Jump to content
Nytro

HITB SecConf 2019 AMS

Recommended Posts

[PARENTDIR] Parent Directory   -  
[   ] D1 KEYNOTE - Sometimes They Come Hack - Dhillon L33tdawg Kannabhiran.pdf 2019-05-09 03:48 4.8M  
[   ] D1T1 - CSP - A Successful Mess Between Hardening and Mitigation - Lukas Weichselbaum & Michele Spagnuolo.pdf 2019-05-09 11:52 2.7M  
[   ] D1T1 - MBUF-OFLOW - Finding Vulnerabilities in iOS MacOS Networking Code - Kevin Backhouse.pdf 2019-05-09 06:20 2.8M  
[   ] D1T1 - Make ARM Shellcode Great Again - Saumil Shah.pdf 2019-05-09 05:19 51M  
[   ] D1T1 - Modern Techniques to Deobfuscate UEFI:BIOS Malware - Alexandre Borges.pdf 2019-05-09 10:21 2.9M  
[   ] D1T1 - Pwning Centrally-Controlled Smart Homes - Sanghyun Park & Seongjoon Cho.pdf 2019-05-09 13:28 40M  
[   ] D1T1 - SeasCoASA - Exploiting a Small Leak in a Great Ship - Kaiyi Xu & Lily Tang.pdf 2019-05-09 12:40 3.6M  
[   ] D1T1 - The Birdman and Cospas-Sarsat Satellites - Hao Jingli.pdf 2019-05-09 10:17 7.2M  
[   ] D1T1 - Toctou Attacks Against Secure Boot - Trammell Hudson & Peter Bosch.pdf 2019-05-09 05:39 13M  
[   ] D1T2 - Automated Discovery of Logical Privilege Escalation Bugs in Windows 10 - Wenxu Wu & Shi Qin.pdf 2019-05-09 13:30 17M  
[   ] D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf 2019-05-09 05:38 3.0M  
[   ] D1T2 - Duplicatinng Black Box Machine Learning Models - Rewanth Cool & Nikhil Joshi.pdf 2019-05-09 10:13 5.4M  
[   ] D1T2 - Fresh Apples - Researching New Attack Interfaces on iOS and OSX - Moony Li & Lilang Wu.pdf 2019-05-09 10:14 4.8M  
[   ] D1T2 - Hourglass Fuzz - A Quick Bug Hunting Method - Moony Li, Todd Han, Lance Jiang & Lilang Wu.pdf 2019-05-09 06:31 7.8M  
[   ] D1T2 - Pwning HDMI for Fun and Profit - Jeonghoon Shin & Changhyeon Moon.pdf 2019-05-09 12:32 4.7M  
[   ] D1T2 - fn_fuzzy - Fast Multiple Binary Diffing Triage - Takahiro Haruyama.pdf 2019-05-09 06:21 7.1M  
[   ] D1T3 - Reversing with Radare2 - Arnau Gamez Montolio.pdf 2019-05-09 11:57 1.5M  
[   ] HAXPO D1 - A Decade of Infosec Tools - Thomas Debize.pdf 2019-05-09 12:30 1.3M  
[   ] HAXPO D1 - Building an International Coordinated Bug Disclosure Bridge for the European Union - Benjamin Kunz.pdf 2019-05-09 12:38 2.6M  
[   ] HAXPO D1 - Ghost Tunnel 2.0 - Blue Ghost - Yongtao Wang.pdf 2019-05-09 12:36 4.2M  
[   ] HAXPO D1 - Hacking LTE Public Warning Systems - Weiguang Li.pdf 2019-05-09 12:47 22M  
[   ] HAXPO D1 - Hacking the 0day Market - Andrea Zapparoli Manzoni.pdf 2019-05-09 06:34 3.9M  
[   ] HAXPO D1 - Hiding a Secret Distributed Chat System Inside 802.11 Management Frames.pdf 2019-05-09 12:29 5.5M  
[   ] HAXPO D1 - Infrared - Old Threats Meets New Devices - Wang Kang.pdf 2019-05-09 13:26 19M  
[   ] HAXPO D1 - Social Networks - Can We Fix Them - Joel Hernandez.pdf 2019-05-09 11:59 37M  
[   ] HAXPO D1 - VoLTE Phreaking - Ralph Moonen.pdf 2019-05-09 12:47 5.4M  
[   ] HAXPO D1 - WiCy - Monitoring 802.11AC Networks at Scale.pdf 2019-05-09 06:42 3.6M  

 

Sursa: https://conference.hitb.org/hitbsecconf2019ams/materials/

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...