/events/HitB/hitb-2014-amsterdam/praatjes/
File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
D1-LAB-Sniffing-the-Airwaves-with-RTL-SDR.pdf 6M2014-May-29 14:46
D1T1-AIS-Exposed-New-Vulnerabilities-and-Attack..> 4M2014-May-29 12:37
D1T1-Compromise-as-a-Service-Our-PleAZURE.pdf 8M2014-May-29 16:52
D1T1-Escaping-IE11-Enhanced-Protected-Mode.pdf 2M2014-May-29 15:26
D1T1-Hacking-Your-Cable-TV-Network-Die-Hard-Sty..> 37M2014-May-29 14:28
D1T1-The-NSA-Playset.pdf 10M2014-May-29 12:30
D1T1-Vulnerabilities-Exposed-at-the-Protocol-Le..> 17M2014-May-29 10:29
D1T2-Bypassing-Endpoint-Security-for-Fun-and-Pr..> 27M2014-May-29 13:44
D1T2-More-Ways-to-Defeat-Secure-Boot.pdf 7M2014-May-29 09:10
D1T2-REboot-Bootkits-Revisited.pdf 903K2014-May-29 16:47
D1T2-State-of-the-Art-Exploring-the-New-Android..> 627K2014-May-29 12:31
D1T3-Exploiting-NoSQL-Like-Never-Before.pdf 2M2014-May-29 15:27
D1T3-XSSing-Your-Way-to-Shell.pdf 5M2014-May-29 12:18
D2-LAB-Attack-Surface-Intelligence-of-Source-Co..> 12M2014-May-30 13:38
D2T1-Alices-Adventures-in-Smart-Building-Land.pdf 7M2014-May-30 09:18
D2T1-Exploiting-Passbook-to-Fly-for-Free.pdf 19M2014-May-30 13:41
D2T1-G-Jacking-AppEngine-based-Applications.pdf 766K2014-May-30 15:09
D2T1-GRX-and-a-Spy-Agency.pdf 7M2014-Jun-02 14:37
D2T1-Why-Port-Scans-are-for-Pussies.pdf 2M2014-May-30 11:07
D2T2-Bitcoin-Forensics-Fact-or-Fiction.pdf 24M2014-May-30 11:19
D2T2-Breaking-Cloud-Isolation.pdf 1M2014-May-30 12:22
D2T2-Exploring-and-Exploiting-iOS-Web-Browsers.pdf 3M2014-May-30 09:18
D2T2-Shellcodes-for-ARM-Your-Pills-Dont-Work-on..> 4M2014-May-30 15:27
D2T2-The-InSecurity-of-Pull-Printing-Solutions.pdf 4M2014-May-30 13:38
D2T3-Exploit-Development-for-New-Platforms-Base..> 72K2014-May-30 09:52
D2T3-Format-Reverser-of-Data-Objects.pdf 22M2014-May-30 15:09
D2T3-Using-Javascript-Security-Features-to-Kill..> 2M2014-May-30 11:09