Index of /events/HitB/hitb-2014-amsterdam/praatjes/


../
D1-LAB-Sniffing-the-Airwaves-with-RTL-SDR.pdf      29-May-2014 14:46             6235821
D1T1-AIS-Exposed-New-Vulnerabilities-and-Attack..> 29-May-2014 12:37             4524136
D1T1-Compromise-as-a-Service-Our-PleAZURE.pdf      29-May-2014 16:52             8171541
D1T1-Escaping-IE11-Enhanced-Protected-Mode.pdf     29-May-2014 15:26             2337736
D1T1-Hacking-Your-Cable-TV-Network-Die-Hard-Sty..> 29-May-2014 14:28            39208234
D1T1-The-NSA-Playset.pdf                           29-May-2014 12:30            10445121
D1T1-Vulnerabilities-Exposed-at-the-Protocol-Le..> 29-May-2014 10:29            17336241
D1T2-Bypassing-Endpoint-Security-for-Fun-and-Pr..> 29-May-2014 13:44            28197430
D1T2-More-Ways-to-Defeat-Secure-Boot.pdf           29-May-2014 09:10             7268828
D1T2-REboot-Bootkits-Revisited.pdf                 29-May-2014 16:47              924258
D1T2-State-of-the-Art-Exploring-the-New-Android..> 29-May-2014 12:31              641841
D1T3-Exploiting-NoSQL-Like-Never-Before.pdf        29-May-2014 15:27             2531865
D1T3-XSSing-Your-Way-to-Shell.pdf                  29-May-2014 12:18             4951567
D2-LAB-Attack-Surface-Intelligence-of-Source-Co..> 30-May-2014 13:38            12459641
D2T1-Alices-Adventures-in-Smart-Building-Land.pdf  30-May-2014 09:18             7219993
D2T1-Exploiting-Passbook-to-Fly-for-Free.pdf       30-May-2014 13:41            19811699
D2T1-G-Jacking-AppEngine-based-Applications.pdf    30-May-2014 15:09              784667
D2T1-GRX-and-a-Spy-Agency.pdf                      02-Jun-2014 14:37             7653338
D2T1-Why-Port-Scans-are-for-Pussies.pdf            30-May-2014 11:07             2357215
D2T2-Bitcoin-Forensics-Fact-or-Fiction.pdf         30-May-2014 11:19            24733820
D2T2-Breaking-Cloud-Isolation.pdf                  30-May-2014 12:22             1083821
D2T2-Exploring-and-Exploiting-iOS-Web-Browsers.pdf 30-May-2014 09:18             2797997
D2T2-Shellcodes-for-ARM-Your-Pills-Dont-Work-on..> 30-May-2014 15:27             4300412
D2T2-The-InSecurity-of-Pull-Printing-Solutions.pdf 30-May-2014 13:38             4171987
D2T3-Exploit-Development-for-New-Platforms-Base..> 30-May-2014 09:52               74052
D2T3-Format-Reverser-of-Data-Objects.pdf           30-May-2014 15:09            22962407
D2T3-Using-Javascript-Security-Features-to-Kill..> 30-May-2014 11:09             1986068