Cyberhades
Inicio Secciones Info Libros Entradas Inglés

Presentaciones de la HITBSecConf2011

2 Mins read
12 de octubre de 2011
Hacking Seguridad Eventos
header.gif

Una vez terminada la HITBSecConf2011 Malaysia, ya podemos acceder a las presentaciones:

  • D1 LABS - VoIP Attacking CUCM.pdf
  • D1 SIGINT - Jurre van Bergen and Youri van der Zwart - Abusing RFID.pdf
  • D1 SIGINT - Muhammad Najmi Ahmad Zabidi - Compiling Features for Malcious Binaries.pdf
  • D1T1 - Alex Kirk - Mobile Malware Analysis.pdf
  • D1T1 - Andrea Barisani and Daniele Bianco - EMV Protocol and POS Physical Analysis.pdf
  • D1T1 - Jonathan Brossard - Post Memory Corruption Analysis.pdf
  • D1T1 - Mahmud Ab Rahman - Reverse Engineering Android Malware.pdf
  • D1T1 - Marco Balduzzi - Attacking the Privacy of Social Network Users.pdf
  • D1T1 - Riley Hassell - Exploiting Androids for Fun and Profit.pdf
  • D1T2 - Alexander Polyakov and Dimitry Chastuhin - SAPocalypse Now.pdf
  • D1T2 - Don Bailey - GoodFUN - The GoodFET.pdf
  • D1T2 - Jim Geovedi - Satellite Telephony Security.pdf
  • D1T2 - Laurent Weber - All your Base Stations Are Belong To Us.pdf
  • D1T2 - The Grugq - Smashing the Slack for Fun and Profit.pdf
  • D1T2 - biatch0 and RuFI0 - Pwning a 4G Device for a LuLz.pdf
  • D1T3 - Barry van Kampen - DIY Video Surveillance.pdf
  • D1T3 - Jimmy Shah - Mobile App Moolah.pdf
  • KEYNOTE 1 - Kenneth Geers - Is The Pen Still Mightier Than The Sword.pdf

2011 Material Presentaciones Slides Hitb

© 2026 Cyberhades. Generado con Hugo y Tailroad theme.