Hack in the Box 2016 Presentation PDFs

[   ] CLOSING KEYNOTE – Sophia D Antoine – Hardware Side Channels in Virtualized Environments.pdf 2016-05-27 18:40 2.3M
[   ] D1 COMMSEC – Elisabeth de Leeuw – Unformation in the Era of Hyper Connectivity.pdf 2016-05-26 18:03 2.5M
[   ] D1 COMMSEC – Marc Newlin – Applying Regulatory Data to IoT RF Reverse Engineering.pdf 2016-05-26 15:59 5.7M
[   ] D1 COMMSEC – Martin Knobloch – Don’t Feed the Hippos.pdf 2016-05-26 16:00 18M
[   ] D1 COMMSEC – Melanie Rieback – Pentesting ChatOps.pdf 2016-05-30 10:06 3.4M
[   ] D1 COMMSEC – Nadav Markus and Gal De Leon – Exploiting GLIBC – Hacking Everything.pdf 2016-05-26 18:18 1.0M
[   ] D1T1 – Jacob Torrey – Using the Observer Effect and Cyber Fengshui.pdf 2016-05-26 15:37 4.9M
[   ] D1T1 – Lin Huang – Forcing a Targeted LTE Cellphone into an Eavesdropping Network.pdf 2016-05-26 18:00 1.7M
[   ] D1T1 – Nick Biasini – Exploit Kits – Hunting the Hunters .pdf 2016-05-26 17:05 45M
[   ] D1T1 – Radu Caragea – Peering into the Depths of TLS Traffic in Real Time.pdf 2016-05-26 15:09 1.1M
[   ] D1T1 – Shengping Wang and Xu Liu – Escape From The Docker-KVM-QEMU Machine.pdf 2016-05-26 12:16 2.0M
[   ] D1T1 – Tang Qing Hao – Virtualization System Vulnerability Discovery Framework.pdf 2016-05-26 11:50 1.0M
[   ] D1T2 – Broderick Aquilino and Wayne Low – Kernel Exploit Hunting and Mitigation.pdf 2016-05-26 15:10 1.4M
[   ] D1T2 – Chilik Tamir – Profiting from iOS Malware.pdf 2016-05-26 15:37 27M
[   ] D1T2 – Michele Spagnuolo and Lukas Weichselbaum – CSP Oddities.pdf 2016-05-26 12:31 1.6M
[   ] D1T2 – Seunghun Han – Create Your Own Bad USB Device.pdf 2016-05-26 17:00 3.5M
[   ] D1T2 – Tim Xia – Adaptive Android Kernel Live Patching.pdf 2016-05-26 18:20 2.4M
[   ] D1T2 – Yann Allain and Julien Moinard – Hardsploit Project.pdf 2016-05-26 11:50 8.5M
[   ] D1T3 – Gustavo Grieco – Vulnerability Discovery Using Machine Learning.pdf 2016-05-27 07:18 1.1M
[   ] D1T3 LABS – Anto Joseph – Droid-FF.pdf 2016-05-26 12:31 30M
[   ] D1T3 LABS – Tony Trummer and Tushar Dalvi – Mobile Application Security for iOS and Android.zip 2016-05-26 18:29 4.9M
[   ] D2 COMMSEC – Antonio Martins – Inspecage – Android Pacakge Inspector.zip 2016-05-30 18:30 19M
[   ] D2 COMMSEC – Barry van Kampen – Hack in The Class.pdf 2016-05-30 18:28 520K
[   ] D2 COMMSEC – Mattijs van Ommeren – A Series Of Unfortunate Events – Where Malware Meets Murphy.pdf 2016-05-27 12:24 71M
[   ] D2 COMMSEC – Paul Marinescu – Facebook Presents Capture the Flag.pdf 2016-05-30 10:17 6.3M
[   ] D2T1 – Anders Fogh – Cache Side Channel Attacks.pdf 2016-05-27 13:52 432K
[   ] D2T1 – Felix Wilhelm – Attacking Next Generation Firewalls.pdf 2016-05-27 15:59 2.9M
[   ] D2T1 – Jun Li – CANSsee – An Automobile Intrusion Detection System.pdf 2016-05-27 18:39 5.5M
[   ] D2T1 – Yuwei Zheng and Haoqi Shan – Forging a Wireless Time Signal to Attack NTP Servers.pdf 2016-05-27 12:26 6.9M
[   ] D2T1 Itzik Kotler and Amit Klein – The Perfect Exfiltration Technique.pdf 2016-05-27 15:07 2.6M
[   ] D2T2 – Mikhail Egorov and Sergey Soldatov – New Methods for Exploiting ORM Injections in Java Applications.pdf 2016-05-27 12:46 1.7M
[   ] D2T2 – Peter blasty Geissler – Breaking Naive ESSID WPA2 Key Generation Algorithms.pdf 2016-05-27 18:39 8.4M
[   ] D2T2 – Richard Johnson – Go Speed Tracer – Guided Fuzzing.pdf 2016-05-27 12:39 4.4M
[   ] D2T2 – Shangcong Luan – Xen Hypervisor VM Escape.pdf 2016-05-27 15:37 1.9M
[   ] D2T2 – Wish Wu – Perf – From Profiling to Kernel Exploiting.pdf 2016-05-27 15:06 315K
[   ] D2T3 LABS – Matteo Beccaro – Electronic Access Control Security.pdf 2016-05-27 16:11 13M
[   ] KEYNOTE 1 – John Adams – Beyond FBI v Apple.pdf 2016-05-26 09:40 6.4M
[   ] KEYNOTE 2 – Adam Laurie – The Future Has Arrived and it’s Effin Hilarious.odp 2016-05-27 10:47 281M
[DIR] Whitepapers/
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s