Ya está disponible el material de la Hack In The Box Amsterdam 2015.
- D1T1 - Alfonso De Gregorio - illusoryTLS.pdf
- D1T1 - Markus Vervier - Mobile Authentication Subspace Travel.pdf
- D1T1 - R. Rodriguez P. Vila - Relay Attacks in EMV Contactless Cards with Android OTS Devices.pdf
- D1T1 - Saumil Shah - Stegosploit - Hacking with Pictures.pdf
- D1T1 - T. Yunusov K. Nesterov - Bootkit via SMS.pdf
- D1T1 - Xeno Kovah and Corey Kallenberg - How Many Million BIOSes Would You Like to Infect.pdf
- D1T2 - Alexey Tiurin - Oracle Peoplesoft Applications are Under Attack.pdf
- D1T2 - Andrea Barisani - Forging the USB Armory.pdf
- D1T2 - Anestis Bechtsoudis - Fuzzing Objects d%e2%80%99 ART.pdf
- D1T2 - Bas Venis - Exploiting Browsers the Logical Way.pdf
- D1T2 - Pedram Hayati - Uncovering Secret Connections Amongst Attackers.pdf
- D1T2 - Tony Trummer and Tushar Dalvi - Mobile SSL Failures.pdf
- D1T3 LAB - Breaking Bad Crypto.zip
- D1T3 LAB - Dider Stevens and Xavier Mertens - Memory Forensics for Cisco iOS.pdf
- D1T3 LAB - Tony Trummer - Attacking Android Apps.pdf
- KEYNOTE 1 - Marcia Hoffmann - Fighting for Internet Security in the New Crypto Wars.pdf
- Exploiting Browsers the Logical Way.pdf
- Mobile Authentication Subspace Travel.pdf
- Oracle PeopleSoft applications are under attack.pdf
- Relay Attacks in EMV Contactless Cards with Android OTS Devices.pdf
- The illusoryTLS Asymmetric Backdoor.pdf
- Uncovering Secret Connections Among Attackers by Using Network Theory and Custom Honeypots.pdf