta & Claudio Carraciolo.mp4
91.0 MB
HITB 2018 - Amsterdam/#HITB2018AMS D2T1 - Establishing Covert Channels By Abusing GSM AT Commands - A. Munoz & J. C. Saez.en.transcribed.srt
103.9 kB
HITB 2018 - Amsterdam/#HITB2018AMS D2T1 - Establishing Covert Channels By Abusing GSM AT Commands - A. Munoz & J. C. Saez.mp4
107.9 MB
HITB 2018 - Amsterdam/#HITB2018AMS D2T1 - Expanding Your WMI Lateral Movement Arsenal - Philip Tsukerman.en.transcribed.srt
89.6 kB
HITB 2018 - Amsterdam/#HITB2018AMS D2T1 - Expanding Your WMI Lateral Movement Arsenal - Philip Tsukerman.mp4
77.0 MB
HITB 2018 - Amsterdam/#HITB2018AMS D2T1 - Sandbox Evasion Using VBA Referencing - Aviv Grafi & Amit Dori.en.transcribed.srt
104.5 kB
HITB 2018 - Amsterdam/#HITB2018AMS D2T1 - Sandbox Evasion Using VBA Referencing - Aviv Grafi & Amit Dori.mp4
63.1 MB
HITB 2018 - Amsterdam/#HITB2018AMS D2T1 - Uncovering the Android Patch Gap - Karsten Nohl & Jakob Lell.en.transcribed.srt
134.1 kB
HITB 2018 - Amsterdam/#HITB2018AMS D2T1 - Uncovering the Android Patch Gap - Karsten Nohl & Jakob Lell.mp4
113.9 MB
HITB 2018 - Amsterdam/#HITB2018AMS D2T2 - A New Fuzzing Method for Android - Zhang Qing & Bai Guangdong.en.transcribed.srt
31.0 kB
HITB 2018 - Amsterdam/#HITB2018AMS D2T2 - A New Fuzzing Method for Android - Zhang Qing & Bai Guangdong.mp4
36.8 MB
HITB 2018 - Amsterdam/#HITB2018AMS D2T2 - Defense-in-Depth Techniques for Modern Web Apps - M. Spagnuolo & L. Weichselbaum.en.transcribed.srt
114.3 kB
HITB 2018 - Amsterdam/#HITB2018AMS D2T2 - Defense-in-Depth Techniques for Modern Web Apps - M. Spagnuolo & L. Weichselbaum.mp4
95.8 MB
HITB 2018 - Amsterdam/#HITB2018AMS D2T2 - Exposing Hidden Exploitable Behaviors Using EDF - Fernando Arnaboldi.en.transcribed.srt
135.4 kB
HITB 2018 - Amsterdam/#HITB2018AMS D2T2 - Exposing Hidden Exploitable Behaviors Using EDF - Fernando Arnaboldi.mp4
110.5 MB
HITB 2018 - Amsterdam/#HITB2018AMS D2T2 - Mallet Towards a Generic Intercepting Proxy - Rogan Dawes.en.transcribed.srt
126.8 kB
HITB 2018 - Amsterdam/#HITB2018AMS D2T2 - Mallet Towards a Generic Intercepting Proxy - Rogan Dawes.mp4
113.3 MB
HITB 2018 - Amsterdam/#HITB2018AMS D2T2 - Over The Edge Pwning The Windows Kernel - Rancho Han.en.transcribed.srt
56.7 kB
HITB 2018 - Amsterdam/#HITB2018AMS D2T2 - Over The Edge Pwning The Windows Kernel - Rancho Han.mp4
72.7 MB
HITB 2018 - Amsterdam/#HITB2018AMS KEYNOTE 1 The Future, The Past, and … Wait, Where the Hell are We Now - M. Marschalek.en.transcribed.srt
157.9 kB
HITB 2018 - Amsterdam/#HITB2018AMS KEYNOTE 1 The Future, The Past, and … Wait, Where the Hell are We Now - M. Marschalek.mp4
120.5 MB
HITB 2018 - Amsterdam/#HITB2018AMS KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio.en.transcribed.srt
120.3 kB
HITB 2018 - Amsterdam/#HITB2018AMS KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio.mp4
87.5 MB
HITB 2018 - Amsterdam/#HITB2018AMS Welcome Address Improving Incentives for Cybersecurity - Michel van Eeten.mp4
59.3 MB
Hack in the Box thank you.txt
770 Bytes
hitb logo.png
29.6 kB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>