Index of /events/HitB/hitb-2014-amsterdam/praatjes/
../
D1-LAB-Sniffing-the-Airwaves-with-RTL-SDR.pdf 29-May-2014 14:46 6235821
D1T1-AIS-Exposed-New-Vulnerabilities-and-Attack..> 29-May-2014 12:37 4524136
D1T1-Compromise-as-a-Service-Our-PleAZURE.pdf 29-May-2014 16:52 8171541
D1T1-Escaping-IE11-Enhanced-Protected-Mode.pdf 29-May-2014 15:26 2337736
D1T1-Hacking-Your-Cable-TV-Network-Die-Hard-Sty..> 29-May-2014 14:28 39208234
D1T1-The-NSA-Playset.pdf 29-May-2014 12:30 10445121
D1T1-Vulnerabilities-Exposed-at-the-Protocol-Le..> 29-May-2014 10:29 17336241
D1T2-Bypassing-Endpoint-Security-for-Fun-and-Pr..> 29-May-2014 13:44 28197430
D1T2-More-Ways-to-Defeat-Secure-Boot.pdf 29-May-2014 09:10 7268828
D1T2-REboot-Bootkits-Revisited.pdf 29-May-2014 16:47 924258
D1T2-State-of-the-Art-Exploring-the-New-Android..> 29-May-2014 12:31 641841
D1T3-Exploiting-NoSQL-Like-Never-Before.pdf 29-May-2014 15:27 2531865
D1T3-XSSing-Your-Way-to-Shell.pdf 29-May-2014 12:18 4951567
D2-LAB-Attack-Surface-Intelligence-of-Source-Co..> 30-May-2014 13:38 12459641
D2T1-Alices-Adventures-in-Smart-Building-Land.pdf 30-May-2014 09:18 7219993
D2T1-Exploiting-Passbook-to-Fly-for-Free.pdf 30-May-2014 13:41 19811699
D2T1-G-Jacking-AppEngine-based-Applications.pdf 30-May-2014 15:09 784667
D2T1-GRX-and-a-Spy-Agency.pdf 02-Jun-2014 14:37 7653338
D2T1-Why-Port-Scans-are-for-Pussies.pdf 30-May-2014 11:07 2357215
D2T2-Bitcoin-Forensics-Fact-or-Fiction.pdf 30-May-2014 11:19 24733820
D2T2-Breaking-Cloud-Isolation.pdf 30-May-2014 12:22 1083821
D2T2-Exploring-and-Exploiting-iOS-Web-Browsers.pdf 30-May-2014 09:18 2797997
D2T2-Shellcodes-for-ARM-Your-Pills-Dont-Work-on..> 30-May-2014 15:27 4300412
D2T2-The-InSecurity-of-Pull-Printing-Solutions.pdf 30-May-2014 13:38 4171987
D2T3-Exploit-Development-for-New-Platforms-Base..> 30-May-2014 09:52 74052
D2T3-Format-Reverser-of-Data-Objects.pdf 30-May-2014 15:09 22962407
D2T3-Using-Javascript-Security-Features-to-Kill..> 30-May-2014 11:09 1986068